This book continues the biannual series of conference proceedings, which has become a classical reference resource in traffic and granular research alike. It addresses new developments at the interface between physics...
详细信息
ISBN:
(数字)9783642396694
ISBN:
(纸本)9783642396687;9783662521724
This book continues the biannual series of conference proceedings, which has become a classical reference resource in traffic and granular research alike. It addresses new developments at the interface between physics, engineering and computational science. Complex systems, where many simple agents, be they vehicles or particles, give rise to surprising and fascinating phenomena.;The contributions collected in these proceedings cover several research fields, all of which deal with transport. Topics include highway, pedestrian and internet traffic, granular matter, biological transport, transport networks, data acquisition, data analysis and technological applications. Different perspectives, i.e. modeling, simulations, experiments and phenomenological observations, are considered.
This volume contains 29 submitted and 2 invited papers presented at the tenth East-European Conference on Advances in Databases and Information Systems (ADVIS 2003), which took place in Dresden, Germany, September 3–...
详细信息
ISBN:
(数字)9783540394037
ISBN:
(纸本)9783540200475
This volume contains 29 submitted and 2 invited papers presented at the tenth East-European Conference on Advances in Databases and Information Systems (ADVIS 2003), which took place in Dresden, Germany, September 3–6, 2003. An international program committee of 42 members from 24 countries s- ected these contributions from 86 submissions. Eight additional contributions were selected as short papers and have been published in a separate volume of local proceedings by the organizing institution. For the ?rst time, ADBIS also included an industrial program consisting of nine submitted presentations by representatives of commercial companies active in the database market. ADBIS 2003 was the tenth scienti?c event taking place under the acronym ADBIS, and thus marks a ?rst “jubilee” for this young, but by now we- established,seriesofconferences. ADBISwasfoundedbytheMoscowACMSIG- MOD Chapter in 1993. In 1994–1996 ADBIS was held in the form of workshops organized by the MOSCOW ACM SIGMOD Chapter in collaboration with the RussianFoundationforBasicResearch. Inthisperiod,anumberofinternational guests were invited to Moscow every year in order to improve and consolidate contacts between the national research community in Russia and the research community worldwide. International program committees for ADBIS were es- blished in 1995, contributing to the quality of the selection process and thus of the conference contributions in general. In 1996, following discussions with Dr.
This book constitutes the refereed proceedings of the 38th Conference on Current Trends in Theory and Practice of computerscience, SOFSEM 2012, held in Špindlerův Mlýn, Czech Republic, in January 2012. The 43 re...
详细信息
ISBN:
(数字)9783642276606
ISBN:
(纸本)9783642276590
This book constitutes the refereed proceedings of the 38th Conference on Current Trends in Theory and Practice of computerscience, SOFSEM 2012, held in Špindlerův Mlýn, Czech Republic, in January 2012.
The 43 revised papers presented in this volume were carefully reviewed and selected from 121 submissions. The book also contains 11 invited talks, 10 of which are in full-paper length. The contributions are organized in topical sections named: foundations of computerscience; software and Web engineering; cryptography, security, and verification; and artificial intelligence.
It is our great pleasure to present the proceedings of the Third International Workshop on Multiple Access Communications (MACOM) that was held in Barcelona during September 13–14, 2010. In 1961, Claude Shannon estab...
详细信息
ISBN:
(数字)9783642154287
ISBN:
(纸本)9783642154270
It is our great pleasure to present the proceedings of the Third International Workshop on Multiple Access Communications (MACOM) that was held in Barcelona during September 13–14, 2010. In 1961, Claude Shannon established the foundation for the discipline now known as “multi-user information theory” in his pioneering paper “Two-way Communication Channels,” and later Norman Abramson published his paper “The Aloha System—Another Alternative for computer Communications” in 1970 which introduced the concept of multiple access using a shared common channel. Thereafter, for more than 40 years of study, numerous elegant theories and algorithms have been developed for multiple-access communications. During the 1980s and 1990s the evolution of multiple-access techniques p- ceeded in conjunction with the evolution of wireless networks. Novel multiple access techniques like code division multiple access (CDMA) and orthogonal frequency division multiple access (OFDMA) provided increased spectral - ?ciency, dynamicity and ?exibility in radio resource allocation with intrinsic anti-multipath and anti-interference features. In this ?rst decade of the 21st century,multiple-accesstechniques,derivedfromadvancedwirelesstransmission methodologiesbasedonthediversityconcept(e. g. ,MC-CDMA,MIMO-OFDMA and SC-FDMA), opened the road to a renewed idea of multiple access. Today multiple-access communications involve many challenging aspects not only l- ited (like in the past) to physical layer design. Medium access control (MAC) techniques play a crucial role in managing the radio resources that users will exploit to transmit their data streams. Recent developments in software radios and cognitive radios have led to a signi?cant impact also on spectrum m- agement andaccess paradigms.
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to;securing social identity as well as the latest advan...
详细信息
ISBN:
(数字)9783030394899
ISBN:
(纸本)9783030394882;9783030394912
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to;securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phone devices, access their bank accounts, uses online shopping service providers, accesses their personal documents or accounts with valuable information, surfs the internet, or even becomes a victim of cyberattacks. In all of the aforementioned cases, there is a need for mobile related technologies that protect the users’ social identity and well-being in the digital world, including the use of biometrics, cybersecurity software and tools, active authentication and identity anti-spoofing algorithms and more.
This book constitutes the refereed proceedings of the International Conference for Smart Health, ICSH 2013, held in Beijing, China, in August 2013. The 15 revised full papers presented were carefully reviewed and sele...
详细信息
ISBN:
(数字)9783642398445
ISBN:
(纸本)9783642398438
This book constitutes the refereed proceedings of the International Conference for Smart Health, ICSH 2013, held in Beijing, China, in August 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Information Sharing, Integrating and Extraction; Mining Clinical and Medical Data; Smart Health Applications.
暂无评论