First International Conference on Sustainable Technologies for Computational Intelligence

First International Conference on Sustainable Technologies for Computational Intelligence

Author: Ashish Kumar Luhach

Publisher: Springer Nature

ISBN: 9789811500299

Category: Technology & Engineering

Page: 847

View: 877

This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.

Computer Networks and Inventive Communication Technologies

Computer Networks and Inventive Communication Technologies

Author: S. Smys

Publisher: Springer Nature

ISBN: 9789811637285

Category: Technology & Engineering

Page: 903

View: 477

This book is a collection of peer-reviewed best-selected research papers presented at 4th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2021). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference are a valuable resource, dealing with both the important core and the specialized issues in the areas of next-generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advanced work in the area.

Strong Brands, Strong Relationships

Strong Brands, Strong Relationships

Author: Susan Fournier

Publisher: Routledge

ISBN: 9781317662341

Category: Business & Economics

Page: 441

View: 147

From the editor team of the ground-breaking Consumer-Brand Relationships: Theory and Practice comes this new volume. Strong Brands, Strong Relationships is a collection of innovative research and management insights that build upon the foundations of the first book, but takes the study of brand relationships outside of traditional realms by applying new theoretical frameworks and considering new contexts. The result is an expanded and better-informed account of people’s relationships with brands and a demonstration of the important and timely implications of this evolving sub-discipline. A range of different brand relationship environments are explored in the collection, including: online digital spaces, consumer collectives, global brands, luxury brands, branding in terrorist organizations, and the brand relationships of men and transient consumers. This book attends to relationship endings as well as their beginnings, providing a full life-cycle perspective. While the first volume focused on positive relationship benefits, this collection explores dysfunctional dynamics, adversarial and politically-charged relationships, and those that are harmful to well-being. Evocative constructs are leveraged, including secrets, betrayals, anthropomorphism, lying, infidelity, retaliation, and bereavement. The curated collection provides both a deeper theoretical understanding of brand relationship phenomena and ideas for practical application from experiments and execution in commercial practice. Strong Brands, Strong Relationships will be the perfect read for marketing faculty and graduate students interested in branding dynamics, as well as managers responsible for stewarding brands.

ICT Innovations 2016

ICT Innovations 2016

Author: Georgi Stojanov

Publisher: Springer

ISBN: 9783319688558

Category: Technology & Engineering

Page: 252

View: 120

The International Conference on ICT Innovations was held in September 2016, in Ohrid, Macedonia, with the main topic “Cognitive Functions and Next Generation ICT Systems”. We live in the era where technologies are intimately woven into virtually all aspects of daily life and are becoming almost invisible. While these technologies have considerable benefits, they also have a number of shortcomings and unforeseen consequences. For example, on the one hand, bodily sensors that track physical activity, physiological parameters and sleep patterns can help promote healthy habits and can enable early detection of problems. On the other hand, attention spans are becoming shorter and shorter due to constant interruptions by notifications, emails, and instant messages being delivered to cell phones or watches, and similar disturbances. Moreover, the privacy issues involved in storing and manipulation of these data must not be neglected. The technological convergence of sciences that were considered separate in the past, like information and communication technologies, cognitive sciences, nanotechnologies and biotechnologies, determines not only our society, health and economy, but also our education and culture. The conference gathered academics, professionals and practitioners involved in developing solutions and systems in the industrial and business arena, especially innovative commercial implementations, to discuss novel applications of these next-generation, emerging technologies in the context of human cognitive functions.

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

Author: Patrick Sole

Publisher: World Scientific

ISBN: 9789811248344

Category: Computers

Page: 215

View: 237

Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.

Secure Multiparty Computation and Secret Sharing

Secure Multiparty Computation and Secret Sharing

Author: Ronald Cramer

Publisher: Cambridge University Press

ISBN: 9781316368404

Category: Computers

Page:

View: 721

In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party possesses some private data, while secret sharing provides a way for one party to spread information on a secret such that all parties together hold full information, yet no single party has all the information. The authors present basic feasibility results from the last 30 years, generalizations to arbitrary access structures using linear secret sharing, some recent techniques for efficiency improvements, and a general treatment of the theory of secret sharing, focusing on asymptotic results with interesting applications related to MPC.

Artificial Intelligence and Security in Computing Systems

Artificial Intelligence and Security in Computing Systems

Author: Jerzy Soldek

Publisher: Springer Science & Business Media

ISBN: 9781441992260

Category: Computers

Page: 302

View: 296

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Theory of Cryptography

Theory of Cryptography

Author: Yael Kalai

Publisher: Springer

ISBN: 9783319705033

Category: Computers

Page: 778

View: 712

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Security and Cryptography for Networks

Security and Cryptography for Networks

Author: Vassilis Zikas

Publisher: Springer

ISBN: 9783319446189

Category: Computers

Page: 606

View: 373

This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.

STACS 91

STACS 91

Author: Symposium on Theoretical Aspects of Computer Science

Publisher: Springer Science & Business Media

ISBN: 3540537090

Category: Computers

Page: 568

View: 557

Annotation The Symposium on Theoretical Aspects of Computer Science is organized jointly by the Special Interest Group for Applied Mathematics of AFCET (Association FranAaise de CybernA(c)tique Economique et Technique) and the Special Interest Group for Theoretical Computer Sciences of GI (Gesellschaft fA1/4r Informatik). It is held alternately in France and in Germany. This volume contains two invited papers, on combinatorial methods in computer science, and on the complexity of local optimization, and 24 contributions on theoretical aspects of computer science. Some software systems are presented showing the possibilities of applying theoretical research to the realization of software tools.

MultiMedia Modeling

MultiMedia Modeling

Author: Xiangjian He

Publisher: Springer

ISBN: 9783319144450

Category: Computers

Page: 586

View: 719

The two-volume set LNCS 8935 and 8936 constitutes the thoroughly refereed proceedings of the 21st International Conference on Multimedia Modeling, MMM 2015, held in Sydney, Australia, in January 2015. The 49 revised regular papers, 24 poster presentations, were carefully reviewed and selected from 189 submissions. For the three special session, a total of 18 papers were accepted for MMM 2015. The three special sessions are Personal (Big) Data Modeling for Information Access and Retrieval, Social Geo-Media Analytics and Retrieval and Image or video processing, semantic analysis and understanding. In addition, 9 demonstrations and 9 video showcase papers were accepted for MMM 2015. The accepted contributions included in these two volumes represent the state-of-the-art in multimedia modeling research and cover a diverse range of topics including: Image and Video Processing, Multimedia encoding and streaming, applications of multimedia modelling and 3D and augmented reality.

International Conference on Intelligent Computing and Applications

International Conference on Intelligent Computing and Applications

Author: Subhransu Sekhar Dash

Publisher: Springer

ISBN: 9789811055201

Category: Technology & Engineering

Page: 679

View: 225

The book is a collection of best papers presented in International Conference on Intelligent Computing and Applications (ICICA 2016) organized by Department of Computer Engineering, D.Y. Patil College of Engineering, Pune, India during 20-22 December 2016. The book presents original work, information, techniques and applications in the field of computational intelligence, power and computing technology. This volume also talks about image language processing, computer vision and pattern recognition, machine learning, data mining and computational life sciences, management of data including Big Data and analytics, distributed and mobile systems including grid and cloud infrastructure.