Browse Results

Showing 36,176 through 36,200 of 54,406 results

Wireless and Satellite Systems: 12th EAI International Conference, WiSATS 2021, Virtual Event, China, July 31 – August 2, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #410)

by Qing Guo Weixiao Meng Min Jia Xue Wang

This book constitutes the refereed post-conference proceedings of the 12th International Conference on Wireless and Satellite Services, WiSATS 2021, held in Nanjing, China, in September 2020. Due to COVID-19 pandemic the conference was held virtually. The 79 full papers were carefully reviewed and selected from 140 submissions. The conference’s central theme is the means of using the wireless and satellite services directly to the user for personal communications, multimedia and location identification. The services enabled by WiSATS not only cover the requirements of an ordinary citizen but also provide personal and public services for global coverage communications as the applications of internet of things.

Pervasive Computing: Concepts, Technologies and Applications (Lecture Notes in Computer Science #6646)

by Minyi Guo Jingyu Zhou Feilong Tang Yao Shen

This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.

The First Line of Code: Android Programming with Kotlin

by Lin Guo

The First Line of Code is a must-have for developers who want to learn Android and Kotlin, and the best-seller in China. Knowledge between Android and Kotlin is interspersed in a way that readers are easy to understand and get start:· Android part covers all the important aspects of the Android platform, such as activity, service, content provider, broadcast receiver, fragment, basic UI, data storage, network, Jetpack and other application-level knowledge. · Kotlin part covers various aspects of Kotlin, such as standard grammar, common skills, higher-order functions, generics, coroutines, DSL and other language-level knowledge. In addition, The First Line of Code is a very practicing book, illustrating concepts with a complete weather forecast program. You can use and practice all the knowledge comprehensively after learning and see the actual result for what you have learned through the book. All contents of the book are quite easy to understand. It might be a good choice for both beginners and experienced developers. Also suitable for college students, college teachers, etc.

Fundamentals of Error Theory: Applications in Decision Making (Studies in Systems, Decision and Control #267)

by Kaizhong Guo Shiyong Liu

This book provides a tool for generic readers and graduates who are interested or majoring in systems engineering, decision science, management science, and project management to sharpen their system thinking skills, equipping them with a multiangle perspective, and offering them broader view to understand the complex socioeconomic system in which we are embedded. It systematically investigates the root causes and mechanisms that generate errors through the use of fuzzy set theory, systems science, logic and set theory, and decision science – an area that has rarely been explored in literature. The topics covered include classic error set, fuzzy error set, multivariate error set, error function, identification of errors, error systems, error logic, error matrix, and practical application of error theory in a sewage project.

Physical Geodesy: A Theoretical Introduction (Springer Textbooks in Earth Sciences, Geography and Environment)

by Jun-Yi Guo

This textbook introduces physical geodesy. It treats the boundary-value theories of the discipline comprehensively, and provides insights to the theory of gravity reduction based on a spherical Earth model. This book is for students who wish to thoroughly understand the material and to expand their knowledge and skills in mathematics for more advanced study and research in this discipline. The details of mathematical derivations included are a useful asset for instructors and researchers.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14440)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VI (Lecture Notes in Computer Science #14443)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14441)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VII (Lecture Notes in Computer Science #14444)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part V (Lecture Notes in Computer Science #14442)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part VIII (Lecture Notes in Computer Science #14445)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14438)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

Advances in Cryptology – ASIACRYPT 2023: 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14439)

by Jian Guo Ron Steinfeld

The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.

IRC-SET 2021: Proceedings of the 7th IRC Conference on Science, Engineering and Technology, August 2021, Singapore

by Huaqun Guo Hongliang Ren Victor Wang Eyasu Getahun Chekole Umayal Lakshmanan

This book highlights contemporary state of research in multidisciplinary areas in computer science, computer engineering, chemical engineering, mechanical engineering, physics, biomedical sciences, life sciences, medicine, and health care. The accepted submissions to the 7th IRC Conference on Science, Engineering and Technology (IRC-SET 2021) that were presented on August 7, 2021, are published in this conference proceedings. The papers presented here were shortlisted after extensive rounds of rigorous reviews by a panel of esteemed individuals who are pioneers and experts in their respective domains.

IRC-SET 2020: Proceedings of the 6th IRC Conference on Science, Engineering and Technology, July 2020, Singapore

by Huaqun Guo Hongliang Ren Noori Kim

This book highlights leading-edge research in multi-disciplinary areas in Physics, Engineering, Medicine, and Health care, from the 6th IRC Conference on Science, Engineering and Technology (IRC-SET 2020) held in July 2020 at Singapore. The papers were shortlisted after extensive rounds of reviews by a panel of esteemed individuals who are pioneers in their domains. The book also contains excerpts of the speeches by eminent personalities who graced the occasion, thereby providing written documentation of the event.

IRC-SET 2022: Proceedings of the 8th IRC Conference on Science, Engineering and Technology, August 2022, Singapore

by Huaqun Guo Ian McLoughlin Eyasu Getahun Chekole Umayal Lakshmanan Weizhi Meng Peng Cheng Wang Jiqiang Lu

This book highlights contemporary state of research in multi-disciplinary areas in Physics, Biomedical Sciences, Chemical Engineering, Mechanical Engineering, Computer Science/Engineering, Life Sciences, and Healthcare. The accepted submissions to the 8th IRC Conference on Science, Engineering and Technology (IRC-SET 2022) that were presented on 6th August 2022, are published in this conference proceedings. The papers presented here were shortlisted after extensive rounds of rigorous reviews by a panel of esteemed individuals who are pioneers and experts in their respective domains.

Introduction to Space Archaeology

by Huadong Guo Xinyuan Wang Fulong Chen Cheng Wang

This book presents the basic principles and the latest advances in space archaeology. Following general reviews of the state of the art of Earth observation technologies and archaeology, the book introduces the principles and methods of space archaeology, remote sensing methods for archaeological survey, and integrated archaeological survey methods including geophysics, virtual reality, web technologies, global positioning systems (GPS), geographical information systems (GIS), and big data. The book then presents two chapters on case studies of word heritage sites in Asia, Europe, Africa, and Americas, including three major world heritage sites in China: The Great Wall, Grand Canal, and Silk Road. The last chapter of the book discusses the future of space archaeology. This book has an interdisciplinary appeal and scholars with an interest in cultural heritage and remote sensing technologies for Earth value its contribution.

Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11449)

by Fuchun Guo Xinyi Huang Moti Yung

This book constitutes the post-conference proceedings of the 14th International Conference on Information Security and Cryptology, Inscrypt 2018, held in Fuzhou, China, in December 2018.The 31 full papers presented together with 5 short papers and 1 invited paper were carefully reviewed and selected from 93 submissions. The papers cover topics in the field of blockchain and crypto currency; lattice-based cryptology; symmetric cryptology; applied cryptography; information security; assymetric encryption; and foundations.

Data Center Networking: Network Topologies and Traffic Management in Large-Scale Data Centers

by Deke Guo

This book provides a comprehensive reference in large data center networking. It first summarizes the developing trend of DCNs, and reports four novel DCNs, including a switch-centric DCN, a modular DCN, a wireless DCN, and a hybrid DCN. Furthermore another important factor in DCN targets at managing and optimizing the network activity at the level of transfers to aggregate correlated data flows and thus directly to lower down the network traffic resulting from such data transfers. In particular, the book reports the in-network aggregation of incast transfer, shuffle transfer, uncertain incast transfer, and the cooperative scheduling of uncertain multicast transfer.

Material Appearance Modeling: A Data-Coherent Approach

by Baining Guo Yue Dong Stephen Lin

A principal aim of computer graphics is to generate images that look as real as photographs. Realistic computer graphics imagery has however proven to be quite challenging to produce, since the appearance of materials arises from complicated physical processes that are difficult to analytically model and simulate, and image-based modeling of real material samples is often impractical due to the high-dimensional space of appearance data that needs to be acquired. This book presents a general framework based on the inherent coherency in the appearance data of materials to make image-based appearance modeling more tractable. We observe that this coherence manifests itself as low-dimensional structure in the appearance data, and by identifying this structure we can take advantage of it to simplify the major processes in the appearance modeling pipeline. This framework consists of two key components, namely the coherence structure and the accompanying reconstruction method to fully recover the low-dimensional appearance data from sparse measurements. Our investigation of appearance coherency has led to three major forms of low-dimensional coherence structure and three types of coherency-based reconstruction upon which our framework is built. This coherence-based approach can be comprehensively applied to all the major elements of image-based appearance modeling, from data acquisition of real material samples to user-assisted modeling from a photograph, from synthesis of volumes to editing of material properties, and from efficient rendering algorithms to physical fabrication of objects. In this book we present several techniques built on this coherency framework to handle various appearance modeling tasks both for surface reflections and subsurface scattering, the two primary physical components that generate material appearance. We believe that coherency-based appearance modeling will make it easier and more feasible for practitioners to bring computer graphics imagery to life. This book is aimed towards readers with an interest in computer graphics. In particular, researchers, practitioners and students will benefit from this book by learning about the underlying coherence in appearance structure and how it can be utilized to improve appearance modeling. The specific techniques presented in our manuscript can be of value to anyone who wishes to elevate the realism of their computer graphics imagery. For understanding this book, an elementary background in computer graphics is assumed, such as from an introductory college course or from practical experience with computer graphics.

Internet der Dinge in der Intralogistik

by Willibald Günthner Michael Ten Hompel

Experten aus Wissenschaft und Technik fordern ein Umdenken in der Intralogistik: weg von durchgeplanten, vorherbestimmten Systemen, hin zu einem Netzwerk gleichberechtigter Einheiten, die keiner übergeordneten Koordination bedürfen. In dem Band werden die notwendigen Komponenten, die Softwarearchitektur und die Potenziale dieser neuen Technologie beschrieben. Anwendungsbeispiele liefern Entwicklern und Planern eine Grundlage für die Gestaltung moderner Materialflusssysteme in der Industrie.

Optimized C++: Proven Techniques for Heightened Performance

by Kurt Guntheroth

In today's fast and competitive world, a program's performance is just as important to customers as the features it provides. This practical guide teaches developers performance-tuning principles that enable optimization in C++. You'll learn how to make code that already embodies best practices of C++ design run faster and consume fewer resources on any computer--whether it's a watch, phone, workstation, supercomputer, or globe-spanning network of servers.Author Kurt Guntheroth provides several running examples that demonstrate how to apply these principles incrementally to improve existing code so it meets customer requirements for responsiveness and throughput. The advice in this book will prove itself the first time you hear a colleague exclaim, "Wow, that was fast. Who fixed something?"Locate performance hot spots using the profiler and software timersLearn to perform repeatable experiments to measure performance of code changesOptimize use of dynamically allocated variablesImprove performance of hot loops and functionsSpeed up string handling functionsRecognize efficient algorithms and optimization patternsLearn the strengths--and weaknesses--of C++ container classesView searching and sorting through an optimizer's eyeMake efficient use of C++ streaming I/O functionsUse C++ thread-based concurrency features effectively

GIMP für Dummies (Für Dummies)

by Karsten W. Günther

Dieses Buch befasst sich mit den Grundlagen der Bildbearbeitung und von GIMP: Docks, Werkzeuge, Filter, Auswahlen, Ebenen und Pfade werden Ihnen bald sehr vertraut sein. Sie wollen Bilder verbessern und kombinieren oder gar neue Bilder erzeugen? Mit GIMP kein Problem. Sie sind sicher, dass GIMP eine bestimmte Funktionalität hat, wissen aber nicht, wo suchen? Schlagen Sie in diesem Buch nach! Für Fortgeschrittene bietet es zudem noch jede Menge Tipps zu Spezialeffekten, zum zerstörungsfreien Arbeiten, zum Schärfen und Weichzeichnen und zu vielen anderen Dingen, die bei der Bildbearbeitung Spaß machen.

Security Standardisation Research: 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings (Lecture Notes in Computer Science #13895)

by Felix Günther Julia Hesse

This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..

Laptops Simplified

by Sherry Kinkoph Gunter

Step-by-step guidance on all things laptop-related, aimed at visual learnersA little overwhelmed by the selection of laptops out there and how to get started using one? Laptops Simplified, Second Edition is here to help! Boasting a straightforward, jargon-free approach, this easy-to-navigate guide takes the fear out of exploring the subject of laptops and breaks it down to the basics. Veteran author Sherry Kinkoph Gunter demystifies common laptop issues such as finding the laptop that is right for you, setting it up, troubleshooting it, and maintaining it. Covers the very basics of connecting to wireless networks while away from home; working with a variety of devices such as cameras, cell phones, and extra monitors; and making sure all security precautions are in place for safe online experiencesFeatures full-color screen shots and numbered, step-by-step instructions on how to get up and running with your laptopIncludes coverage of the new Windows 8 operating systemShares helpful advice from a veteran author on getting the most out of your laptopLaptops Simplified, Second Edition puts you on your way to becoming a confident and savvy laptop user!

Refine Search

Showing 36,176 through 36,200 of 54,406 results