- Table View
- List View
Ad-Hoc, Mobile, and Wireless Networks: 18th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW 2019, Luxembourg, Luxembourg, October 1–3, 2019, Proceedings (Lecture Notes in Computer Science #11803)
by Maria Rita Palattella Stefano Scanzio Sinem Coleri ErgenThis book constitutes the refereed proceedings of the 18th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2019, held in Luxembourg, in October 2019.The 37 full and 10 short papers presented were carefully reviewed and selected from 64 submissions. The papers provide an in-depth and stimulating view on the new frontiers in the field of mobile, ad hoc and wireless computing. They are organized in the following topical sections: IoT for emergency and disaster management; scheduling and synchronization in WSN; routing strategies for WSN; LPWANs and their integration with satellite; performance improvement of wireless and sensor networks; optimization schemes for increasing sensors lifetime; vehicular and UAV networks; body area networks, IoT security and standardization.
Ad-hoc, Mobile, and Wireless Networks: 14th International Conference, ADHOC-NOW 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedings (Lecture Notes in Computer Science #9143)
by Symeon Papavassiliou Stefan RuehrupThis book constitutes the proceedings of the 14th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2015, held in Athens, Greece in June/July 2015. The 25 full papers presented in this volume were carefully reviewed and selected from 52 submissions. The book also contains 3 full-paper invited talks. The contributions are organized in topical sections named: routing, connectivity, and resource allocation; localization, sensor deployment, and mobility management; distributed computing with mobile agents; efficient, reliable, and secure smart energy networks; and emerging communications, networking and computing technologies for VANETs 2. 0.
Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications, Second Edition
by Subir Kumar Sarkar T.G. Basavaraju C. PuttamadappaThe military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and
Ad Hoc Networks: A Statistical Perspective
by Paramartha Dutta Amlan Chakrabarti Jyoti Prakash SinghThis book identifies the time-dependent network parameters: neighbour count, link load, path length, cluster count and delay, and presents a first-of-its-kind discussion on temporal parameters in mobile ad hoc networks. Frequent topology changes and multiple link failures occur in mobile ad hoc network due to arbitrary and random movement of nodes. <P><P>This dynamic environment challenges the delivery of data and makes it essential to find better models for network parameters that are shifting with time. The parameters identified are put into the framework of time series because of their temporal characteristic, and when they are modelled using time series framework they exhibit a sound fit with Autoregressive AR(p) models of order p. <P>The order p is evaluated for each fitted model and found to lie between one and three. The book also analyses the dependence of end-to-end delay of ad hoc network on various external factors such as the number of nodes, routing protocol, mobility models and path length and develops two prediction models. The book will be useful for researchers and professionals alike.
Ad Hoc Networks: 12th EAI International Conference, ADHOCNETS 2020, Paris, France, November 17, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #345)
by Luca Foschini Mohamed El KamiliThis book constitutes the refereed proceedings of the 12th International Conference on Ad Hoc Networks, ADHOCNETS 2020, held in Paris in November 2020. The conference was held virtually due to COVID-19 pandemic. The 19 full papers were selected from 36 submissions covers a variety of network paradigms including mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (VANETs), airborne networks, underwater networks, underground networks, personal area networks, and home networks. It promises a wide range of applications in civilian, commercial, and military areas.
Ad Hoc Networks: 5th International ICST Conference, ADHOCNETS 2013, Barcelona, Spain, October 2013, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #129)
by Mostafa Hashem Sherif, Abdelhamid Mellouk, Jun Li and Paolo BellavistaThis book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range of applications, commercial and military such as mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, underground networks, personal area networks, home networks and large-scale metropolitan networks for smart cities. They are organized in topical sections on wireless sensor networks, routing, applications and security.
Ad Hoc Networks: 14th EAI International Conference, AdHocNets 2023, Hanoi, Vietnam, November 10-11, 2023, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #558)
by Nguyen Thi Dieu Linh Manh Kha Hoang Trong Hop DangThis book constitutes the refereed post-conference proceedings of the 14th EAI International Conference on Ad Hoc Networks, AdHocNets 2023, held in Hanoi, Vietnam, during November 10-11, 2023.The 15 full papers were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: intelligent integrated systems; wireless communications; and network solutions.
Ad Hoc Networks: 11th EAI International Conference, ADHOCNETS 2019, Queenstown, New Zealand, November 18–21, 2019, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #306)
by Jun Zheng Cheng Li Peter Han Joo Chong Weixiao Meng Feng YanThis book constitutes the refereed proceedings of the 11th International Conference on Ad Hoc Networks, ADHOCNETS 2019, held in Queenstown, New Zealand, in November 2019. The 28 full papers were selected from 64 submissions and cover a variety of network paradigms including mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.
Ad Hoc Networks: 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #258)
by Jun Zheng Wei Xiang Pascal Lorenz Shiwen Mao Feng YanThis book constitutes the refereed proceedings of the 10th International Conference on Ad Hoc Networks, ADHOCNETS 2018, held in Cairns, Australia, in September 2018. The 27 full papers were selected from 50 submissions and cover a variety of network paradigms including mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.
Ad Hoc Networks: 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #184)
by Yifeng Zhou Thomas KunzThis book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
Ad Hoc Networks: 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #223)
by Yifeng Zhou Thomas KunzThis book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #428)
by Wei Bao Xingliang Yuan Longxiang Gao Tom H. Luan David Bong Jun ChoiThis book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.
Ad-hoc Networks and Wireless: ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, Benidorm, Spain, June 22--27, 2014, Revised Selected Papers (Lecture Notes in Computer Science #8629)
by Miguel Garcia Pineda Jaime Lloret Symeon Papavassiliou Stefan Ruehrup Carlos Becker WestphallThis book constitutes the refereed proceedings of six workshops collocated with the 13th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW Workshops 2014, held in Benidorm, Spain, in June 2014. The 25 revised full papers presented were carefully reviewed and selected from 59 submissions. The papers address the following topics: emerging technologies for smart devices; marine sensors and systems; multimedia wireless ad hoc networks; security in ad hoc networks; smart sensor protocols and algorithms; wireless sensor, actuator and robot networks.
Ada Lovelace
by Diane Stanley Jessie Hartland“A fascinating look at Ada Lovelace, the pioneering computer programmer and daughter of the poet Lord Byron."
Ada Twist, Scientist
by Andrea Beaty David RobertsLike her classmates, builder Iggy and inventor Rosie, scientist Ada, a character of color, has a boundless imagination and has always been hopelessly curious. Why are there pointy things stuck to a rose? Why are there hairs growing inside your nose? When her house fills with a horrific, toe-curling smell, Ada knows it’s up to her to find the source. What would you do with a problem like this? Not afraid of failure, Ada embarks on a fact-finding mission and conducts scientific experiments, all in the name of discovery. But, this time, her experiments lead to even more stink and get her into trouble! Inspired by real-life makers such as Ada Lovelace and Marie Curie, Ada Twist, Scientist champions girl power and women scientists, and brings welcome diversity to picture books about girls in science. Touching on themes of never giving up and problem solving, Ada comes to learn that her questions might not always lead to answers, but rather to more questions. She may never find the source of the stink, but with a supportive family and the space to figure it out, she’ll be able to feed her curiosity in the ways a young scientist should.
Adam Smith’s Invisible Hand as Self-control Mechanism of Social Structures: Theory and Applications (Lecture Notes in Networks and Systems #477)
by Tadeusz SzubaThis book shows how such a computational process functions, how great is its power and versatility, since it is possible to show how discoveries are made. In 1759, A. Smith realized that there must exist an additional powerful control mechanism behind Great Britain’s authority and government, explaining the extraordinary successes of Great Britain. He called this the Invisible Hand. Despite having used this term only 3 times, the idea evokes extreme scientific and political emotions to this day. If we apply a molecular model of computation, such as in in Adleman’s DNA computer, a computational model for the Invisible Hand can be built to show how it affects a society. It is a spontaneous, unconscious, distributed, noncontinuous computational process on the platform of minds of, e.g., people or ants. Knowing this mechanism, a future self-steering and self-optimization system for AI robot teams can be proposed, e.g., for construction sites and rescue operations.
Adaptable Embedded Systems
by Luigi Carro Carlos Arthur Lang Lisbôa Antonio Carlos BeckAs embedded systems become more complex, designers face a number of challenges at different levels: they need to boost performance, while keeping energy consumption as low as possible, they need to reuse existent software code, and at the same time they need to take advantage of the extra logic available in the chip, represented by multiple processors working together. This book describes several strategies to achieve such different and interrelated goals, by the use of adaptability. Coverage includes reconfigurable systems, dynamic optimization techniques such as binary translation and trace reuse, new memory architectures including homogeneous and heterogeneous multiprocessor systems, communication issues and NOCs, fault tolerance against fabrication defects and soft errors, and finally, how one can combine several of these techniques together to achieve higher levels of performance and adaptability. The discussion also includes how to employ specialized software to improve this new adaptive system, and how this new kind of software must be designed and programmed.
Adaptation for Animation: Transforming Literature Frame by Frame
by Hannes RallTalented animation artists often neglect successful storytelling in favor of strong visuals, but now you can have both with this complete guide to adaptation for animation. Veteran independent filmmaker Hannes Rall teaches you how to draw and adapt inspiration from copyright-free materials like fairy tales, myths, and classic literature, making it easier than ever to create your own compelling narrative. Particular focus is given to making the adequate narrative and visual choices when transferring a text from page to screen: How to create a successful adaptation. With sections on subjects like transcultural adaptations, visual poetry and production design, this book is just the right mix of practical advice, lavish illustrations, and industry case studies to give you everything you need to start adapting your story today. Key features: Learn to apply concepts of adapting classic and modern literature for animation in different techniques Exclusive interviews with animation legends Giannalberto Bendazzi, John Canemaker, Ishu Patel and Georges Schwizgebel Lavishly illustrated with 325 color images (mostly never published before) that give thrilling insights into the visual development of award-winning animated adaptations
Adapting Agricultural Extension to Peacebuilding: Roundtable on Technology, Science, and Peacebuilding
by Andrew RobertsonSocieties have sought to improve the outputs of their agricultural producers for thousands of years. In the 19th and early 20th centuries, efforts to convey agricultural knowledge to farmers became known as extension services, a term adopted from programs at Oxford and Cambridge designed to extend the knowledge generated at universities to surrounding communities. Traditionally, extension services have emphasized a top-down model of technology transfer that encourages and teaches producers to use crop and livestock varieties and agricultural practices that will increase food production. More recently, extension services have moved toward a facilitation model, in which extension agents work with producers to identify their needs and the best sources of expertise to help meet those needs. On May 1, 2012, the Roundtable on Science, Technology, and Peacebuilding held a workshop in Washington, DC, to explore whether and how extension activities could serve peacebuilding purposes. The Roundtable is a partnership between the National Academy of Engineering (NAE) and the U. S. Institute of Peace (USIP). It consists of senior executives and experts from leading governmental organizations, universities, corporations, and nongovernmental organizations, was established in 2011 to make a measurable and positive impact on conflict management, peacebuilding, and security capabilities. Its principal goals are: To accelerate the application of science and technology to the process of peacebuilding and stabilization; To promote systematic, high-level communication between peacebuilding and technical organizations on the problems faced and the technical capabilities required for successful peacebuilding; and To collaborate in applying new science and technology to the most pressing challenges for local and international peacebuilders working in conflict zones.
Adapting Configuration Management for Agile Teams
by Mario E. MoreiraAdapting Configuration Management for Agile Teams provides very tangible approaches on how Configuration Management with its practices and infrastructure can be adapted and managed in order to directly benefit agile teams. Written by Mario E. Moreira, author of Software Configuration Management Implementation Roadmap, columnist for CM Crossroads online community and writer for the Agile Journal, this unique book provides concrete guidance on tailoring CM for Agile projects without sacrificing the principles of Configuration Management.
Adapting the EU Civil Liability Regime to the Digital Age: Artificial Intelligence, Robotics, and Other Emerging Technologies (Law, Governance and Technology Series #68)
by Nikos Th. NikolinakosThis book highlights the challenges that artificial intelligence (AI), robotics, the Internet of Things (IoT), and other emerging digital technologies pose to existing EU and national liability legislation, while also tracing the evolution of the relevant EU policy and legal framework. Recognising that Member States’ current national fault-based liability rules are ill-suited to handle compensation claims for AI-related harm, the book emphasises the difficulty victims face in proving fault and causation due to AI’s unique characteristics, such as autonomy and opacity (“black box” effect). Similarly, the current Product Liability Directive (PLD) has several shortcomings: certain products, economic actors, and types of damage in the digital and circular economy are not covered under strict liability; proving defectiveness and establishing a causal link with damage, especially for complex products, is often challenging; in addition, liability claims are subject to restrictive limits and thresholds. The book discusses in detail the European Commission’s proposal for a Directive on harmonising civil liability rules for damage caused by AI systems (the ‘proposed AI Liability Directive’). It also offers a thorough analysis of the European Commission’s proposal for a revised Product Liability Directive, compares it with the positions of the Council of the EU and the European Parliament, and discusses the final text approved by the Plenary of the European Parliament in March 2024. The book incorporates comments from various parties, offering insights into the approaches of EU institutions and the conflicting interests among stakeholders. Presenting carefully grounded arguments, this volume serves as a valuable resource for understanding the interplay between policy and law within the new EU liability framework for AI and other innovative products. This forthcoming EU regime represents a significant shift in the liability landscape, potentially heightening litigation risks. Its success will depend on achieving the EU’s overarching objective: ensuring fair compensation while fostering technological innovation.
Adaptive and Adaptable Learning: 11th European Conference on Technology Enhanced Learning, EC-TEL 2016, Lyon, France, September 13-16, 2016, Proceedings (Lecture Notes in Computer Science #9891)
by Katrien Verbert Tomaž Klobučar Mike SharplesThis book constitutes the proceedings of the 11th European Conference on Technology Enhanced Learning, EC-TEL 2016, held in Lyon, France, in September 2016. The 26 full papers, 23 short papers, 8 demo papers, and 33 poster papers presented in this volume were carefully reviewed and selected from 148 submissions.
Adaptive and Learning-Based Control of Safety-Critical Systems (Synthesis Lectures on Computer Science)
by Max Cohen Calin BeltaThis book stems from the growing use of learning-based techniques, such as reinforcement learning and adaptive control, in the control of autonomous and safety-critical systems. Safety is critical to many applications, such as autonomous driving, air traffic control, and robotics. As these learning-enabled technologies become more prevalent in the control of autonomous systems, it becomes increasingly important to ensure that such systems are safe. To address these challenges, the authors provide a self-contained treatment of learning-based control techniques with rigorous guarantees of stability and safety. This book contains recent results on provably correct control techniques from specifications that go beyond safety and stability, such as temporal logic formulas. The authors bring together control theory, optimization, machine learning, and formal methods and present worked-out examples and extensive simulation examples to complement the mathematical style of presentation. Prerequisites are minimal, and the underlying ideas are accessible to readers with only a brief background in control-theoretic ideas, such as Lyapunov stability theory.
Adaptive Autonomous Secure Cyber Systems
by Sushil Jajodia Cliff Wang V. S. Subrahmanian Vipin Swarup George Cybenko Michael WellmanThis book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations;The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate;On-line learning algorithms, including deep recurrent networks and reinforcement learning, for the kinds of situation awareness and decisions that autonomous cyber systems will require;Human understanding and control of highly distributed autonomous cyber defenses;Quantitative performance metrics for the above so that autonomous cyber defensive agents can reason about the situation and appropriate responses as well as allowing humans to assess and improve the autonomous system.This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure and reliable Internet. The recent advances in adaptive cyber defense (ACD) have developed a range of new ACD techniques and methodologies for reasoning in an adaptive environment.Autonomy in physical and cyber systems promises to revolutionize cyber operations. The ability of autonomous systems to execute at scales, scopes, and tempos exceeding those of humans and human-controlled systems will introduce entirely new types of cyber defense strategies and tactics, especially in highly contested physical and cyber environments. The development and automation of cyber strategies that are responsive to autonomous adversaries pose basic new technical challenges for cyber-security.This book targets cyber-security professionals and researchers (industry, governments, and military). Advanced-level students in computer science and information systems will also find this book useful as a secondary textbook.
Adaptive Biometric Systems: Recent Advances and Challenges (Advances in Computer Vision and Pattern Recognition)
by Ajita Rattani Fabio Roli Eric GrangerThis interdisciplinary volume presents a detailed overview of the latest advances and challenges remaining in the field of adaptive biometric systems. A broad range of techniques are provided from an international selection of pre-eminent authorities, collected together under a unified taxonomy and designed to be applicable to any pattern recognition system. Features: presents a thorough introduction to the concept of adaptive biometric systems; reviews systems for adaptive face recognition that perform self-updating of facial models using operational (unlabeled) data; describes a novel semi-supervised training strategy known as fusion-based co-training; examines the characterization and recognition of human gestures in videos; discusses a selection of learning techniques that can be applied to build an adaptive biometric system; investigates procedures for handling temporal variance in facial biometrics due to aging; proposes a score-level fusion scheme for an adaptive multimodal biometric system.