Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 49.30
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 49.62
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Language: English
Published by Springer International Publishing, Springer International Publishing Nov 2015, 2015
ISBN 10: 3319238280 ISBN 13: 9783319238289
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers.The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 656 pp. Englisch.
Language: English
Published by Springer International Publishing, 2015
ISBN 10: 3319238019 ISBN 13: 9783319238012
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers.The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Language: English
Published by Springer International Publishing, 2015
ISBN 10: 3319238280 ISBN 13: 9783319238289
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers.The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Language: English
Published by Springer-Verlag New York Inc, 2015
ISBN 10: 3319238019 ISBN 13: 9783319238012
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 432 pages. 9.25x6.25x1.25 inches. In Stock.
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. International Conference on Security and Privacy in Communication Networks | 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I | Jing Tian (u. a.) | Taschenbuch | xix | Englisch | 2015 | Springer | EAN 9783319238289 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. International Conference on Security and Privacy in Communication Networks | 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II | Jin Tian (u. a.) | Taschenbuch | xix | Englisch | 2015 | Springer | EAN 9783319238012 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Language: English
Published by Springer-Verlag New York Inc, 2015
ISBN 10: 3319238280 ISBN 13: 9783319238289
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 656 pages. 9.00x6.00x1.75 inches. In Stock.
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: New. New. book.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 164.62
Quantity: Over 20 available
Add to basketCondition: New. In.
Taschenbuch. Condition: Neu. Artificial Intelligence for Edge Computing | Mudhakar Srivatsa (u. a.) | Taschenbuch | xiv | Englisch | 2024 | Springer | EAN 9783031407895 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Language: English
Published by Springer International Publishing, Springer Nature Switzerland, 2024
ISBN 10: 303140789X ISBN 13: 9783031407895
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering.
Language: English
Published by Springer International Publishing, 2023
ISBN 10: 3031407865 ISBN 13: 9783031407864
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - It is undeniable that the recent revival of artificial intelligence (AI) has significantly changed the landscape of science in many application domains, ranging from health to defense and from conversational interfaces to autonomous cars. With terms such as 'Google Home', 'Alexa', and 'ChatGPT' becoming household names, the pervasive societal impact of AI is clear. Advances in AI promise a revolution in our interaction with the physical world, a domain where computational intelligence has always been envisioned as a transformative force toward a better tomorrow. Depending on the application family, this domain is often referred to as Ubiquitous Computing, Cyber-Physical Computing, or the Internet of Things. The underlying vision is driven by the proliferation of cheap embedded computing hardware that can be integrated easily into myriads of everyday devices from consumer electronics, such as personal wearables and smart household appliances, to city infrastructure and industrial process control systems. One common trait across these applications is that the data that the application operates on come directly (typically via sensors) from the physical world. Thus, from the perspective of communication network infrastructure, the data originate at the network edge. From a performance standpoint, there is an argument to be made that such data should be processed at the point of collection. Hence, a need arises for Edge AI -- a genre of AI where the inference, and sometimes even the training, are performed at the point of need, meaning at the edge where the data originate.The book is broken down into three parts: core problems, distributed problems, and other cross-cutting issues. It explores the challenges arising in Edge AI contexts. Some of these challenges (such as neural network model reduction to fit resource-constrained hardware) are unique to the edge environment. They need a novel category of solutions that do not parallel more typical concerns in mainstream AI. Others are adaptations of mainstream AI challenges to the edge space. An example is overcoming the cost of data labeling. The labeling problem is pervasive, but its solution in the IoT application context is different from other contexts. This book is not a survey of the state of the art. With thousands of publications appearing in AI every year, such a survey is doomed to be incomplete on arrival. It is also not a comprehensive coverage of all the problems in the space of Edge AI. Different applications pose different challenges, and a more comprehensive coverage should be more application specific. Instead, this book covers some of the more endemic challenges across the range of IoT/CPS applications. To offer coverage in some depth, we opt to cover mainly one or a few representative solutions for each of these endemic challenges in sufficient detail, rather that broadly touching on all relevant prior work. The underlying philosophy is one of illustrating by example. The solutions are curated to offer insight into a way of thinking that characterizes Edge AI research and distinguishes its solutions from their more mainstream counterparts.
Language: English
Published by Springer International Publishing, Springer International Publishing Dez 2024, 2024
ISBN 10: 303140789X ISBN 13: 9783031407895
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -It is undeniable that the recent revival of artificial intelligence (AI) has significantly changed the landscape of science in many application domains, ranging from health to defense and from conversational interfaces to autonomous cars. With terms such as 'Google Home', 'Alexa', and 'ChatGPT' becoming household names, the pervasive societal impact of AI is clear. Advances in AI promise a revolution in our interaction with the physical world, a domain where computational intelligence has always been envisioned as a transformative force toward a better tomorrow. Depending on the application family, this domain is often referred to as Ubiquitous Computing, Cyber-Physical Computing, or the Internet of Things. The underlying vision is driven by the proliferation of cheap embedded computing hardware that can be integrated easily into myriads of everyday devices from consumer electronics, such as personal wearables and smart household appliances, to city infrastructure andindustrial process control systems. One common trait across these applications is that the data that the application operates on come directly (typically via sensors) from the physical world. Thus, from the perspective of communication network infrastructure, the data originate at the network edge. From a performance standpoint, there is an argument to be made that such data should be processed at the point of collection. Hence, a need arises for Edge AI -- a genre of AI where the inference, and sometimes even the training, are performed at the point of need, meaning at the edge where the data originate.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 380 pp. Englisch.
Language: English
Published by Springer International Publishing, Springer International Publishing Dez 2023, 2023
ISBN 10: 3031407865 ISBN 13: 9783031407864
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Buch. Condition: Neu. Neuware -It is undeniable that the recent revival of artificial intelligence (AI) has significantly changed the landscape of science in many application domains, ranging from health to defense and from conversational interfaces to autonomous cars. With terms such as ¿Google Home¿, ¿Alexä, and ¿ChatGPT¿ becoming household names, the pervasive societal impact of AI is clear. Advances in AI promise a revolution in our interaction with the physical world, a domain where computational intelligence has always been envisioned as a transformative force toward a better tomorrow. Depending on the application family, this domain is often referred to as Ubiquitous Computing, Cyber-Physical Computing, or the Internet of Things. The underlying vision is driven by the proliferation of cheap embedded computing hardware that can be integrated easily into myriads of everyday devices from consumer electronics, such as personal wearables and smart household appliances, to city infrastructure and industrial process control systems. One common trait across these applications is that the data that the application operates on come directly (typically via sensors) from the physical world. Thus, from the perspective of communication network infrastructure, the data originate at the network edge. From a performance standpoint, there is an argument to be made that such data should be processed at the point of collection. Hence, a need arises for Edge AI -- a genre of AI where the inference, and sometimes even the training, are performed at the point of need, meaning at the edge where the data originate.The book is broken down into three parts: core problems, distributed problems, and other cross-cutting issues. It explores the challenges arising in Edge AI contexts. Some of these challenges (such as neural network model reduction to fit resource-constrained hardware) are unique to the edge environment. They need a novel category of solutions that do not parallel more typical concerns in mainstream AI. Others are adaptations of mainstream AI challenges to the edge space. An example is overcoming the cost of data labeling. The labeling problem is pervasive, but its solution in the IoT application context is different from other contexts. This book is not a survey of the state of the art. With thousands of publications appearing in AI every year, such a survey is doomed to be incomplete on arrival. It is also not a comprehensive coverage of all the problems in the space of Edge AI. Different applications pose different challenges, and a more comprehensive coverage should be more application specific. Instead, this book covers some of the more endemic challenges across the range of IoT/CPS applications. To offer coverage in some depth, we opt to cover mainly one or a few representative solutions for each of these endemic challenges in sufficient detail, rather that broadly touching on all relevant prior work. The underlying philosophy is one of illustrating by example. The solutions are curated to offer insight into a way of thinking that characterizes Edge AI research and distinguishes its solutions from their more mainstream counterparts.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 380 pp. Englisch.
Hardcover. Condition: Brand New. 365 pages. 9.25x6.25x1.00 inches. In Stock.
Language: English
Published by Springer International Publishing Nov 2015, 2015
ISBN 10: 3319238280 ISBN 13: 9783319238289
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers.The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking. 656 pp. Englisch.
Language: English
Published by Springer International Publishing Dez 2015, 2015
ISBN 10: 3319238019 ISBN 13: 9783319238012
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers.The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking. 432 pp. Englisch.
Condition: new. Questo è un articolo print on demand.
Language: English
Published by Springer International Publishing, 2015
ISBN 10: 3319238019 ISBN 13: 9783319238012
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short.
Language: English
Published by Springer International Publishing, 2015
ISBN 10: 3319238280 ISBN 13: 9783319238289
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short.
Condition: new. Questo è un articolo print on demand.