Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Secu…
Der Open-Access-Band stellt die Bedingungen, Verfahrensweisen und Organisationsformen einer gemeinschaftlichen Entwicklung von Gemeinden, Städten und Regionen in den Mittelpunkt einer wissenschaftlichen Auseinandersetzung. Da Kommunen angesichts der Anforderungen aus globalen, nationalen und regionalen Veränderungen die damit verbundenen komplexen Aufgaben nicht mehr alleine lösen können…
A hands-on approach to tasks and techniques in data stream mining and real-time analytics, with examples in MOA, a popular freely available open-source software framework.OCLC-licensed vendor bibliographic record.
Why are some communities able to come together to improve their collective lot while others are not? Looking at variation in local government performance in decentralized West Africa, this book advances a novel answer to this question: Communities are better able to coordinate around basic service delivery when their formal jurisdictional boundaries overlap with informal social institutions, or…
This book constitutes the refereed proceedings of the 28th Australasian Joint Conference on Artificial Intelligence, AI 2015, held in Canberra, Australia, in November/December 2015. The 39 full papers and 18 short papers presented were carefully reviewed and selected from 102 submissions.