This book summarizes the state-of-the-art in unsupervised learning. The contributors discuss how with the proliferation of massive amounts of unlabeled data, unsupervised learning algorithms, which can automatically discover interesting and useful patterns in such data, have gained popularity among researchers and practitioners. The authors outline how these algorithms have found numerous appli…
This book constitutes the refereed proceedings of the 8th China Conference of Wireless Sensor Networks, held in Xi'an, China, in October/November 2014. The 64 revised full papers were carefully reviewed and selected from 365 submissions. The papers are organized in topical sections on power control and management; network architecture and deployment; positioning and location-based services in w…
This book constitutes revised selected papers from the refereed proceedings of the First Human Centered Computing Conference, HCC 2014, that consolidated and further develops the successful ICPCA/SWS conferences on Pervasive Computing and the Networked World. The 54 full papers and 30 short papers presented in this volume were carefully reviewed and selected from 152 submissions. These proceedi…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This book deals with a number of fundamental issues related to the practical implementation of ultrasonic NDT techniques in an industrial environment. The book discusses advanced academic research results and their application to industrial procedures. The text covers the choice and generation of the signals energizing the system to probe position optimization, from quality assessment evaluati…
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015. The 36 full papers presented together with 11 short papers were carefully reviewed and selected from 62 submissions. The papers are grouped in topical sections on adding intelligence for environment adapt…
IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…
Gain the practical knowledge you need to plan, design, deploy, and manage mixed cloud and on-premises IT management systems. Drawing on his experience as senior principal software architect at CA Technologies, Marvin Waschke lays out the nuts and bolts of the IT Infrastructure Library (ITIL)—the 5-volume bible of standard IT service management practices that is the single most important tool …
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…