The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013. The Proceedings of ISCIS 2015 …
This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering to…
This volume contains revised and extended research articles written by prominent researchers who participated in the international conference on Advances in Engineering Technologies, which was held in Hong Kong, 12-14 March, 2014. Topics covered include engineering physics, engineering mathematics, scientific computing, control theory, artificial intelligence, electrical engineering, communicat…
Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing technologies, techniques,
This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections on measurement tools and methods; mobile and wireless; Web; security; an…
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…
We began this book with the aim of providing the first global and comparative perspective on energy vulnerability, in order to advance debates on the systemic processes and conditions that (re)produce domestic energy deprivation. By bringing together 13 chapters that cover 14 countries in total, the volume provides the first instance where such divergent contexts are brought together to discuss…
The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics. In this way, the book contributes first steps towards establishing a statistical network theory as a theoretical basis of linguistic network analysis the boarder of the natural sciences and the humanities. This book a…
This book constitutes the refereed proceedings of the 16th Annual Conference on Towards Autonomous Robotics, TAROS 2015, held in Liverpool UK, in September 2015. The 16 revised full papers presented together with 18 short papers were carefully reviewed and selected from 59 submissions. The overall program covers various aspects of robotics, including navigation, planning, sensing and perceptio…
This book contains papers presented at the Workshop on the Analysis of Large-scale, High-Dimensional, and Multi-Variate Data Using Topology and Statistics, held in Le Barp, France, June 2013. It features the work of some of the most prominent and recognized leaders in the field who examine challenges as well as detail solutions to the analysis of extreme scale data. The book presents new met…