This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…
This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoret…
This open access book discusses the statistical modeling of insurance problems, a process which comprises data collection, data analysis and statistical model building to forecast insured events that may happen in the future. It presents the mathematical foundations behind these fundamental statistical concepts and how they can be applied in daily actuarial practice. Statistical modeling has…
This book constitutes the proceedings of the 16th International Conference on Informatics in Schools: Situation, Evolution and Perspectives, ISSEP 2023, held in Lausanne, Switzerland, during October 23–25, 2023. The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They are organized in four topical sections named: artificial intelligence and i…
In questo testo si introducono i concetti di base per la modellistica numerica di problemi differenziali alle derivate parziali. Si considerano le classiche equazioni lineari ellittiche, paraboliche ed iperboliche, ma anche altre equazioni, quali quelle di diffusione e trasporto, di Navier-Stokes e le leggi di conservazione; si forniscono inoltre numerosi esempi fisici che stanno alla base di t…
This book constitutes the thoroughly refereed post-proceedings of the satellite events of the 9th International Conference on the Semantic Web, ESWC 2012, held in Heraklion, Crete, Greece, in May 2012. This volume contains 49 full papers and 13 short papers describing the posters and demonstrations. (SUGGESTION/ HELP needed).
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This book constitutes the refereed proceedings of the 16th International Conference on Web-Age Information Management, WAIM 2015, held in Qingdao, China, in June 2015. The 33 full research papers, 31 short research papers, and 6 demonstrations were carefully reviewed and selected from 164 submissions. The focus of the conference is on following topics: advanced database and web applications, bi…
This book constitutes the refereed conference proceedings of the 14th International Symposium, W2GIS 2015, held in Grenoble, France, in May 2015. The 12 revised full papers presented were carefully selected from 19 submissions. Selected papers cover hot topics related to W2GIS including spatiotemporal data collection, processing and visualization, mobile user generated content, semantic trajec…
This book constitutes the refereed proceedings of the workshops held at the 17th Asia-Pacific Web Conference, APWeb 2015, in Guangzhou, China, in September 2015. The 15 full papers were carefully reviewed and selected from various submissions. The volume presents the papers that have been accepted for the following workshops: Big Data Applications in Telecoms, BDAT 2015, Big Social Data, BSD…