This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in detail…
This ambitious multidisciplinary volume assembles diverse critical-theory approaches to the current and future states of networked learning. Expert contributors expand upon the existing literature by analyzing the ethical aspects of networked learning and the ongoing need for more open, inclusive, and socially engaged educational practice. Chapters explore in depth evolving concepts of real and…
This book constitutes the refereed proceedings of the Second International Conference on Data Science, ICDS 2015, held in Sydney, Australia, in August 8-9, 2015. The 19 revised full papers and 5 short papers presented were carefully reviewed and selected from 31 submissions. The papers focus on the following topics: mathematical issues in data science; big data issues and applications; data qua…
This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymi…
This book constitutes the refereed proceedings of the 10th International Workshop on Databases in Networked Information Systems, DNIS 2015, held in Aizu-Wakamatsu, Japan, March 2015. The 14 revised full papers presented together with 7 invited papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on big data analysis, information and…
This monograph presents original research results on selected problems of dependability in contemporary Complex Information Systems (CIS). The ten chapters are concentrated around the following three aspects: methods for modelling of the system and its components, tasks? or in more generic and more adequate interpretation, functionalities? accomplished by the system and conditions for their cor…
This book constitutes the refereed proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2009, held in Milan, Italy, in July 2009. The 10 revised full papers presented together with three extended abstracts were carefully selected from 44 initial submissions. The papers are organized in topical sections on malware and SPAM, e…
This book constitutes the proceedings of the 29th International Symposium on Distributed Computing, DISC 2015, held in Tokyo, Japan, in October 2015. The 42 full papers and 14 short papers presented in this volume were carefully reviewed and selected from 143 submissions. The papers feature original contributions to theory, design, implementation, modeling, analysis, or application of distribut…
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Internet Technology, ICDCIT 2015, held in Bhubaneswar, India, in February 2015. The 12 revised full papers presented together with 30 short papers and 9 invited talks in this volume were carefully reviewed and selected from 221 submissions. The papers cover topics such as distributed…
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International…