This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking on the other. Addressing the interests of research…
This book constitutes the proceedings of the 14th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2015, held in Athens, Greece in June/July 2015. The 25 full papers presented in this volume were carefully reviewed and selected from 52 submissions. The book also contains 3 full-paper invited talks. The contributions are organized in topical sections named: routing, connectivi…
This book constitutes the refereed proceedings of six workshops collocated with the 13th International Conference on Ad-Hoc Networks and Wireless, ADHOC-NOW Workshops 2014, held in Benidorm, Spain, in June 2014. The 25 revised full papers presented were carefully reviewed and selected from 59 submissions. The papers address the following topics: emerging technologies for smart devices; marin…
The First A4Cloud Summer School has been one of the first events in the area of accountability and security in the cloud. It was organized by the EU-funded A4Cloud project, in collaboration with the European projects CIRRUS, Coco Cloud, CUMULUS, and SPECS. Cloud computing is a key technology that is being adopted progressively by companies and users across different application domains and indu…
This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game industry, due to the high technical barriers. Readers of…
This is a book is a collection of articles that will be submitted as full papers to the AGILE annual international conference. These papers go through a rigorous review process and report original and unpublished fundamental scientific research. Those published cover significant research in the domain of geographic information science systems. This year the focus is on geographic information sc…
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things Summit, IoT360 2014, held in Rome, Italy, in October 2014. This volume contains 74 full papers carefully reviewed and selected from 118 submissions at the following four conferences: the First International Conference on Cognitive Internet of Thing…
The current volume provides examples of how environmental hazards such as landslides, earthquakes, mountain processes, cold climate processes and tidal flows and currents can affect the energy supply infrastructure. In times of uncertainty, the security of the European cross-border energy supply infrastructure, such as pipelines, has great importance. Whilst the potential effects of political d…
This book offers a unique collection of inter- and multidisciplinary studies on river systems. Rivers have been the prime source of sustenance since the advent of civilization and river systems often form the basis for agriculture, transport, water, and land for domestic, commercial, and industrial activities, fostering economic prosperity. A river basin is a basic geographical and climatologic…