Proceedings 2004 VLDB Conference


Book Description

Proceedings of the 30th Annual International Conference on Very Large Data Bases held in Toronto, Canada on August 31 - September 3 2004. Organized by the VLDB Endowment, VLDB is the premier international conference on database technology.




Transactions on Computational Collective Intelligence XXXIII


Book Description

These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This thirty-third issue contains 9 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence from big data and networking paradigms while addressing security, privacy, reliability and optimality to achieve QoS to the benefit of final users.




Software Security -- Theories and Systems


Book Description

For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.




Wireless Sensor Networks


Book Description

This book constitutes the refereed proceedings of the 15th China Conference on Wireless Sensor Networks, CWSN 2021 held in Guilin, China, in October 2021. The 19 papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on ​theory and technology on wireless sensor network; application on internet of things; security and privacy protection on internet of things; fog computing and wireless computing.




MULTICORE SYSTEMS ON-CHIP


Book Description

Conventional on-chip communication design mostly use ad-hoc approaches that fail to meet the challenges posed by the next-generation MultiCore Systems on-chip (MCSoC) designs. These major challenges include wiring delay, predictability, diverse interconnection architectures, and power dissipation. A Network-on-Chip (NoC) paradigm is emerging as the solution for the problems of interconnecting dozens of cores into a single system on-chip. However, there are many problems associated with the design of such systems. These problems arise from non-scalable global wire delays, failure to achieve global synchronization, and difficulties associated with non-scalable bus-based functional interconnects. The book consists of three parts, with each part being subdivided into four chapters. The first part deals with design and methodology issues. The architectures used in conventional methods of MCSoCs design and custom multiprocessor architectures are not flexible enough to meet the requirements of different application domains and not scalable enough to meet different computation needs and different complexities of various applications. Several chapters of the first part will emphasize on the design techniques and methodologies. The second part covers the most critical part of MCSoCs design — the interconnections. One approach to addressing the design methodologies is to adopt the so-called reusability feature to boost design productivity. In the past years, the primitive design units evolved from transistors to gates, finite state machines, and processor cores. The network-on-chip paradigm offers this attractive property for the future and will be able to close the productivity gap. The last part of this book delves into MCSoCs validations and optimizations. A more qualitative approach of system validation is based on the use of formal techniques for hardware design. The main advantage of formal methods is the possibility to prove the validity of essential design requirements. As formal languages have a mathematical foundation, it is possible to formally extract and verify these desired properties of the complete abstract state space. Online testing techniques for identifying faults that can lead to system failure are also surveyed. Emphasis is given to analytical redundancy-based techniques that have been developed for fault detection and isolation in the automatic control area.




Mastering Cloud Computing


Book Description

Mastering Cloud Computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won't live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout. - Explains how to make design choices and tradeoffs to consider when building applications to run in a virtual cloud environment - Real-world case studies include scientific, business, and energy-efficiency considerations