Distributed Hash Table

Author: Hao Zhang
Publisher: Springer Science & Business Media
ISBN: 1461490081
Format: PDF, Mobi
Download Now
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and communication. These platforms and applications are used in both academic and commercials fields, making Distributed Hash Table a valuable resource for researchers and industry professionals.

Database and Expert Systems Applications

Author: Qiming Chen
Publisher: Springer
ISBN: 3319228528
Format: PDF, ePub
Download Now
This two volume set LNCS 9261 and LNCS 9262 constitutes the refereed proceedings of the 26th International Conference on Database and Expert Systems Applications, DEXA 2015, held in Valencia, Spain, September 1-4, 2015. The 40 revised full papers presented together with 32 short papers, and 2 keynote talks, were carefully reviewed and selected from 125 submissions. The papers discuss a range of topics including: temporal, spatial and high dimensional databases; semantic Web and ontologies; modeling, linked open data; NoSQLm NewSQL, data integration; uncertain data and inconsistency tolerance; database system architecture; data mining, query processing and optimization; indexing and decision support systems; modeling, extraction, social networks; knowledge management and consistency; mobility, privacy and security; data streams, Web services; distributed, parallel and cloud databases; information retrieval; XML and semi-structured data; data partitioning, indexing; data mining, applications; WWW and databases; data management algorithms. These volumes also include accepted papers of the 8th International Conference on Data Management in Cloud, Grid and P2P Systems, Globe 2015, held in Valencia, Spain, September 2, 2015. The 8 full papers presented were carefully reviewed and selected from 13 submissions. The papers discuss a range of topics including: MapReduce framework: load balancing, optimization and classification; security, data privacy and consistency; query rewriting and streaming.

Big Data

Author: Min Chen
Publisher: Springer
ISBN: 331906245X
Format: PDF, Kindle
Download Now
This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis. For each phase, the book introduces the general background, discusses technical challenges and reviews the latest advances. Technologies under discussion include cloud computing, Internet of Things, data centers, Hadoop and more. The authors also explore several representative applications of big data such as enterprise management, online social networks, healthcare and medical applications, collective intelligence and smart grids. This book concludes with a thoughtful discussion of possible research directions and development trends in the field. Big Data: Related Technologies, Challenges and Future Prospects is a concise yet thorough examination of this exciting area. It is designed for researchers and professionals interested in big data or related research. Advanced-level students in computer science and electrical engineering will also find this book useful.

Basics of Computer Networking

Author: Thomas Robertazzi
Publisher: Springer Science & Business Media
ISBN: 9781461421047
Format: PDF, Mobi
Download Now
Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

Spatio Temporal Recommendation in Social Media

Author: Hongzhi Yin
Publisher: Springer
ISBN: 9811007489
Format: PDF, Mobi
Download Now
This book covers the major fundamentals of and the latest research on next-generation spatio-temporal recommendation systems in social media. It begins by describing the emerging characteristics of social media in the era of mobile internet, and explores the limitations to be found in current recommender techniques. The book subsequently presents a series of latent-class user models to simulate users’ behaviors in decision-making processes, which effectively overcome the challenges arising from temporal dynamics of users’ behaviors, user interest drift over geographical regions, data sparsity and cold start. Based on these well designed user models, the book develops effective multi-dimensional index structures such as Metric-Tree, and proposes efficient top-k retrieval algorithms to accelerate the process of online recommendation and support real-time recommendation. In addition, it offers methodologies and techniques for evaluating both the effectiveness and efficiency of spatio-temporal recommendation systems in social media. The book will appeal to a broad readership, from researchers and developers to undergraduate and graduate students.

Security for Cloud Storage Systems

Author: Kan Yang
Publisher: Springer Science & Business Media
ISBN: 1461478731
Format: PDF, Docs
Download Now
Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers for access control. To protect the data integrity in the cloud, an efficient and secure dynamic auditing protocol is introduced, which can support dynamic auditing and batch auditing. To ensure the data security in the cloud, two efficient and secure data access control schemes are introduced in this brief: ABAC for Single-authority Systems and DAC-MACS for Multi-authority Systems. While Ciphertext-Policy Attribute-based Encryption (CP-ABE) is a promising technique for access control of encrypted data, the existing schemes cannot be directly applied to data access control for cloud storage systems because of the attribute revocation problem. To solve the attribute revocation problem, new Revocable CP-ABE methods are proposed in both ABAC and DAC-MACS.

Distributed Computing

Author: Ajay D. Kshemkalyani
Publisher: Cambridge University Press
ISBN: 9781139470315
Format: PDF
Download Now
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and practical aspects of their solutions. This comprehensive textbook covers the fundamental principles and models underlying the theory, algorithms and systems aspects of distributed computing. Broad and detailed coverage of the theory is balanced with practical systems-related issues such as mutual exclusion, deadlock detection, authentication, and failure recovery. Algorithms are carefully selected, lucidly presented, and described without complex proofs. Simple explanations and illustrations are used to elucidate the algorithms. Important emerging topics such as peer-to-peer networks and network security are also considered. With vital algorithms, numerous illustrations, examples and homework problems, this textbook is suitable for advanced undergraduate and graduate students of electrical and computer engineering and computer science. Practitioners in data networking and sensor networks will also find this a valuable resource. Additional resources are available online at www.cambridge.org/9780521876346.

Local Image Descriptor Modern Approaches

Author: Bin Fan
Publisher: Springer
ISBN: 3662491737
Format: PDF, Mobi
Download Now
This book covers a wide range of local image descriptors, from the classical ones to the state of the art, as well as the burgeoning research topics on this area. The goal of this effort is to let readers know what are the most popular and useful methods in the current, what are the advantages and the disadvantages of these methods, which kind of methods is best suitable for their problems or applications, and what is the future of this area. What is more, hands-on exemplars supplied in this book will be of great interest to Computer Vision engineers and practitioners, as well as those want to begin their research in this area. Overall, this book is suitable for graduates, researchers and engineers in the related areas both as a learning text and as a reference book.

Security Challenges and Approaches in Internet of Things

Author: Sridipta Misra
Publisher: Springer
ISBN: 3319442309
Format: PDF, ePub
Download Now
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Proceedings of the Second International Conference on Computer and Communication Technologies

Author: Suresh Chandra Satapathy
Publisher: Springer
ISBN: 8132225171
Format: PDF, Docs
Download Now
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the technical contents of the topics.