Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
Professor James J. Park received his Ph.D. degree in Graduate School of Information Security from Korea University, Korea. From December, 2002 to July, 2007, Dr. Park had been a research scientist of R&D Institute, Hanwha S&C Co., Ltd., Korea. From September, 2007 to August, 2009, He had been a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea.
Professor Gangman Yi received his master's degree in Computer Sciences at Texas A&M University, USA in 2007, and doctorate in Computer Sciences at Texas A&M University, USA in 2011. In May 2011, he joined System S/W group in Samsung Electronics, Suwon, Korea. He joined the Department of Computer Science & Engineering, Gangneung-Wonju National University, Korea, since March 2012. Dr. Yi has been researched in an interdisciplinary field of researches.
Professor Hong Shen is Professor (Chair) of Computer Science in the School of Computer Science, University of Adelaide. He received his B.Eng. degree from Beijing University of Science
Rhymes+; C.-H. Dominic Hung.- Review and Comparison of Mobile Payment Protocol; P.Pukkasenung, R. Chokngamwong.- POFOX; X.Tan, et al.- An Experimental Study on Social Regularization with User Interest Similarity; Z.Zhang, H.Shen.- Representing Higher Dimensional Arrays into Generalized Two-dimensional Array: G2A; K.M.Azharul Hasan, Md.A.Hanif Shaikh.- A portable and platform independent file system for large scale peer-to-peer systems and distributed applications; A.Barbian, et al.- OCLS; S.Wu, et al.- Hierarchical Caching Management for Software Defined Content Network Based on Node Value; J.Liu, et al.- Interoperation of Distributed MCU Emulator/Simulator for Operating Power Simulation of Large-Scale Internet of Event-Driven Control Things; S.Lee, et al.- The Greedy Approach to Group Students for Cooperative Learning; B.W.Kim, et al.- Secure concept of SCADA Communication for Offshore Wind Energy; S.Ju, et al.- ASR Error Management Using RNN Based Syllable Prediction for Spoken Dialog Applications; B.Kim, et al.- A Protection Method of Mobile Sensitive Data and Applications over Escrow Service; S.-W.Park, et al.- GPU-based fast refinements for high-quality color volume rendering; B.Lee, et al.- Beacon Distance Measurement Method in Indoor Ubiquitous Computing Environment; Y.Sung, et al.- Indoor Location-based Natural User Interface for Ubiquitous Com
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.