Distributed Hash Table

Theory, Platforms and Applications
Author: Hao Zhang,Yonggang Wen,Haiyong Xie,Nenghai Yu
Publisher: Springer Science & Business Media
ISBN: 1461490081
Category: Computers
Page: 67
View: 1107
DOWNLOAD NOW »
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and communication. These platforms and applications are used in both academic and commercials fields, making Distributed Hash Table a valuable resource for researchers and industry professionals.

Database and Expert Systems Applications

26th International Conference, DEXA 2015, Valencia, Spain, September 1-4, 2015, Proceedings
Author: Qiming Chen,Abdelkader Hameurlain,Farouk Toumani,Roland Wagner,Hendrik Decker
Publisher: Springer
ISBN: 3319228528
Category: Computers
Page: 538
View: 5544
DOWNLOAD NOW »
This two volume set LNCS 9261 and LNCS 9262 constitutes the refereed proceedings of the 26th International Conference on Database and Expert Systems Applications, DEXA 2015, held in Valencia, Spain, September 1-4, 2015. The 40 revised full papers presented together with 32 short papers, and 2 keynote talks, were carefully reviewed and selected from 125 submissions. The papers discuss a range of topics including: temporal, spatial and high dimensional databases; semantic Web and ontologies; modeling, linked open data; NoSQLm NewSQL, data integration; uncertain data and inconsistency tolerance; database system architecture; data mining, query processing and optimization; indexing and decision support systems; modeling, extraction, social networks; knowledge management and consistency; mobility, privacy and security; data streams, Web services; distributed, parallel and cloud databases; information retrieval; XML and semi-structured data; data partitioning, indexing; data mining, applications; WWW and databases; data management algorithms. These volumes also include accepted papers of the 8th International Conference on Data Management in Cloud, Grid and P2P Systems, Globe 2015, held in Valencia, Spain, September 2, 2015. The 8 full papers presented were carefully reviewed and selected from 13 submissions. The papers discuss a range of topics including: MapReduce framework: load balancing, optimization and classification; security, data privacy and consistency; query rewriting and streaming.

Basics of Computer Networking


Author: Thomas Robertazzi
Publisher: Springer Science & Business Media
ISBN: 9781461421047
Category: Technology & Engineering
Page: 84
View: 5498
DOWNLOAD NOW »
Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

Spatio-Temporal Recommendation in Social Media


Author: Hongzhi Yin,Bin Cui
Publisher: Springer
ISBN: 9811007489
Category: Computers
Page: 114
View: 7124
DOWNLOAD NOW »
This book covers the major fundamentals of and the latest research on next-generation spatio-temporal recommendation systems in social media. It begins by describing the emerging characteristics of social media in the era of mobile internet, and explores the limitations to be found in current recommender techniques. The book subsequently presents a series of latent-class user models to simulate users’ behaviors in decision-making processes, which effectively overcome the challenges arising from temporal dynamics of users’ behaviors, user interest drift over geographical regions, data sparsity and cold start. Based on these well designed user models, the book develops effective multi-dimensional index structures such as Metric-Tree, and proposes efficient top-k retrieval algorithms to accelerate the process of online recommendation and support real-time recommendation. In addition, it offers methodologies and techniques for evaluating both the effectiveness and efficiency of spatio-temporal recommendation systems in social media. The book will appeal to a broad readership, from researchers and developers to undergraduate and graduate students.

Visualizing the Data City

Social Media as a Source of Knowledge for Urban Planning and Management
Author: Paolo Ciuccarelli,Giorgia Lupi,Luca Simeone
Publisher: Springer Science & Business Media
ISBN: 3319021958
Category: Computers
Page: 76
View: 6380
DOWNLOAD NOW »
This book investigates novel methods and technologies for the collection, analysis and representation of real-time user-generated data at the urban scale in order to explore potential scenarios for more participatory design, planning and management processes. For this purpose, the authors present a set of experiments conducted in collaboration with urban stakeholders at various levels (including citizens, city administrators, urban planners, local industries and NGOs) in Milan and New York in 2012. It is examined whether geo-tagged and user-generated content can be of value in the creation of meaningful, real-time indicators of urban quality, as it is perceived and communicated by the citizens. The meanings that people attach to places are also explored to discover what such an urban semantic layer looks like and how it unfolds over time. As a conclusion, recommendations are proposed for the exploitation of user-generated content in order to answer hitherto unsolved urban questions. Readers will find in this book a fascinating exploration of techniques for mining the social web that can be applied to procure user-generated content as a means of investigating urban dynamics.

Data Mining Techniques in Sensor Networks

Summarization, Interpolation and Surveillance
Author: Annalisa Appice,Anna Ciampi,Fabio Fumarola,Donato Malerba
Publisher: Springer Science & Business Media
ISBN: 1447154541
Category: Computers
Page: 105
View: 6955
DOWNLOAD NOW »
Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates. As data analysis requests may concern both present and past data, the server is forced to store the entire stream. But the limited storage capacity of a server may reduce the amount of data stored on the disk. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data. This work introduces a recently defined spatio-temporal pattern, called trend cluster, to summarize, interpolate and identify anomalies in a sensor network. As an example, the application of trend cluster discovery to monitor the efficiency of photovoltaic power plants is discussed. The work closes with remarks on new possibilities for surveillance enabled by recent developments in sensing technology.

Distributed Computing

Principles, Algorithms, and Systems
Author: Ajay D. Kshemkalyani,Mukesh Singhal
Publisher: Cambridge University Press
ISBN: 9781139470315
Category: Technology & Engineering
Page: N.A
View: 5237
DOWNLOAD NOW »
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and practical aspects of their solutions. This comprehensive textbook covers the fundamental principles and models underlying the theory, algorithms and systems aspects of distributed computing. Broad and detailed coverage of the theory is balanced with practical systems-related issues such as mutual exclusion, deadlock detection, authentication, and failure recovery. Algorithms are carefully selected, lucidly presented, and described without complex proofs. Simple explanations and illustrations are used to elucidate the algorithms. Important emerging topics such as peer-to-peer networks and network security are also considered. With vital algorithms, numerous illustrations, examples and homework problems, this textbook is suitable for advanced undergraduate and graduate students of electrical and computer engineering and computer science. Practitioners in data networking and sensor networks will also find this a valuable resource. Additional resources are available online at www.cambridge.org/9780521876346.

Big Data

Related Technologies, Challenges and Future Prospects
Author: Min Chen,Shiwen Mao,Yin Zhang,Victor CM Leung
Publisher: Springer
ISBN: 331906245X
Category: Computers
Page: 89
View: 8333
DOWNLOAD NOW »
This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis. For each phase, the book introduces the general background, discusses technical challenges and reviews the latest advances. Technologies under discussion include cloud computing, Internet of Things, data centers, Hadoop and more. The authors also explore several representative applications of big data such as enterprise management, online social networks, healthcare and medical applications, collective intelligence and smart grids. This book concludes with a thoughtful discussion of possible research directions and development trends in the field. Big Data: Related Technologies, Challenges and Future Prospects is a concise yet thorough examination of this exciting area. It is designed for researchers and professionals interested in big data or related research. Advanced-level students in computer science and electrical engineering will also find this book useful.

Advances in QSAR modeling

Applications in Pharmaceutical, Chemical, Food, Agricultural and Environmental Sciences
Author: Kunal Roy
Publisher: Springer
ISBN: 3319568507
Category: Science
Page: 555
View: 5411
DOWNLOAD NOW »
The book covers theoretical background and methodology as well as all current applications of Quantitative Structure-Activity Relationships (QSAR). Written by an international group of recognized researchers, this edited volume discusses applications of QSAR in multiple disciplines such as chemistry, pharmacy, environmental and agricultural sciences addressing data gaps and modern regulatory requirements. Additionally, the applications of QSAR in food science and nanoscience have been included – two areas which have only recently been able to exploit this versatile tool. This timely addition to the series is aimed at graduate students, academics and industrial scientists interested in the latest advances and applications of QSAR.

Anti-fragile ICT Systems


Author: Kjell Jørgen Hole
Publisher: Springer
ISBN: 3319300709
Category: Computers
Page: 151
View: 4758
DOWNLOAD NOW »
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.

Security Challenges and Approaches in Internet of Things


Author: Sridipta Misra,Muthucumaru Maheswaran,Salman Hashmi
Publisher: Springer
ISBN: 3319442309
Category: Technology & Engineering
Page: 107
View: 9009
DOWNLOAD NOW »
This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Cognitive Computing for Big Data Systems Over IoT

Frameworks, Tools and Applications
Author: Arun Kumar Sangaiah,Arunkumar Thangavelu,Venkatesan Meenakshi Sundaram
Publisher: Springer
ISBN: 3319706888
Category: Computers
Page: 375
View: 3504
DOWNLOAD NOW »
This book brings a high level of fluidity to analytics and addresses recent trends, innovative ideas, challenges and cognitive computing solutions in big data and the Internet of Things (IoT). It explores domain knowledge, data science reasoning and cognitive methods in the context of the IoT, extending current data science approaches by incorporating insights from experts as well as a notion of artificial intelligence, and performing inferences on the knowledge The book provides a comprehensive overview of the constituent paradigms underlying cognitive computing methods, which illustrate the increased focus on big data in IoT problems as they evolve. It includes novel, in-depth fundamental research contributions from a methodological/application in data science accomplishing sustainable solution for the future perspective. Mainly focusing on the design of the best cognitive embedded data science technologies to process and analyze the large amount of data collected through the IoT, and aid better decision making, the book discusses adapting decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures as well as big data and IoT problems can be handled in practice. This book is a valuable resource for scientists, professionals, researchers, and academicians dealing with the new challenges and advances in the specific areas of cognitive computing and data science approaches.

Qualitative Comparative Analysis with R

A User’s Guide
Author: Alrik Thiem,Adrian Dusa
Publisher: Springer Science & Business Media
ISBN: 1461445841
Category: Political Science
Page: 99
View: 2491
DOWNLOAD NOW »
Social science theory often builds on sets and their relations. Correlation-based methods of scientific enquiry, however, use linear algebra and are unsuited to analyzing set relations. The development of Qualitative Comparative Analysis (QCA) by Charles Ragin has given social scientists a formal tool for identifying set-theoretic connections based on Boolean algebra. As a result, interest in this method has markedly risen among social scientists in recent years. This book offers the first complete introduction on how to perform QCA in the R software environment for statistical computing and graphics with the QCA package. Developed as a comprehensive solution, QCA provides an unprecedented scope of functionality for analyzing crisp, multi-value and fuzzy sets. The reader is not required to have knowledge of R, but the book assumes an understanding of the fundamentals of QCA. Using examples from published work, the authors demonstrate how to make the most of QCA’s wide-ranging capabilities for the reader’s own purposes. Although mainly written for political scientists, this book is also of interest to scholars from other disciplines in the social sciences such as sociology, business, management, organization, anthropology, education and health.

Cognitive Agent-based Computing-I

A Unified Framework for Modeling Complex Adaptive Systems using Agent-based & Complex Network-based Methods
Author: Muaz A Niazi,Amir Hussain
Publisher: Springer Science & Business Media
ISBN: 9400738528
Category: Medical
Page: 55
View: 992
DOWNLOAD NOW »
Complex Systems are made up of numerous interacting sub-components. Non-linear interactions of these components or agents give rise to emergent behavior observable at the global scale. Agent-based modeling and simulation is a proven paradigm which has previously been used for effective computational modeling of complex systems in various domains. Because of its popular use across different scientific domains, research in agent-based modeling has primarily been vertical in nature. The goal of this manuscript is to provide a single hands-on guide to developing cognitive agent-based models for the exploration of emergence across various types of complex systems. We present practical ideas and examples for researchers and practitioners for the building of agent-based models using a horizontal approach - applications are demonstrated in a number of exciting domains as diverse as wireless sensors networks, peer-to-peer networks, complex social systems, research networks, epidemiological HIV​

Industry Interactive Innovations in Science, Engineering and Technology

Proceedings of the International Conference, I3SET 2016
Author: Swapan Bhattacharyya,Sabyasachi Sen,Meghamala Dutta,Papun Biswas,Himadri Chattopadhyay
Publisher: Springer
ISBN: 9811039534
Category: Technology & Engineering
Page: 620
View: 3325
DOWNLOAD NOW »
The book is a collection of peer-reviewed scientific papers submitted by active researchers in the International Conference on Industry Interactive Innovation in Science, Engineering and Technology (I3SET 2016). The conference is a collective initiative of all departments and disciplines of JIS College of Engineering (an autonomous institution), Kalyani, West Bengal, India. The primary objective of the conference is to strengthen interdisciplinary research and encourage innovation in a demand-driven way as desired by the industry for escalating technology for mankind. A galaxy of academicians, professionals, scientists, industry people and researchers from different parts of the country and abroad shared and contributed their knowledge. The major areas of I3SET 2016 include nonconventional energy and advanced power systems; nanotechnology and applications; pattern recognition and machine intelligence; digital signal and image processing; modern instrumentation, control, robotics and automation; civil engineering and structural design; real-time and embedded systems, communication and devices; advanced optimization techniques; biotechnology, biomedical instrumentation and bioinformatics; and outcome based education.

Distributed Denial of Service Attack and Defense


Author: Shui Yu
Publisher: Springer Science & Business Media
ISBN: 1461494915
Category: Computers
Page: 97
View: 4693
DOWNLOAD NOW »
This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

Supply Chain Finance and Blockchain Technology

The Case of Reverse Securitisation
Author: Erik Hofmann,Urs Magnus Strewe,Nicola Bosia
Publisher: Springer
ISBN: 3319623710
Category: Business & Economics
Page: 91
View: 1798
DOWNLOAD NOW »
This book investigates how the Blockchain Technology (BCT) for Supply Chain Finance (SCF) programs allows businesses to come together in partnerships and accelerate cash flows throughout the supply chain. BCT promises to change the way individuals and corporations exchange value and information over the Internet, and is perfectly positioned to enable new levels of collaboration among the supply chain actors. The book reveals new opportunities stemming from the application of BCT to SCF financing solutions, particularly reverse factoring – or approved payables financing. To do so, it first identifies the principal barriers and pain points in delivering financing solutions. Then, a possible blockchain-driven supply chain model is defined. Using this framework, the book subsequently discusses relevant use cases for the technology, which could open up new opportunities in the SCF space. It demonstrates that blockchain and distributed ledgers technologies could deliver substantial benefits for all parties involved in SCF transactions, promising to expedite the processes and lower the overall costs of financing programs. Industry giants such as IBM, Maersk, China-based Dianrong and FnConn (a Foxconn subsidiary) are currently working to digitize the global, cross-border supply chain using blockchain technology, and will likely soon create blockchain platforms for supply chain finance. These solutions aim to reduce complexity and make data sharing more secure, accurate and efficient. This book offers a highly topical resource for stakeholders across the entire supply chain, helping them prepare for the upcoming technological revolution.

Structural Plasticity

Theory, Problems, and CAE Software
Author: Wai Fah Chen,H. Zhang
Publisher: Springer
ISBN: 9781461277460
Category: Technology & Engineering
Page: 250
View: 9652
DOWNLOAD NOW »
This book is designed for use as a supplement to the textbook "Plasticity for Structural Engineers" by W.F. Chen and D.J. Han (Springer-Verlag, 1988) or other plasticity texts. The purpose is to help students and structural engineers learn and practice how to solve typical engineering plasticity problems in general and, more importantly, how to use computers to solve plasticity problems in structural engineering in particular. To this end, specific numerical algorithms in the computer software implementation of the theory together with actual code development are given. A number of solved and supplementary problems are provided, as well as two computer-aided-education (CAE) programs, to enhance the students' understanding of these subjects.

Chaos and Complex Systems

Proceedings of the 4th International Interdisciplinary Chaos Symposium
Author: Stavros G. Stavrinides,Santo Banerjee,Suleyman Hikmet Caglar,Mehmet Ozer
Publisher: Springer Science & Business Media
ISBN: 364233914X
Category: Science
Page: 15
View: 4814
DOWNLOAD NOW »
Complexity Science and Chaos Theory are fascinating areas of scientific research with wide-ranging applications. The interdisciplinary nature and ubiquity of complexity and chaos are features that provides scientists with a motivation to pursue general theoretical tools and frameworks. Complex systems give rise to emergent behaviors, which in turn produce novel and interesting phenomena in science, engineering, as well as in the socio-economic sciences. The aim of all Symposia on Chaos and Complex Systems (CCS) is to bring together scientists, engineers, economists and social scientists, and to discuss the latest insights and results obtained in the area of corresponding nonlinear-system complex (chaotic) behavior. Especially for the “4th International Interdisciplinary Chaos Symposium on Chaos and Complex Systems,” which took place April 29th to May 2nd, 2012 in Antalya, Turkey, the scope of the symposium had been further enlarged so as to encompass the presentation of work from circuits to econophysics, and from nonlinear analysis to the history of chaos theory. The corresponding proceedings collected in this volume address a broad spectrum of contemporary topics, including but not limited to networks, circuits, systems, biology, evolution and ecology, nonlinear dynamics and pattern formation, as well as neural, psychological, psycho-social, socio-economic, management complexity and global systems.

Self-* and P2P for Network Management

Design Principles and Case Studies
Author: Clarissa Cassales Marquezan,Lisandro Zambenedetti Granville
Publisher: Springer Science & Business Media
ISBN: 1447142012
Category: Computers
Page: 105
View: 3619
DOWNLOAD NOW »
The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required. Despite being developed in parallel, and with minor direct connections perceived between them, self-* properties and P2P can be used concurrently. In Self-* and P2P for Network Management: Design Principles and Case Studies, the authors explore the issues behind the joint use of self-* properties and P2P, and present: a survey relating autonomic computing and self-* properties, P2P, and network and service management; the design of solutions that explore parallel and cooperative behavior of management peers; the change in angle of network management solution development from APIs, protocols, architectures, and frameworks to the design of management algorithms.