Pub Date : 2016-05-01DOI: 10.1007/978-981-13-0116-2
Jie Hu, Kun Yang
{"title":"Data and Energy Integrated Communication Networks","authors":"Jie Hu, Kun Yang","doi":"10.1007/978-981-13-0116-2","DOIUrl":"https://doi.org/10.1007/978-981-13-0116-2","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-22DOI: 10.1007/978-3-319-27024-1
Juris Klonovs, M. A. Haque, V. Krüger, Kamal Nasrollahi, K. Andersen-Ranberg, T. Moeslund, E. Spaich
{"title":"Distributed Computing and Monitoring Technologies for Older Patients","authors":"Juris Klonovs, M. A. Haque, V. Krüger, Kamal Nasrollahi, K. Andersen-Ranberg, T. Moeslund, E. Spaich","doi":"10.1007/978-3-319-27024-1","DOIUrl":"https://doi.org/10.1007/978-3-319-27024-1","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116718930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-09DOI: 10.1007/978-3-319-25793-8
Elise Lemle, Katherine Bomkamp, Marcella Klein Williams, Elizabeth Cutbirth
{"title":"Two Bit Circus and the Future of Entertainment","authors":"Elise Lemle, Katherine Bomkamp, Marcella Klein Williams, Elizabeth Cutbirth","doi":"10.1007/978-3-319-25793-8","DOIUrl":"https://doi.org/10.1007/978-3-319-25793-8","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132161107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-07DOI: 10.1007/978-3-319-25546-0
Lucas Davi, A. Sadeghi
{"title":"Building Secure Defenses Against Code-Reuse Attacks","authors":"Lucas Davi, A. Sadeghi","doi":"10.1007/978-3-319-25546-0","DOIUrl":"https://doi.org/10.1007/978-3-319-25546-0","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127325569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-18DOI: 10.1007/978-1-4939-3441-6
Xinyuan Wang, D. Reeves
{"title":"Traceback and Anonymity","authors":"Xinyuan Wang, D. Reeves","doi":"10.1007/978-1-4939-3441-6","DOIUrl":"https://doi.org/10.1007/978-1-4939-3441-6","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114570049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-11-08DOI: 10.1007/978-3-319-23288-1
Zhuo Lu, Wenye Wang, Cliff X. Wang
{"title":"Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications","authors":"Zhuo Lu, Wenye Wang, Cliff X. Wang","doi":"10.1007/978-3-319-23288-1","DOIUrl":"https://doi.org/10.1007/978-3-319-23288-1","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"212 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133489079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-22DOI: 10.1007/978-3-319-21942-4
T. Kenesei, J. Abonyi
{"title":"Interpretability of Computational Intelligence-Based Regression Models","authors":"T. Kenesei, J. Abonyi","doi":"10.1007/978-3-319-21942-4","DOIUrl":"https://doi.org/10.1007/978-3-319-21942-4","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130394159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-16DOI: 10.1007/978-3-319-20448-2
Dan Wang, Zhu Han
{"title":"Sublinear Algorithms for Big Data Applications","authors":"Dan Wang, Zhu Han","doi":"10.1007/978-3-319-20448-2","DOIUrl":"https://doi.org/10.1007/978-3-319-20448-2","url":null,"abstract":"","PeriodicalId":132522,"journal":{"name":"SpringerBriefs in Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}