This book offers in-depth coverage of event-based systems, ranging from local event matching and distributed event forwarding algorithms, through software engineering issues raised by the event-based style, to current research in event-based systems like composite event detection and security.
Written with a tutorial style, this introduction presents three key types of coverage control problems: point, area and barrier coverage. The fundamentals are discussed in each category, as well as the most recent advances and techniques in the field today.
This book provides the insights required to effectively respond to counterfeit trade. It constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel management tools, and product protection technologies.
This book, the second of three volumes exploring the concept of social networks from a computational point of view, offers contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy.
This book, the first of three volumes exploring the concept of social networks from a computational point of view, offers contributions from world-class experts with a specific focus on practical tools, applications and open avenues for further research.
This book, the third of three volumes exploring the concept of social networks from a computational point of view, offers contributions from world-class experts concentrating on topics relating to knowledge discovery and visualization of complex networks.
Social networks provide a powerful abstraction of the structure and dynamics of people-to-technology interaction. Comparing social animal interaction with web-based social interaction, this volume explores human behavior in web-based social networks.
This analysis of the software infrastructure in the financial sector looks at vulnerability to cyber attack and existing protection methods. It then shows how information sharing among financial institutions helps them react more effectively to cyber attacks.