Narrow your search

Library

KU Leuven (18)

ULiège (14)

AP (12)

KDG (12)

ULB (12)

Odisee (11)

Thomas More Kempen (11)

Thomas More Mechelen (11)

UCLL (11)

VIVES (11)

More...

Resource type

book (30)

digital (12)

dissertation (2)


Language

English (42)

Chinese (1)

French (1)


Year
From To Submit

2023 (3)

2021 (6)

2019 (5)

2017 (3)

2016 (1)

More...
Listing 1 - 10 of 44 << page
of 5
>>
Sort by
Homotopy theory of the suspensions of the projective plane
Author:
ISBN: 0821832395 Year: 2003 Publisher: Providence, Rhode Island : American Mathematical Society,

On maps from loop suspensions to loop spaces and the shuffle relations on the Cohen groups.
Author:
ISBN: 082183875X Year: 2006 Publisher: Providence American Mathematical Society


Book
On Deng Xiaoping thought
Author:
ISBN: 711901868X Year: 1996 Publisher: Beijing : Foreign languages press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

On natural coalgebra decompositions of tensor algebras and loop suspensions
Authors: ---
ISBN: 0821821105 Year: 2000 Publisher: Providence, Rhode Island : American Mathematical Society,

Exercices corrigés de théorie analytique et probabiliste des nombres
Authors: ---
ISBN: 2856290450 Year: 1996 Volume: 2 Publisher: Paris : Société mathématique de France,


Book
Energy-aware Scheduling on Multiprocessor Platforms
Authors: ---
ISSN: 21915768 ISBN: 1461452236 1461452244 Year: 2013 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms. Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration. Thus, Energy-aware Scheduling on Multiprocessor Platforms covers current research on this topic and classifies existing works according to two key standards, namely, homogeneity/heterogeneity of multi­processor platforms and the task types considered. Under this classification, other sub-issues are also included, such as, slack reclamation, fixed/dynamic priority sched­uling, partition-based/global scheduling, and application-specific power consumption, etc.


Book
Sulfur Dioxide Insertion Reactions for Organic Synthesis
Authors: ---
ISBN: 9811042020 9811042012 Year: 2017 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This brief summarizes the most commonly used sulfur dioxide surrogates and also shows the diverse reactivities to highlight the advances made in the development of synthetic methods through the insertion of sulfur dioxide. Depending on the nature of the transformation, these reactions are classified into four types: (i) pericyclic reactions; (ii) nucleophilic addition with organometallic reagents; (iii) transition metal catalysis; and (iv) free radical reactions. Highlighting recent advances in the insertion of sulfur dioxide, providing detailed descriptions of the experimental procedures for these valuable reactions, and discussing the remaining challenges in this field, the brief offers an appealing and highly useful guide for a wide readership in organic chemistry and medicinal chemistry from both academia and industry.


Book
AdS3/CFT2 and Holographic Entanglement Entropy
Author:
ISBN: 9811332126 9811332118 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book focuses on AdS3/CFT2, addressing different aspects of this correspondence in field theory and in gravity, including entanglement entropy, higher genus partition function, and conformal block. Holographic entanglement entropy is an important area in holographic and quantum information, which implies a deep relation between geometry and quantum entanglement. In this book, the authors use holographic entanglement entropy as a tool to investigate AdS3/CFT2. They study the entanglement entropy at high temperature in field theory and in holographics, and show that the results match each other in classical and one-loop order. In the AdS3/CFT2 system, they examine in detail the correspondence, exploring the higher genus partition function, entanglement entropy in a general system and conformal block, and they find good correspondence in field theory and gravity. The result strongly supports AdS3/CFT2 correspondence. In addition, they develop several important techniques in 2d CFT and 3d gravity, which also offer inspiration for other fields.


Book
Fog/Edge computing for security, privacy, and applications
Authors: ---
ISBN: 3030573281 3030573273 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Keywords

Computer networks --- Computer security. --- Wireless communication systems. --- Mobile communication systems. --- Computer communication systems. --- Application software. --- Mobile and Network Security. --- Privacy. --- Wireless and Mobile Communication. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- Distributed processing --- Communication systems --- Protection --- Security measures --- Cloud computing --- Web services


Book
Mobile Crowdsourcing : From Theory to Practice
Authors: ---
ISBN: 3031323971 3031323963 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization. Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computation tasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.

Listing 1 - 10 of 44 << page
of 5
>>
Sort by