Advances in computing systems and applications: proceedings of the 3rd Conference on Computing Systems and Applications
General Material Designation
[electronic resources]
First Statement of Responsibility
/ Edited by Oualid Demigha, Badis Djamaa, Abdenour Amamra.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
New York, NY :
Name of Publisher, Distributor, etc.
Springer Berlin Heidelberg,
Date of Publication, Distribution, etc.
2018.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
xiv, 334 pages.
Other Physical Details
: illustrations (chiefly color), tables.
SERIES
Series Title
Lecture notes in networks and systems, 50.
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Intro; Preface; Organization; Steering Committee; Website Chair; Exhibitions and Demos Chair; Local Organizing Committee; Technical Program Committee; Contents; IoT, Computer Network and Security; Formal Modeling of Cyber-Physical Systems: Lessons Learn from Refinement and Proof Based Methods; Abstract; Scheduling Algorithms for IEEE 802.15.4 TSCH Networks: A Survey; 1 Introduction; 2 Towards the IEEE802.15.4e Standard; 3 TSCH: The New MAC Behavior; 4 How to Build a Schedule?; 4.1 Centralized Scheduling; 4.2 Distributed Scheduling; 4.3 Autonomous Scheduling; 5 Open Research Issues 6 ConclusionReferences; Task Scheduling in Cloud Computing Environment: A Comprehensive Analysis; 1 Introduction; 2 Related Works; 3 Scheduling Problem Analysis; 3.1 Definition; 3.2 Scheduling Processes; 4 Task Scheduling Types in Cloud; 4.1 Job Scheduling; 4.2 Workflow Scheduling; 4.3 VM Scheduling; 4.4 Storage Scheduling; 5 Tasks Scheduling Approaches Classification; 5.1 Heuristic; 5.2 Numerical Method-Based Scheduling; 5.3 Numerical Approximate Method-Based Scheduling; 5.4 Searching Graph Method-Based Scheduling; 5.5 Hybrid Method-Based Scheduling; 5.6 Linear Programming; 6 Conclusion 1 Introduction2 Related Work; 3 The Proposed Architecture; 3.1 Overall Architecture; 3.2 The Architecture in Details; 4 Delay Lowering Mechanism; 4.1 Resource-Directory Level; 4.2 Resource-Directory Level; 5 Performance Evaluation; 5.1 Evaluation Methodology and Metrics; 5.2 Results and Discussions; 6 Conclusion and Future Work; References; Dynamic Clustering for IoT Key Management in Hostile Application Area; Abstract; 1 Introduction; 2 Overview; 2.1 Key Types; 2.2 Protocol Scheme; 2.3 Implemented Improvements; 3 Implementation; 3.1 System Setup; 3.2 Pairwise Key Generation 3.3 Cluster Forming3.4 Key Updating; 3.5 Node Movement; 3.6 Node Revocation; 4 Performance Analysis; 5 Conclusion and Future Works; References; Towards a New Framework for Service Composition in the Internet of Things; 1 Introduction; 2 Related Work; 3 Proposed IoT Framework Overview; 3.1 IoT Target Block Definition Diagram; 3.2 IoT User Block Definition Diagram; 3.3 IoT Device Block Definition Diagram; 3.4 IoT Service Platform Block Definition Diagram; 4 Proposed IoT Framework: An e-Health Use Case Scenario; 5 Detailed Description of the Reasoner Module
0
SUMMARY OR ABSTRACT
Text of Note
This book gathers selected papers presented at the 3rd Conference on Computing Systems and Applications (CSA’2018), held at the Ecole Militaire Polytechnique, Algiers, Algeria on April 24–25, 2018. The CSA’2018 constitutes a leading forum for exchanging, discussing and leveraging modern computer systems technology in such varied fields as: data science, computer networks and security, information systems and software engineering, and computer vision. The contributions presented here will help promote and advance the adoption of computer science technologies in industrial, entertainment, social, and everyday applications. Though primarily intended for students, researchers, engineers and practitioners working in the field, it will also benefit a wider audience interested in the latest developments in the computer sciences.
TOPICAL NAME USED AS SUBJECT
Entry Element
هوش کامپیوتری
Entry Element
Computational intelligence
Entry Element
هوش مصنوعی
Entry Element
Artificial intelligence
a03
a03
a05
a05
UNCONTROLLED SUBJECT TERMS
Subject Term
Computing Systems.
Subject Term
Computing applications.
PERSONAL NAME - SECONDARY RESPONSIBILITY
Relator Code
Editor
Relator Code
Editor
Relator Code
Editor
Demigha, Oualid,
Djamaa, Badis,
Amamra, Abdenour,
CORPORATE BODY NAME - PRIMARY RESPONSIBILITY
Entry Element
Conference on Computing Systems and Applications (3rd : 2008 : Algiers, Algeria).