• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Advances in computing systems and applications: proceedings of the 3rd Conference on Computing Systems and Applications

پدید آورنده
/ Edited by Oualid Demigha, Badis Djamaa, Abdenour Amamra.

موضوع
هوش کامپیوتری,Computational intelligence,هوش مصنوعی,Artificial intelligence,a03,a03,a05,a05,Computing Systems.,Computing applications.

رده

کتابخانه
Central library and document university of Kurdistan

محل استقرار
استان: Kurdistan ـ شهر: Sanandaj

Central library and document university of Kurdistan

تماس با کتابخانه : 9-08733624006و 08733664600

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
978-3-319-98351-6
(Number (ISBN
978-3-319-98352-3 (eBook)

NATIONAL BIBLIOGRAPHY NUMBER

Number
3816

LANGUAGE OF THE ITEM

.Language of Text, Soundtrack etc
انگلیسی

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Advances in computing systems and applications: proceedings of the 3rd Conference on Computing Systems and Applications
General Material Designation
[electronic resources]
First Statement of Responsibility
/ Edited by Oualid Demigha, Badis Djamaa, Abdenour Amamra.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
New York, NY :
Name of Publisher, Distributor, etc.
Springer Berlin Heidelberg,
Date of Publication, Distribution, etc.
2018.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
xiv, 334 pages.
Other Physical Details
: illustrations (chiefly color), tables.

SERIES

Series Title
Lecture notes in networks and systems, 50.

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Intro; Preface; Organization; Steering Committee; Website Chair; Exhibitions and Demos Chair; Local Organizing Committee; Technical Program Committee; Contents; IoT, Computer Network and Security; Formal Modeling of Cyber-Physical Systems: Lessons Learn from Refinement and Proof Based Methods; Abstract; Scheduling Algorithms for IEEE 802.15.4 TSCH Networks: A Survey; 1 Introduction; 2 Towards the IEEE802.15.4e Standard; 3 TSCH: The New MAC Behavior; 4 How to Build a Schedule?; 4.1 Centralized Scheduling; 4.2 Distributed Scheduling; 4.3 Autonomous Scheduling; 5 Open Research Issues 6 ConclusionReferences; Task Scheduling in Cloud Computing Environment: A Comprehensive Analysis; 1 Introduction; 2 Related Works; 3 Scheduling Problem Analysis; 3.1 Definition; 3.2 Scheduling Processes; 4 Task Scheduling Types in Cloud; 4.1 Job Scheduling; 4.2 Workflow Scheduling; 4.3 VM Scheduling; 4.4 Storage Scheduling; 5 Tasks Scheduling Approaches Classification; 5.1 Heuristic; 5.2 Numerical Method-Based Scheduling; 5.3 Numerical Approximate Method-Based Scheduling; 5.4 Searching Graph Method-Based Scheduling; 5.5 Hybrid Method-Based Scheduling; 5.6 Linear Programming; 6 Conclusion 1 Introduction2 Related Work; 3 The Proposed Architecture; 3.1 Overall Architecture; 3.2 The Architecture in Details; 4 Delay Lowering Mechanism; 4.1 Resource-Directory Level; 4.2 Resource-Directory Level; 5 Performance Evaluation; 5.1 Evaluation Methodology and Metrics; 5.2 Results and Discussions; 6 Conclusion and Future Work; References; Dynamic Clustering for IoT Key Management in Hostile Application Area; Abstract; 1 Introduction; 2 Overview; 2.1 Key Types; 2.2 Protocol Scheme; 2.3 Implemented Improvements; 3 Implementation; 3.1 System Setup; 3.2 Pairwise Key Generation 3.3 Cluster Forming3.4 Key Updating; 3.5 Node Movement; 3.6 Node Revocation; 4 Performance Analysis; 5 Conclusion and Future Works; References; Towards a New Framework for Service Composition in the Internet of Things; 1 Introduction; 2 Related Work; 3 Proposed IoT Framework Overview; 3.1 IoT Target Block Definition Diagram; 3.2 IoT User Block Definition Diagram; 3.3 IoT Device Block Definition Diagram; 3.4 IoT Service Platform Block Definition Diagram; 4 Proposed IoT Framework: An e-Health Use Case Scenario; 5 Detailed Description of the Reasoner Module
0

SUMMARY OR ABSTRACT

Text of Note
This book gathers selected papers presented at the 3rd Conference on Computing Systems and Applications (CSA’2018), held at the Ecole Militaire Polytechnique, Algiers, Algeria on April 24–25, 2018. The CSA’2018 constitutes a leading forum for exchanging, discussing and leveraging modern computer systems technology in such varied fields as: data science, computer networks and security, information systems and software engineering, and computer vision. The contributions presented here will help promote and advance the adoption of computer science technologies in industrial, entertainment, social, and everyday applications. Though primarily intended for students, researchers, engineers and practitioners working in the field, it will also benefit a wider audience interested in the latest developments in the computer sciences.

TOPICAL NAME USED AS SUBJECT

Entry Element
هوش کامپیوتری
Entry Element
Computational intelligence
Entry Element
هوش مصنوعی
Entry Element
Artificial intelligence
a03
a03
a05
a05

UNCONTROLLED SUBJECT TERMS

Subject Term
Computing Systems.
Subject Term
Computing applications.

PERSONAL NAME - SECONDARY RESPONSIBILITY

Relator Code
Editor
Relator Code
Editor
Relator Code
Editor
Demigha, Oualid,
Djamaa, Badis,
Amamra, Abdenour,

CORPORATE BODY NAME - PRIMARY RESPONSIBILITY

Entry Element
Conference on Computing Systems and Applications (3rd : 2008 : Algiers, Algeria).

ORIGINATING SOURCE

Country
ایران
Agency
Central Library of the Kurdistan University
Date of Transaction
20190729131159.0
Cataloguing Rules (Descriptive Conventions))
rda

e

BL
280328

a
Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival