Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.
Kirjailija
Yan Zhu
Kirjat ja teokset yhdessä paikassa: 17 kirjaa, julkaisuja vuosilta 2016-2026, suosituimpien joukossa Revisiting the Frontiers of Analog and Mixed-Signal Integrated Circuits Architectures and Techniques towards the future Internet of Everything (IoE) Applications. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.
Rui P. Martins; Pui-In Mak; Sai-Weng Sin; Man-Kay Law; Yan Zhu; Yan Lu; Jun Yin; Chi-Hang Chan; Yong Chen; Ka-Fai Un; Mo Huang; Minglei Zhang; Yang Jiang; Wei-Han Yu
Technology-assisted People-to-People (P2P) interactions, embedded in a global environment, will be at the core of 21st century communications and will command the technological development of the forthcoming future. The intelligent interactivity of people, process (delivering the right information to the right person/machine at the right time), data and things, incorporates the Internet-of-Everything (IoE) that expands itself beyond the Internet-of-Things (IoT). In general, IoT comprises all physical or cyber objects (things) with an address that can transmit data (without human-to-machine interactions), while the IoE also involves communications among the users and the whole universe of electronic gadgets. Further, they both operate with data acquired from analog sources, thus connecting two different realities, the analog (physical/real) and the digital (cyber/virtual) worlds. Since the interface between the two realms deals with analog signals, its mandatory functions integrate several analog and mixed-signal sub-systems that include signal sensing, transmission and reception, frequency generation, energy harvesting, in-memory processing, data and power conversion. This publication presents state-of-the-art designs of the most critical building blocks of the analog/digital interface highlighting new and innovative circuit architectures and techniques. It addresses capacitive sensor interfaces, ultra-low-power wireless transceivers, key technologies for wireline transceivers, oscillators and frequency generators, integrated energy harvesting interfaces, in-memory processing, as well as, data and power converters, all exhibiting high quality performance with low power consumption, high energy-efficiency and high speed, thus enabling a reliable and consistent development of the IoE while enlarging its frontiers. In the coming decades, with the continuous evolution of electronics downscaling, the challenges that the above-mentioned sub-systems face will be tremendous in terms of the requirements for ultra-low power and ultra-high speed, obtained with the maximum energy-efficiency. Thus, the analog and mixed-signal very large scale integration area of work will continue to be an attractive field for research for design engineers both in the academia and in the industry, as it has been always the case since the emergence of silicon planar electronics 6 decades ago.
A seguran a dos ambientes de computa o em nuvem n o uma tarefa f cil. Os autores centram-se na seguran a do ambiente de computa o em nuvem com base em dois aspectos: o controlo do acesso e a defesa contra diferentes tipos de ataques. Os autores consideram a possibilidade de integrar os controladores de redes definidas por software (SDN) no ambiente de computa o em nuvem. Ao fazer esta integra o, a seguran a da nuvem foi melhorada, mas tamb m os controladores SDN s o vulner veis a diferentes tipos de ataques que t m de ser detectados e atenuados o mais rapidamente poss vel. De acordo com o modelo de controlo de acesso, o controlo de acesso baseado em atributos (ABAC) utilizado para a computa o em nuvem. Embora o ABAC seja o modelo de controlo de acesso mais recente para os ambientes de computa o em nuvem, ainda necessita de muitos contributos para poder lidar com a natureza distinta da computa o em nuvem.
Die Sicherung von Cloud-Computing-Umgebungen ist keine leichte Aufgabe. Die Autoren konzentrieren sich auf die Sicherung der Cloud-Umgebung auf der Grundlage von zwei Aspekten, der Zugriffskontrolle und der Abwehr verschiedener Arten von Angriffen. Die Autoren erw gen die Integration der Software-Defined Networking (SDN)-Controller in die Cloud-Umgebung. Durch diese Integration wurde die Cloud-Sicherheit verbessert, aber auch die SDN-Controller sind anf llig f r verschiedene Arten von Angriffen, die so schnell wie m glich erkannt und abgewehrt werden m ssen. Gem dem Zugriffskontrollmodell wird die Attributbasierte Zugriffskontrolle (ABAC) f r Cloud-Computing verwendet. Obwohl ABAC das aufstrebende Zugriffskontrollmodell f r Cloud-Computing-Umgebungen ist, sind noch viele Beitr ge erforderlich, um die besonderen Eigenschaften des Cloud-Computing zu bew ltigen.
Mettere in sicurezza gli ambienti di cloud computing non un compito facile. Gli autori si concentrano sulla sicurezza dell'ambiente cloud basata su due aspetti, il controllo degli accessi e la difesa da diversi tipi di attacchi. Gli autori considerano l'integrazione dei controller Software-Defined Networking (SDN) con l'ambiente cloud. Grazie a questa integrazione, la sicurezza del cloud stata migliorata, ma anche i controllori SDN sono vulnerabili a diversi tipi di attacchi che devono essere individuati e mitigati al pi presto. In base al modello di controllo degli accessi, per il cloud computing viene utilizzato l'Attribute Based Access Control (ABAC). Sebbene ABAC sia il modello di controllo degli accessi pi recente per gli ambienti di cloud computing, ha ancora bisogno di molti contributi per poter gestire la natura distinta del cloud computing.
La s curisation des environnements d'informatique en nuage n'est pas une t che facile. Les auteurs se concentrent sur la s curisation de l'environnement en nuage en se basant sur deux aspects, le contr le d'acc s et la d fense contre diff rents types d'attaques. Les auteurs envisagent d'int grer les contr leurs SDN (Software-Defined Networking) l'environnement cloud. Cette int gration a permis d'am liorer la s curit de l'environnement en nuage, mais les contr leurs SDN sont galement vuln rables diff rents types d'attaques qui doivent tre d tect es et att nu es au moment le plus proche. Selon le mod le de contr le d'acc s, le contr le d'acc s bas sur les attributs (ABAC) est utilis pour l'informatique en nuage. Bien que l'ABAC soit le mod le de contr le d'acc s le plus r cent pour les environnements d'informatique en nuage, il doit encore faire l'objet de nombreuses contributions pour pouvoir g rer la nature particuli re de l'informatique en nuage.
This book delves into the burgeoning field of space-ground integrated networks (SGINs), focusing on the evolution, architecture and application scenarios of large satellite constellations. As global communication demands surge, the next-generation SGINs are transitioning towards large-scale, hyperscale, and hierarchical constellations to address diverse user needs, such as ultra-long-haul, high-speed and instantaneous communications. Through an in-depth exploration of network working principles, traffic and link modeling, and performance analysis and optimization methods, this book offers substantial guidance to readers. It aims to uncover pathways for enhancing network service capability and to establish a solid theoretical foundation for the future development of mega-satellite constellations within the SGIN framework. Furthermore, this book provides a comprehensive analysis of SGINs, examining its network architecture, developmental trajectory and application scenarios. It delves into the core challenges faced by SGINs and proposes response strategies. This book introduces various methods for service capability modeling and quantitative performance analysis across different traffic types, emphasizing the intricate relationships between network performance, traffic patterns, nodes, links and network characteristics. Through an exhaustive study of large-scale satellite network operations, this book illuminates avenues for improving network service capacity, thereby paving the way for theoretical guidance and technical support for future ultra-large-scale SGINs. By offering systematic analyses and insights, this book aims to equip readers with a profound understanding and practical guidance for SGIN network planning and optimization. It also highlights future trends and potential application scenarios in the evolving landscape of network technology. This book targets advanced level students, professors, researchers and scientists working in the fields of telecommunications, satellite communications and network engineering, who wish to gain an in-depth understanding of SGIN principles, performance analysis and optimization techniques. Practitioners working in aerospace or telecommunications policy making to gain insights into future trends and challenges in satellite network design and optimization will want to purchase this book as well.
Taking a psycholinguistic perspective, this book investigates how second language (L2) learners’ pragmatic abilities in English can be measured. It complements and extends earlier work on the testing of implicit and explicit grammar. The authors present a set of tests they developed using both well-established methods of measuring pragmatic knowledge (e.g. a Metapragmatic Knowledge Test and role plays) and more original tests (e.g. an Irony Test and an Elicited Imitation Test). They explain the development of the tests and report the results of their work with native speakers of English and Chinese and Japanese L2 learners. A confirmatory factor analysis lends support to the theoretical basis of the tests. The authors also report studies that explored the use of the tests to investigate L2 linguistic proficiency, study abroad and formal instruction. In concluding, they consider the strengths and limitations of the tests and propose some directions for future research.
Taking a psycholinguistic perspective, this book investigates how second language (L2) learners’ pragmatic abilities in English can be measured. It complements and extends earlier work on the testing of implicit and explicit grammar. The authors present a set of tests they developed using both well-established methods of measuring pragmatic knowledge (e.g. a Metapragmatic Knowledge Test and role plays) and more original tests (e.g. an Irony Test and an Elicited Imitation Test). They explain the development of the tests and report the results of their work with native speakers of English and Chinese and Japanese L2 learners. A confirmatory factor analysis lends support to the theoretical basis of the tests. The authors also report studies that explored the use of the tests to investigate L2 linguistic proficiency, study abroad and formal instruction. In concluding, they consider the strengths and limitations of the tests and propose some directions for future research.
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of ABE schemes and novel ABE-enabled research and applications. The specific focus is to present the development of using new ABE features such as group-based access, ID-based revocation, and attributes management functions such as delegation, federation, and interoperability. These new capabilities can build a new ABE-based Attribute-Based Access Control (ABAC) solution that can incorporate data access policies and control into ciphertext. This book is also ideal for IT companies to provide them with the most recent technologies and research on how to implement data access control models for mobile and data-centric applications, where data access control does not need to rely on a fixed access control infrastructure. It’s also of interested to those working in security, to enable them to have the most recent developments in data access control such as ICN and Blockchain technologies.Features Covers cryptographic background knowledge for ABE and ABAC Features various ABE constructions to achieve integrated access control capabilities Offers a comprehensive coverage of ABE-based ABAC Provides ABE applications with real-world examples Advances the ABE research to support new mobile and data-centric applications
This book offers a comprehensive overview of the changes in foreign language teachers' cognition and practices during a four-year innovation project at a Chinese secondary school, and explores the factors that influenced the trajectory of those changes. It makes a substantial contribution to research on educational change by offering a longitudinal observation of the facts and voices in EFL settings in China; as such, the book offers a valuable resource for scholars, teacher educators, teachers, and others interested in initiating, managing and evaluating innovations in EFL classrooms.
This book offers a comprehensive overview of the changes in foreign language teachers' cognition and practices during a four-year innovation project at a Chinese secondary school, and explores the factors that influenced the trajectory of those changes. It makes a substantial contribution to research on educational change by offering a longitudinal observation of the facts and voices in EFL settings in China; as such, the book offers a valuable resource for scholars, teacher educators, teachers, and others interested in initiating, managing and evaluating innovations in EFL classrooms.