Author: Roman Oliynykov
Publisher: Springer Nature
ISBN: 3030951618
Category : Computers
Languages : en
Pages : 315
Book Description
The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
Information Security Technologies in the Decentralized Distributed Networks
Author: Roman Oliynykov
Publisher: Springer Nature
ISBN: 3030951618
Category : Computers
Languages : en
Pages : 315
Book Description
The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
Publisher: Springer Nature
ISBN: 3030951618
Category : Computers
Languages : en
Pages : 315
Book Description
The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.
Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities
Author: Asharaf, S.
Publisher: IGI Global
ISBN: 1522521941
Category : Computers
Languages : en
Pages : 135
Book Description
Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in block chain innovation and their application in contractual agreements. Highlighting pivotal discussions on topics such as cryptography, programming techniques, and decentralized computing, this book is an ideal publication for researchers, academics, professionals, students, and practitioners seeking content on utilizing block chains with smart contracts.
Publisher: IGI Global
ISBN: 1522521941
Category : Computers
Languages : en
Pages : 135
Book Description
Recent innovations have created significant developments in data storage and management. These new technologies now allow for greater security in databases and other applications. Decentralized Computing Using Blockchain Technologies and Smart Contracts: Emerging Research and Opportunities is a concise and informative source of academic research on the latest developments in block chain innovation and their application in contractual agreements. Highlighting pivotal discussions on topics such as cryptography, programming techniques, and decentralized computing, this book is an ideal publication for researchers, academics, professionals, students, and practitioners seeking content on utilizing block chains with smart contracts.
Blockchains for Network Security
Author: Haojun Huang
Publisher: Institution of Engineering and Technology
ISBN: 1785618733
Category : Computers
Languages : en
Pages : 336
Book Description
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
Publisher: Institution of Engineering and Technology
ISBN: 1785618733
Category : Computers
Languages : en
Pages : 336
Book Description
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger for storing all committed transactions in trustless environments by integrating several core technologies such as cryptographic hash, digital signature and distributed consensus mechanisms.
Distributed Systems Security
Author: Abhijit Belapurkar
Publisher: John Wiley & Sons
ISBN: 9780470751770
Category : Technology & Engineering
Languages : en
Pages : 334
Book Description
How to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization – form the backbone of today’s distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies. Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today’s distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model –host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverage of security threats and issues across these tiers. Additionally the authors describe the approaches required for efficient security engineering, alongside exploring how existing solutions can be leveraged or enhanced to proactively meet the dynamic needs of security for the next-generation distributed systems. The practical issues thereof are reinforced via practical case studies. Distributed Systems Security: Presents an overview of distributed systems security issues, including threats, trends, standards and solutions. Discusses threats and vulnerabilities in different layers namely the host, infrastructure, application, and service layer to provide a holistic and practical, contemporary view of enterprise architectures. Provides practical insights into developing current-day distributed systems security using realistic case studies. This book will be of invaluable interest to software engineers, developers, network professionals and technical/enterprise architects working in the field of distributed systems security. Managers and CIOs, researchers and advanced students will also find this book insightful.
Publisher: John Wiley & Sons
ISBN: 9780470751770
Category : Technology & Engineering
Languages : en
Pages : 334
Book Description
How to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization – form the backbone of today’s distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies. Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today’s distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model –host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverage of security threats and issues across these tiers. Additionally the authors describe the approaches required for efficient security engineering, alongside exploring how existing solutions can be leveraged or enhanced to proactively meet the dynamic needs of security for the next-generation distributed systems. The practical issues thereof are reinforced via practical case studies. Distributed Systems Security: Presents an overview of distributed systems security issues, including threats, trends, standards and solutions. Discusses threats and vulnerabilities in different layers namely the host, infrastructure, application, and service layer to provide a holistic and practical, contemporary view of enterprise architectures. Provides practical insights into developing current-day distributed systems security using realistic case studies. This book will be of invaluable interest to software engineers, developers, network professionals and technical/enterprise architects working in the field of distributed systems security. Managers and CIOs, researchers and advanced students will also find this book insightful.
Blockchain Security in Cloud Computing
Author: K.M. Baalamurugan
Publisher: Springer Nature
ISBN: 3030705013
Category : Technology & Engineering
Languages : en
Pages : 317
Book Description
This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.
Publisher: Springer Nature
ISBN: 3030705013
Category : Technology & Engineering
Languages : en
Pages : 317
Book Description
This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.
Advances in Computer Science and Ubiquitous Computing
Author: Doo-Soon Park
Publisher: Springer
ISBN: 9811002819
Category : Computers
Languages : en
Pages : 883
Book Description
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
Publisher: Springer
ISBN: 9811002819
Category : Computers
Languages : en
Pages : 883
Book Description
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
Mastering Disruptive Technologies
Author: Dr. R. K. Dhanaraj
Publisher: HP Hamilton Limited, U.K.
ISBN: 1913936236
Category : Computers
Languages : en
Pages : 371
Book Description
About the Book: The book is divided into 4 modules which consist of 21 chapters, that narrates briefly about the top five recent emerging trends such as: Cloud Computing, Internet of Things (IoT), Blockchain, Artificial Intelligence, and Machine Learning. At the end of each module, authors have provided two Appendices. One is Job oriented short-type questions with answers, and the second one provide us different MCQs with their keys. Salient Features of the Book: Detailed Coverage on Topics like: Introduction to Cloud Computing, Cloud Architecture, Cloud Applications, Cloud Platforms, Open-Source Cloud Simulation Tools, and Mobile Cloud Computing. Expanded Coverage on Topics like: Introduction to IoT, Architecture, Core Modules, Communication models and protocols, IoT Environment, IoT Testing, IoT and Cloud Computing. Focused Coverage on Topics like: Introduction to Blockchain Technology, Security and Privacy component of Blockchain Technology, Consensus Algorithms, Blockchain Development Platform, and Various Applications. Dedicated Coverage on Topics like: Introduction to Artificial Intelligence and Machine Learning Techniques, Types of Machine Learning, Clustering Algorithms, K-Nearest Neighbor Algorithm, Artificial Neural Network, Deep Learning, and Applications of Machine Learning. Pictorial Two-Minute Drill to Summarize the Whole Concept. Inclusion of 300 Job Oriented Short Type Questions with Answers for the aspirants to have the Thoroughness, Practice and Multiplicity. Around 178 Job Oriented MCQs with their keys. Catch Words and Questions on Self-Assessment at Chapter-wise Termination. About the Authors: Dr. Rajesh Kumar Dhanaraj is an Associate Professor in the School of Computing Science and Engineering at Galgotias University, Greater Noida, Uttar Pradesh, India. He holds a Ph.D. degree in Information and Communication Engineering from Anna University Chennai, India. He has published more than 20 authored and edited books on various emerging technologies and more than 35 articles in various peer-reviewed journals and international conferences and contributed chapters to the books. His research interests include Machine Learning, Cyber-Physical Systems and Wireless Sensor Networks. He is an expert advisory panel member of Texas Instruments Inc. USA. Mr. Soumya Ranjan Jena is currently working as an Assistant Professor in the Department of CSE, School of Computing at Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science & Technology, Avadi, Chennai, Tamil Nadu, India. He has teaching and research experience from various reputed institutions in India like Galgotias University, Greater Noida, Uttar Pradesh, AKS University, Satna, Madhya Pradesh, K L Deemed to be University, Guntur, Andhra Pradesh, GITA (Autonomous), Bhubaneswar, Odisha. He has been awarded M.Tech in Information Technology from Utkal University, Odisha, B.Tech in Computer Science & Engineering from BPUT, Odisha, and Cisco Certified Network Associate (CCNA) from Central Tool Room and Training Centre (CTTC), Bhubaneswar, Odisha. He has got the immense experience to teach to graduate as well as post-graduate students and author of two books i.e. “Theory of Computation and Application” and “Design and Analysis of Algorithms”. He has published more than 25 research papers on Cloud Computing, IoT in various international journals and conferences which are indexed by Scopus, Web of Science, and also published six patents out of which one is granted in Australia. Mr. Ashok Kumar Yadav is currently working as Dean Academics and Assistant Professor at Rajkiya Engineering College, Azamgarh, Uttar Pradesh. He has worked as an Assistant Professor (on Ad-hoc) in the Department of Computer Science, University of Delhi. He has also worked with Cluster Innovation Center, University of Delhi, New Delhi. He qualified for UGC-JRF. Presently, he is pursuing his Ph.D. in Computer Science from JNU, New Delhi. He has received M.Tech in Computer Science and Technology from JNU, New Delhi. He has presented and published papers at international conferences and journals on blockchain technology and machine learning. He has delivered various expert lectures on reputed institutes. Ms. Vani Rajasekar completed B. Tech (Information Technology), M. Tech (Information and Cyber warfare) in Department of Information Technology, Kongu Engineering College, Erode, Tamil Nadu, India. She is pursuing her Ph.D. (Information and Communication Engineering) in the area of Biometrics and Network security. Presently she is working as an Assistant professor in the Department of Computer Science and Engineering, Kongu Engineering College Erode, Tamil Nadu, India for the past 5 years. Her areas of interest include Cryptography, Biometrics, Network Security, and Wireless Networks. She has authored around 20 research papers and book chapters published in various international journals and conferences which were indexed in Scopus, Web of Science, and SCI.
Publisher: HP Hamilton Limited, U.K.
ISBN: 1913936236
Category : Computers
Languages : en
Pages : 371
Book Description
About the Book: The book is divided into 4 modules which consist of 21 chapters, that narrates briefly about the top five recent emerging trends such as: Cloud Computing, Internet of Things (IoT), Blockchain, Artificial Intelligence, and Machine Learning. At the end of each module, authors have provided two Appendices. One is Job oriented short-type questions with answers, and the second one provide us different MCQs with their keys. Salient Features of the Book: Detailed Coverage on Topics like: Introduction to Cloud Computing, Cloud Architecture, Cloud Applications, Cloud Platforms, Open-Source Cloud Simulation Tools, and Mobile Cloud Computing. Expanded Coverage on Topics like: Introduction to IoT, Architecture, Core Modules, Communication models and protocols, IoT Environment, IoT Testing, IoT and Cloud Computing. Focused Coverage on Topics like: Introduction to Blockchain Technology, Security and Privacy component of Blockchain Technology, Consensus Algorithms, Blockchain Development Platform, and Various Applications. Dedicated Coverage on Topics like: Introduction to Artificial Intelligence and Machine Learning Techniques, Types of Machine Learning, Clustering Algorithms, K-Nearest Neighbor Algorithm, Artificial Neural Network, Deep Learning, and Applications of Machine Learning. Pictorial Two-Minute Drill to Summarize the Whole Concept. Inclusion of 300 Job Oriented Short Type Questions with Answers for the aspirants to have the Thoroughness, Practice and Multiplicity. Around 178 Job Oriented MCQs with their keys. Catch Words and Questions on Self-Assessment at Chapter-wise Termination. About the Authors: Dr. Rajesh Kumar Dhanaraj is an Associate Professor in the School of Computing Science and Engineering at Galgotias University, Greater Noida, Uttar Pradesh, India. He holds a Ph.D. degree in Information and Communication Engineering from Anna University Chennai, India. He has published more than 20 authored and edited books on various emerging technologies and more than 35 articles in various peer-reviewed journals and international conferences and contributed chapters to the books. His research interests include Machine Learning, Cyber-Physical Systems and Wireless Sensor Networks. He is an expert advisory panel member of Texas Instruments Inc. USA. Mr. Soumya Ranjan Jena is currently working as an Assistant Professor in the Department of CSE, School of Computing at Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science & Technology, Avadi, Chennai, Tamil Nadu, India. He has teaching and research experience from various reputed institutions in India like Galgotias University, Greater Noida, Uttar Pradesh, AKS University, Satna, Madhya Pradesh, K L Deemed to be University, Guntur, Andhra Pradesh, GITA (Autonomous), Bhubaneswar, Odisha. He has been awarded M.Tech in Information Technology from Utkal University, Odisha, B.Tech in Computer Science & Engineering from BPUT, Odisha, and Cisco Certified Network Associate (CCNA) from Central Tool Room and Training Centre (CTTC), Bhubaneswar, Odisha. He has got the immense experience to teach to graduate as well as post-graduate students and author of two books i.e. “Theory of Computation and Application” and “Design and Analysis of Algorithms”. He has published more than 25 research papers on Cloud Computing, IoT in various international journals and conferences which are indexed by Scopus, Web of Science, and also published six patents out of which one is granted in Australia. Mr. Ashok Kumar Yadav is currently working as Dean Academics and Assistant Professor at Rajkiya Engineering College, Azamgarh, Uttar Pradesh. He has worked as an Assistant Professor (on Ad-hoc) in the Department of Computer Science, University of Delhi. He has also worked with Cluster Innovation Center, University of Delhi, New Delhi. He qualified for UGC-JRF. Presently, he is pursuing his Ph.D. in Computer Science from JNU, New Delhi. He has received M.Tech in Computer Science and Technology from JNU, New Delhi. He has presented and published papers at international conferences and journals on blockchain technology and machine learning. He has delivered various expert lectures on reputed institutes. Ms. Vani Rajasekar completed B. Tech (Information Technology), M. Tech (Information and Cyber warfare) in Department of Information Technology, Kongu Engineering College, Erode, Tamil Nadu, India. She is pursuing her Ph.D. (Information and Communication Engineering) in the area of Biometrics and Network security. Presently she is working as an Assistant professor in the Department of Computer Science and Engineering, Kongu Engineering College Erode, Tamil Nadu, India for the past 5 years. Her areas of interest include Cryptography, Biometrics, Network Security, and Wireless Networks. She has authored around 20 research papers and book chapters published in various international journals and conferences which were indexed in Scopus, Web of Science, and SCI.
Smart Sensor Networks Using AI for Industry 4.0
Author: Soumya Ranjan Nayak
Publisher: CRC Press
ISBN: 1000458512
Category : Computers
Languages : en
Pages : 263
Book Description
Smart Sensor Networks (WSNs) using AI have left a mark on the lives of all by aiding in various sectors, such as manufacturing, education, healthcare, and monitoring of the environment and industries. This book covers recent AI applications and explores aspects of modern sensor technologies and the systems needed to operate them. The book reviews the fundamental concepts of gathering, processing, and analyzing different AI-based models and methods. It covers recent WSN techniques for the purpose of effective network management on par with the standards laid out by international organizations in related fields and focuses on both core concepts along with major applicational areas. The book will be used by technical developers, academicians, data sciences, industrial professionals, researchers, and students interested in the latest innovations on problem-oriented processing techniques in sensor networks using IoT and evolutionary computer applications for Industry 4.0.
Publisher: CRC Press
ISBN: 1000458512
Category : Computers
Languages : en
Pages : 263
Book Description
Smart Sensor Networks (WSNs) using AI have left a mark on the lives of all by aiding in various sectors, such as manufacturing, education, healthcare, and monitoring of the environment and industries. This book covers recent AI applications and explores aspects of modern sensor technologies and the systems needed to operate them. The book reviews the fundamental concepts of gathering, processing, and analyzing different AI-based models and methods. It covers recent WSN techniques for the purpose of effective network management on par with the standards laid out by international organizations in related fields and focuses on both core concepts along with major applicational areas. The book will be used by technical developers, academicians, data sciences, industrial professionals, researchers, and students interested in the latest innovations on problem-oriented processing techniques in sensor networks using IoT and evolutionary computer applications for Industry 4.0.
Signal and Information Processing, Networking and Computers
Author: Songlin Sun
Publisher: Springer Nature
ISBN: 9811947759
Category : Technology & Engineering
Languages : en
Pages : 1294
Book Description
This book collects selected papers from the 9th Conference on Signal and Information Processing, Networking and Computers held online, in December, 2021. The book focuses on the current works of information theory, communication system, computer science, aerospace technologies, big data and other related technologies. Readers from both academia and industry of this field can contribute and find their interests from the book.
Publisher: Springer Nature
ISBN: 9811947759
Category : Technology & Engineering
Languages : en
Pages : 1294
Book Description
This book collects selected papers from the 9th Conference on Signal and Information Processing, Networking and Computers held online, in December, 2021. The book focuses on the current works of information theory, communication system, computer science, aerospace technologies, big data and other related technologies. Readers from both academia and industry of this field can contribute and find their interests from the book.
Parallel and Distributed Processing and Applications
Author: Jiannong Cao
Publisher: Springer
ISBN: 3540305661
Category : Computers
Languages : en
Pages : 1080
Book Description
Welcometotheproceedingsofthe2ndInternationalSymposiumonParalleland Distributed Processing and Applications (ISPA2004) which was held in Hong Kong, China, 13–15 December, 2004. With the advance of computer networks and hardware technology, parallel and distributed processing has become a key technology which plays an imp- tant part in determining future research and development activities in many academic and industrial branches. It provides a means to solve computati- ally intensive problems by improving processing speed. It is also the only - ableapproachtobuildinghighlyreliableandinherentlydistributedapplications. ISPA2004 provided a forum for scientists and engineers in academia and ind- try to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of parallel and distributed computing. There was a very large number of paper submissions (361) from 26 countries and regions, including not only Asia and the Paci?c, but also Europe and North America. All submissions were reviewed by at least three program or technical committee members or external reviewers. It was extremely di?cult to select the presentations for the conference because there were so many excellent and interesting submissions. In order to allocate as many papers as possible and keep the high quality of the conference, we ?nally decided to accept 78 regular papers and 38 short papers for oral technical presentations. We believe that all of these papers and topics not only provide novel ideas, new results, work in progress and state-of-the-art techniques in this ?eld, but also stimulate the future research activities in the area of parallel and distributed computing with applications.
Publisher: Springer
ISBN: 3540305661
Category : Computers
Languages : en
Pages : 1080
Book Description
Welcometotheproceedingsofthe2ndInternationalSymposiumonParalleland Distributed Processing and Applications (ISPA2004) which was held in Hong Kong, China, 13–15 December, 2004. With the advance of computer networks and hardware technology, parallel and distributed processing has become a key technology which plays an imp- tant part in determining future research and development activities in many academic and industrial branches. It provides a means to solve computati- ally intensive problems by improving processing speed. It is also the only - ableapproachtobuildinghighlyreliableandinherentlydistributedapplications. ISPA2004 provided a forum for scientists and engineers in academia and ind- try to exchange and discuss their experiences, new ideas, research results, and applications about all aspects of parallel and distributed computing. There was a very large number of paper submissions (361) from 26 countries and regions, including not only Asia and the Paci?c, but also Europe and North America. All submissions were reviewed by at least three program or technical committee members or external reviewers. It was extremely di?cult to select the presentations for the conference because there were so many excellent and interesting submissions. In order to allocate as many papers as possible and keep the high quality of the conference, we ?nally decided to accept 78 regular papers and 38 short papers for oral technical presentations. We believe that all of these papers and topics not only provide novel ideas, new results, work in progress and state-of-the-art techniques in this ?eld, but also stimulate the future research activities in the area of parallel and distributed computing with applications.