Cloud Computing and Security: 3rd International Conference, Part I Front Cover

Cloud Computing and Security: 3rd International Conference, Part I

  • Length: 565 pages
  • Edition: 1st ed. 2017
  • Publisher:
  • Publication Date: 2017-12-05
  • ISBN-10: 331968504X
  • ISBN-13: 9783319685045
Description

Cloud Computing and Security: Third International Conference, ICCCS 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part I (Lecture Notes in Computer Science)

This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.

The 116 full papers and 11 short papers of these volumes were carefully reviewed and selected from 391 submissions. The papers are organized in  topical sections such as: information hiding; cloud computing;  IOT applications; information security; multimedia applications; optimization and classification.

Table of Contents

Chapter 1. Print-Scan Resilient Binary Map Watermarking Based on Extended Additive Noise Model and Scrambling
Chapter 2. A New Universal Quantum Gates and Its Simulation on GPGPU
Chapter 3. Data Hiding-Based Video Error Concealment Method Using Compressed Sensing
Chapter 4. A Novel Robust Reversible Watermarking Scheme Based on IWT
Chapter 5. An Improved Reversible Information Hiding Scheme Based on AMBTC Compressed Images
Chapter 6. An Efficient Copy-Move Detection Algorithm Based on Superpixel Segmentation and Harris Key-Points
Chapter 7. Improved CMD Adaptive Image Steganography Method
Chapter 8. Quantum Computer Simulation on GPU Cluster Incorporating Data Locality
Chapter 9. Tampering Detection in Oral History Video Using Watermarking
Chapter 10. Steganalysis with CNN Using Multi-channels Filtered Residuals
Chapter 11. Coverless Text Information Hiding Method Using the Frequent Words Distance
Chapter 12. Improved STDM Watermarking Using Semantic Information-Based JND Model
Chapter 13. The Categories of Quantum Information Hiding Protocol
Chapter 14. Coverless Information Hiding Technology Research Based on News Aggregation
Chapter 15. SIEM Based on Big Data Analysis
Chapter 16. Workload-Aware VM Consolidation in Cloud Based on Max-Min Ant System
Chapter 17. Parallel Service Selection Method Based on Adaptive Cloud Model for Mobile Application
Chapter 18. A Hybrid Artificial Bee Colony Algorithm to Solve Multi-objective Hybrid Flowshop in Cloud Computing Systems
Chapter 19. A Group-Based Replica Consistency Schema for Cloud Storage
Chapter 20. A Multi-objective Optimization Scheduling Method Based on the Improved Differential Evolution Algorithm in Cloud Computing
Chapter 21. A Network Calculus Analysis for the Baseband Processing Capacity in Cloud Radio Access Network
Chapter 22. Live Migration Among CloudBased on MOOSE Address
Chapter 23. Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications
Chapter 24. Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model
Chapter 25. An Affective Computing and Fuzzy Logic Framework to Recognize Affect for Cloud-based E-Learning Envi …
Chapter 26. Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms – A Survey
Chapter 27. Design and Deployment of Wireless Sensor Networks for Flood Detection in Indonesia
Chapter 28. An Android App Recommendation Approach by Merging Network Traffic Cost
Chapter 29. A Virtual Grid-Based Routing Protocol for Mobile Sink-Based WSNs
Chapter 30. Low-Energy Security-Enhanced Routing Protocol Based on DBSCAN Partition
Chapter 31. Power Consuming Activity Recognition in Home Environment
Chapter 32. A Pre-partition Based Uneven Clustering Multi-hop Routing Protocol
Chapter 33. A Credibility Evaluation Method in Opportunistic Networks
Chapter 34. Unsupervised Energy Disaggregation of Home Appliances
Chapter 35. Planar-Based Visual Positioning for a Mobile Robot with Monocular Vision
Chapter 36. Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey
Chapter 37. A Particle Swarm Optimization and Mutation Operator Based Node Deployment Strategy for WSNs
Chapter 38. A Distributed Sparse Signal Reconstruction Algorithm in Wireless Sensor Network
Chapter 39. An Energy-Efficiency Routing Scheme Based on Clusters with a Mobile Sink for WSNs
Chapter 40. Energy-Efficient Power Control and Resource Allocation for D2D Communications in Underlaying Cellular Networks
Chapter 41. Virtual Machine Placement Based on Metaheuristic for IoT Cloud
Chapter 42. A Novel Kalman Filter Based NLOS Localization Method for Wireless Sensor Networks
Chapter 43. An Improved Localization Algorithm for Anisotropic Sensor Networks
Chapter 44. Further Results on Finite-Time Stability of Switched Static Neural Networks
Chapter 45. An Improved Artificial Immune Network Based on the Secondary Immune Mechanism for Data Clustering
Chapter 46. Analysis of User’s Abnormal Behavior Based on Behavior Sequence in Enterprise Network
Chapter 47. An Efficient Speeding up Algorithm of Frobenius Based Scalar Multiplication on Koblitz Curves for Cloud Computing
Chapter 48. Consensus of Multi-agent Systems with State Constraints

To access the link, solve the captcha.