Filter
(found 5982 products)
Book cover image
This book constitutes the proceedings of the 22nd European Conference on Advances in Databases and Information Systems, ADBIS 2018, held in Budapest, Hungary, in September 2018.The 17 regular papers presented together with two invited papers were carefully selected and reviewed from numerous submissions. The papers are organized in topical sections ...
Advances in Databases and Information Systems: 22nd European Conference, ADBIS 2018, Budapest, Hungary, September 2-5, 2018, Proceedings
This book constitutes the proceedings of the 22nd European Conference on Advances in Databases and Information Systems, ADBIS 2018, held in Budapest, Hungary, in September 2018.The 17 regular papers presented together with two invited papers were carefully selected and reviewed from numerous submissions. The papers are organized in topical sections such as information extraction and integration; data mining and knowledge discovery; indexing, query processing and optimization; data quality and data cleansing; distributed data platforms, including cloud data systems, key-value stores, and big data systems; and streaming data analysis; web, XML and semi-structured databases.
https://magrudy-assets.storage.googleapis.com/9783319983974.jpg
73.490000 USD

Advances in Databases and Information Systems: 22nd European Conference, ADBIS 2018, Budapest, Hungary, September 2-5, 2018, Proceedings

Paperback
Book cover image
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication ...
Applications of Computing and Communication Technologies: First International Conference, ICACCT 2018, Delhi, India, March 9, 2018, Revised Selected Papers
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services.
https://magrudy-assets.storage.googleapis.com/9789811320347.jpg
104.990000 USD

Applications of Computing and Communication Technologies: First International Conference, ICACCT 2018, Delhi, India, March 9, 2018, Revised Selected Papers

Paperback / softback
Book cover image
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.The 41 full and 9 short papers presented in this volume were carefully reviewed and selected from 114 submissions. They deal with all aspects of ...
Principles and Practice of Constraint Programming: 24th International Conference, CP 2018, Lille, France, August 27-31, 2018, Proceedings
This book constitutes the proceedings of the 24th International Conference on Principles and Practice of Constraint Programming, CP 2018, held in Lille, France, in August 2018.The 41 full and 9 short papers presented in this volume were carefully reviewed and selected from 114 submissions. They deal with all aspects of computing with constraints including theory, algorithms, environments, languages, models, systems, and applications such as decision making, resource allocation, scheduling, configuration, and planning. The papers were organized according to the following topics/tracks: main technical track; applications track; CP and data science; CP and music; CP and operations research; CP, optimization and power system management; multiagent and parallel CP; and testing and verification.
https://magrudy-assets.storage.googleapis.com/9783319983332.jpg
125.990000 USD

Principles and Practice of Constraint Programming: 24th International Conference, CP 2018, Lille, France, August 27-31, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 24th International Conference on Parallel and Distributed Computing, Euro-Par 2018, held in Turin, Italy, in August 2018. The 57 full papers presented in this volume were carefully reviewed and selected from 194 submissions. They were organized in topical sections named: support tools and ...
Euro-Par 2018: Parallel Processing: 24th International Conference on Parallel and Distributed Computing, Turin, Italy, August 27 - 31, 2018, Proceedings
This book constitutes the proceedings of the 24th International Conference on Parallel and Distributed Computing, Euro-Par 2018, held in Turin, Italy, in August 2018. The 57 full papers presented in this volume were carefully reviewed and selected from 194 submissions. They were organized in topical sections named: support tools and environments; performance and power modeling, prediction and evaluation; scheduling and load balancing; high performance architecutres and compilers; parallel and distributed data management and analytics; cluster and cloud computing; distributed systems and algorithms; parallel and distributed programming, interfaces, and languages; multicore and manycore methods and tools; theory and algorithms for parallel computation and networking; parallel numerical methods and applications; and accelerator computing for advanced applications.
https://magrudy-assets.storage.googleapis.com/9783319969824.jpg
125.990000 USD

Euro-Par 2018: Parallel Processing: 24th International Conference on Parallel and Distributed Computing, Turin, Italy, August 27 - 31, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including ...
Electronic Voting: Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018. The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The papers deal with topics connected with electronic voting including experiences and revisions of the real uses of E-voting systems and corresponding processes in elections.
https://magrudy-assets.storage.googleapis.com/9783030004187.jpg
73.490000 USD

Electronic Voting: Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings

Paperback / softback
Book cover image
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such ...
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.
https://magrudy-assets.storage.googleapis.com/9783319990729.jpg
104.990000 USD

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I

Paperback / softback
Book cover image
The proliferation of wireless communications has led to mobile computing, a new era in data communication and processing allowing people to access information anywhere and anytime using lightweight computer devices. Aligned with this phenomenon, a vast number of mobile solutions, systems, and applications have been continuously developed. However, despite the ...
Algorithms, Methods, and Applications in Mobile Computing and Communications
The proliferation of wireless communications has led to mobile computing, a new era in data communication and processing allowing people to access information anywhere and anytime using lightweight computer devices. Aligned with this phenomenon, a vast number of mobile solutions, systems, and applications have been continuously developed. However, despite the opportunities, there exist constraints, challenges, and complexities in realizing the full potential of mobile computing, requiring research and experimentation. Algorithms, Methods, and Applications in Mobile Computing and Communications is a critical scholarly publication that examines the various aspects of mobile computing and communications from engineering, business, and organizational perspectives. The book details current research involving mobility challenges that hinder service applicability, mobile money transfer services and anomaly detection, and mobile fog environments. As a resource rich in information about mobile devices, wireless broadcast databases, and machine communications, it is an ideal source for computer scientists, IT specialists, service providers, information technology professionals, academicians, and researchers interested in the field of mobile computing.
https://magrudy-assets.storage.googleapis.com/9781522556930.jpg
215.250000 USD

Algorithms, Methods, and Applications in Mobile Computing and Communications

Hardback
Book cover image
This book constitutes the refereed proceedings of the 25th International Static Analysis Symposium, SAS 2018, held in Freiburg, Germany, in August 2018. The 18 papers presented in this volume were carefully reviewed and selected from 37 submissions. The contributions cover a variety of multi-disciplinary topics in abstract domains: program verication, ...
Static Analysis: 25th International Symposium, SAS 2018, Freiburg, Germany, August 29-31, 2018, Proceedings
This book constitutes the refereed proceedings of the 25th International Static Analysis Symposium, SAS 2018, held in Freiburg, Germany, in August 2018. The 18 papers presented in this volume were carefully reviewed and selected from 37 submissions. The contributions cover a variety of multi-disciplinary topics in abstract domains: program verication, bug detection, compiler optimization, program understanding, and software maintenance.
https://magrudy-assets.storage.googleapis.com/9783319997247.jpg
94.490000 USD

Static Analysis: 25th International Symposium, SAS 2018, Freiburg, Germany, August 29-31, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 14th International Conference entitled Beyond Databases, Architectures and Structures, BDAS 2018, held in Poznan, Poland, in September 2018, during the IFIP World Computer Congress.It consists of 38 carefully reviewed papers selected from 102 submissions. The papers are organized in topical sections, namely ...
Beyond Databases, Architectures and Structures. Facing the Challenges of Data Proliferation and Growing Variety: 14th International Conference, BDAS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proc
This book constitutes the refereed proceedings of the 14th International Conference entitled Beyond Databases, Architectures and Structures, BDAS 2018, held in Poznan, Poland, in September 2018, during the IFIP World Computer Congress.It consists of 38 carefully reviewed papers selected from 102 submissions. The papers are organized in topical sections, namely big data and cloud computing; architectures, structures and algorithms for efficient data processing; artificial intelligence, data mining and knowledge discovery; text mining, natural language processing, ontologies and semantic web; image analysis and multimedia mining.
https://magrudy-assets.storage.googleapis.com/9783319999869.jpg
115.490000 USD

Beyond Databases, Architectures and Structures. Facing the Challenges of Data Proliferation and Growing Variety: 14th International Conference, BDAS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proc

Paperback / softback
Book cover image
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers ...
Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
https://magrudy-assets.storage.googleapis.com/9783319991351.jpg
104.990000 USD

Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings

Paperback / softback
Book cover image
Learn how to deploy Chromebook computers in a classroom or lab situation and how to navigate the hardware and software choices you face. This book equips you with the skills and knowledge to plan and execute a deployment of Chromebook computers in the classroom. Teachers and IT administrators at schools ...
Deploying Chromebooks in the Classroom: Planning, Installing, and Managing Chromebooks in Schools and Colleges
Learn how to deploy Chromebook computers in a classroom or lab situation and how to navigate the hardware and software choices you face. This book equips you with the skills and knowledge to plan and execute a deployment of Chromebook computers in the classroom. Teachers and IT administrators at schools will see how to set up the hardware and software swiftly on your own or with the help of your students. Step-by-step instructions and practical examples walk you through assessing the practicability of deploying Chromebooks in your school, planning the deployment, and executing it. You'll become an expert in using a Chromebook, developing plans to train your colleagues and students to use Chromebooks, and learn how to run lessons with Google Classroom. You'll learn to manage the computers and the network and troubleshoot any problems that arise. Make Deploying Chromebooks in the Classroom a part of your instructional library today. What You'll Learn Put an easily-manageable computer on each desk for students to learn Internet use and essential office software skills Image, configure, and plan a classroom deployment of Chromebook computers Manage your classroom Chromebook computers and keeping them up and running smoothly and efficiently Who This Book Is For Primary audience would be teachers and IT administrators at schools or colleges. It will also appeal to administrators at social clubs or organizations that provide less formal tuition or simply provide Internet access.
https://magrudy-assets.storage.googleapis.com/9781484237656.jpg
68.24 USD

Deploying Chromebooks in the Classroom: Planning, Installing, and Managing Chromebooks in Schools and Colleges

by Guy Hart-Davis
Paperback / softback
Book cover image
This book constitutes the proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2018, held in Beijing, China, in September 2018. The 9 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The purpose of SETTA is ...
Dependable Software Engineering. Theories, Tools, and Applications: 4th International Symposium, SETTA 2018, Beijing, China, September 4-6, 2018, Proceedings
This book constitutes the proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2018, held in Beijing, China, in September 2018. The 9 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The purpose of SETTA is to provide an international forum for researchers and practitioners to share cutting-edge advancements and strengthen collaborations in the field of formal methods and its interoperability with software engineering for building reliable, safe, secure, and smart systems.
https://magrudy-assets.storage.googleapis.com/9783319999326.jpg
62.990000 USD

Dependable Software Engineering. Theories, Tools, and Applications: 4th International Symposium, SETTA 2018, Beijing, China, September 4-6, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 12th International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2018) held at Grenoble, France, in September 2018. The 11 full papers in this volume, presented together with one abstract and two invited papers, were carefully reviewed and selected ...
Verification and Evaluation of Computer and Communication Systems: 12th International Conference, VECoS 2018, Grenoble, France, September 26-28, 2018, Proceedings
This book constitutes the proceedings of the 12th International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2018) held at Grenoble, France, in September 2018. The 11 full papers in this volume, presented together with one abstract and two invited papers, were carefully reviewed and selected from 23 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance, and dependability evaluation in order to discuss state of the art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems.
https://magrudy-assets.storage.googleapis.com/9783030003586.jpg
73.490000 USD

Verification and Evaluation of Computer and Communication Systems: 12th International Conference, VECoS 2018, Grenoble, France, September 26-28, 2018, Proceedings

Paperback / softback
Book cover image
In this book, the interrupt handling models used by several operating systems are introduced and compared. We begin with an analysis of the classical interrupt management model used by Unix, followed by the schemes used by modern networked environments. We highlight the key challenges of each of these models and ...
Interrupt Handling Schemes in Operating Systems
In this book, the interrupt handling models used by several operating systems are introduced and compared. We begin with an analysis of the classical interrupt management model used by Unix, followed by the schemes used by modern networked environments. We highlight the key challenges of each of these models and how these have been solved by modern operating systems and the research community. Then we analyze the architectures used for general purpose and embedded real-time operating systems.
https://magrudy-assets.storage.googleapis.com/9783319944920.jpg
73.490000 USD

Interrupt Handling Schemes in Operating Systems

by Arnaldo Diaz-Ramirez, Luis Eduardo Leyva del Foyo, Pedro Mejia Alvarez
Paperback
Book cover image
This book introduces readers to the latest advances in sensing technology for a broad range of non-volatile memories (NVMs). Challenges across the memory technologies are highlighted and their solutions in mature technology are discussed, enabling innovation of sensing technologies for future NVMs. Coverage includes sensing techniques ranging from well-established NVMs ...
Sensing of Non-Volatile Memory Demystified
This book introduces readers to the latest advances in sensing technology for a broad range of non-volatile memories (NVMs). Challenges across the memory technologies are highlighted and their solutions in mature technology are discussed, enabling innovation of sensing technologies for future NVMs. Coverage includes sensing techniques ranging from well-established NVMs such as hard disk, flash, Magnetic RAM (MRAM) to emerging NVMs such as ReRAM, STTRAM, FeRAM and Domain Wall Memory will be covered.
https://magrudy-assets.storage.googleapis.com/9783319973456.jpg
103.950000 USD

Sensing of Non-Volatile Memory Demystified

Hardback
Book cover image
The book discusses data and energy integrated communication networking technologies, including the latest research contributions in this promising area. It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in ...
Data and Energy Integrated Communication Networks: A Brief Introduction
The book discusses data and energy integrated communication networking technologies, including the latest research contributions in this promising area. It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band. It then describes the ubiquitous architecture of DEINs and demonstrates the typical DEIN system and investigates the core issues in both the physical layer and the medium-access-control (MAC) layer in order to coordinate both the WIT and WET in the same RF band. Lastly, the book addresses a number of emerging research topics in the field of DEINs. It promotes joint efforts from both academia and industry to push DEIN a step closer to practical implementation. It is also a valuable resource for students interested in studying cutting-edge techniques in this field.
https://magrudy-assets.storage.googleapis.com/9789811301155.jpg
73.490000 USD

Data and Energy Integrated Communication Networks: A Brief Introduction

by Kun Yang, Jie Hu
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 17th International Conference on Entertainment Computing, ICEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 15 full papers, 13 short papers, and 23 poster, demostration, and workshop papers presented were carefully reviewed ...
Entertainment Computing - ICEC 2018: 17th IFIP TC 14 International Conference, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 17-20, 2018, Proceedings
This book constitutes the refereed proceedings of the 17th International Conference on Entertainment Computing, ICEC 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 15 full papers, 13 short papers, and 23 poster, demostration, and workshop papers presented were carefully reviewed and selected from 65 submissions. They cover a large range of topics in the following thematic areas: digital games and interactive entertainment; design, human-computer interaction, and analysis of entertainment systems; interactive art, performance and cultural computing; entertainment devices, platforms and systems; theoratical foundations and ethical issues; entertainment for purpose and persuasion; computational methodologies for entertainment; and media studies, communication, business, and information systems.
https://magrudy-assets.storage.googleapis.com/9783319994253.jpg
94.490000 USD

Entertainment Computing - ICEC 2018: 17th IFIP TC 14 International Conference, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 17-20, 2018, Proceedings

Paperback / softback
Book cover image
Android Things is the new Android based Operating System for the Internet of Things. With this book you will learn the core concepts by running code examples on different peripherals. Key Features No previous knowledge of IoT or microcontrollers required. Hands-On with simple code and plenty of examples. Use Kotlin ...
Android Things Quick Start Guide: Build your own smart devices using the Android Things platform
Android Things is the new Android based Operating System for the Internet of Things. With this book you will learn the core concepts by running code examples on different peripherals. Key Features No previous knowledge of IoT or microcontrollers required. Hands-On with simple code and plenty of examples. Use Kotlin to write simpler and more readable code Book DescriptionAndroid Things is the IoT platform made by Google, based on Android. It allows us to build smart devices in a simple and convenient way, leveraging on the Android ecosystem tools and libraries, while letting Google take care of security updates. This book takes you through the basics of IoT and smart devices. It will help you to interact with common IoT device components and learn the underlying protocols. For a simple setup, we will be using Rainbow HAT so that we don't need to do any wiring. In the first chapter, you will learn about the Android Things platform, the design concepts behind it, and how it relates to other IoT frameworks. We will look at the Developer Kits and learn how to install Android Things on them by creating a simple project. Later, we will explore the real power of Android Things, learning how to make a UI, designing and communicating with companion apps in different ways, showcasing a few libraries. We will demonstrate libraries and you will see how powerful the Android Things operating system is. What you will learn Understand key design concepts of Android Things and its advantages Set up an Android Things Developer Kit Interact with all the components of Rainbow HAT Understand how peripheral protocols work (GPIO, PWM, I2C, and SPI) Implement best practices of how to handle IoT peripherals with in terms Android Things Develop techniques for building companion apps for your devices Who this book is forThis book is for developers who have a basic knowledge of Android and want to start using the Android Things developer kit.
https://magrudy-assets.storage.googleapis.com/9781789341799.jpg
31.490000 USD

Android Things Quick Start Guide: Build your own smart devices using the Android Things platform

by Raul Portales
Paperback / softback
Book cover image
Hackers, cyber-criminals, Dark Web users, and techno-terrorists beware! This book should make you think twice about attempting to do your dirty work in the smart cities of tomorrow. Scores of cities around the world have begun planning what are known as smart cities. These new or revamped urban areas use ...
Smart Cities of Today and Tomorrow: Better Technology, Infrastructure and Security
Hackers, cyber-criminals, Dark Web users, and techno-terrorists beware! This book should make you think twice about attempting to do your dirty work in the smart cities of tomorrow. Scores of cities around the world have begun planning what are known as smart cities. These new or revamped urban areas use the latest technology to make the lives of residents easier and more enjoyable.They will have automated infrastructures such as the Internet of Things, the Cloud, automated industrial controls, electronic money, mobile and communication satellite systems, wireless texting and networking. With all of these benefits come new forms of danger, and so these cities will need many safeguards to prevent cyber criminals from wreaking havoc. This book explains the advantages of smart cities and how to design and operate one. Based on the practical experience of the authors in projects in the U.S. and overseas in Dubai, Malaysia, Brazil and India, it tells how such a city is planned and analyzes vital security concerns that must be addressed along the way. Most of us will eventually live in smart cities. What are the advantages and the latest design strategies for such ventures? What are the potential drawbacks? How will they change the lives of everyday citizens? This book offers a preview of our future and how you can help prepare yourself for the changes to come.
https://magrudy-assets.storage.googleapis.com/9783319958217.jpg
39.23 USD

Smart Cities of Today and Tomorrow: Better Technology, Infrastructure and Security

by Indu B. Singh, Joseph N. Pelton
Paperback / softback
Book cover image
Bring a new degree of interconnectivity to your world by building your own intelligent robots Key Features Leverage fundamentals of AI and robotics Work through use cases to implement various machine learning algorithms Explore Natural Language Processing (NLP) concepts for efficient decision making in robots Book DescriptionArtificial Intelligence for Robotics ...
Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques
Bring a new degree of interconnectivity to your world by building your own intelligent robots Key Features Leverage fundamentals of AI and robotics Work through use cases to implement various machine learning algorithms Explore Natural Language Processing (NLP) concepts for efficient decision making in robots Book DescriptionArtificial Intelligence for Robotics starts with an introduction to Robot Operating Systems (ROS), Python, robotic fundamentals, and the software and tools that are required to start out with robotics. You will learn robotics concepts that will be useful for making decisions, along with basic navigation skills. As you make your way through the chapters, you will learn about object recognition and genetic algorithms, which will teach your robot to identify and pick up an irregular object. With plenty of use cases throughout, you will explore natural language processing (NLP) and machine learning techniques to further enhance your robot. In the concluding chapters, you will learn about path planning and goal-oriented programming, which will help your robot prioritize tasks. By the end of this book, you will have learned to give your robot an artificial personality using simulated intelligence. What you will learn Get started with robotics and artificial intelligence Apply simulation techniques to give your robot an artificial personality Understand object recognition using neural networks and supervised learning techniques Pick up objects using genetic algorithms for manipulation Teach your robot to listen using NLP via an expert system Use machine learning and computer vision to teach your robot how to avoid obstacles Understand path planning, decision trees, and search algorithms in order to enhance your robot Who this book is forIf you have basic knowledge about robotics and want to build or enhance your existing robot's intelligence, then Artificial Intelligence for Robotics is for you. This book is also for enthusiasts who want to gain knowledge of AI and robotics.
https://magrudy-assets.storage.googleapis.com/9781788835442.jpg
47.240000 USD

Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques

by Francis X. Govers
Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 48 ...
This Changes Everything - ICT and Climate Change: What Can We Do?: 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 19-21, 2018, Proceedin
This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are based on both academic research and the professional experience of information practitioners working in the field. They deal with multiple challenges society will be facing in the future and are organized in the following topical sections: history of computing: this changed everything ; ICT4D and improvements of ICTs; ICTs and sustainability; gender; ethical and legal considerations; and philosophy.
https://magrudy-assets.storage.googleapis.com/9783319996042.jpg
125.990000 USD

This Changes Everything - ICT and Climate Change: What Can We Do?: 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 19-21, 2018, Proceedin

Hardback
Book cover image
This book constitutes the refereed proceedings of the 20th International Conference on Big Data Analytics and Knowledge Discovery, DaWaK 2018, held in Regensburg, Germany, in September 2018.The 13 revised full papers and 17 short papers presented were carefully reviewed and selected from 76 submissions. The papers are organized in the ...
Big Data Analytics and Knowledge Discovery: 20th International Conference, DaWaK 2018, Regensburg, Germany, September 3-6, 2018, Proceedings
This book constitutes the refereed proceedings of the 20th International Conference on Big Data Analytics and Knowledge Discovery, DaWaK 2018, held in Regensburg, Germany, in September 2018.The 13 revised full papers and 17 short papers presented were carefully reviewed and selected from 76 submissions. The papers are organized in the following topical sections: Graph analytics; case studies; classification and clustering; pre-processing; sequences; cloud and database systems; and data mining.
https://magrudy-assets.storage.googleapis.com/9783319985381.jpg
83.990000 USD

Big Data Analytics and Knowledge Discovery: 20th International Conference, DaWaK 2018, Regensburg, Germany, September 3-6, 2018, Proceedings

Paperback / softback
Book cover image
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such ...
Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security.
https://magrudy-assets.storage.googleapis.com/9783319989884.jpg
104.990000 USD

Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II

Paperback
Book cover image
This book constitutes the proceedings of the 23rd International Conference on Formal Methods for Industrial Critical Systems, FMICS 2018, held in Maynooth, Ireland, in September 2018. The 9 regular papers presented in this volume were carefully reviewed and selected from 17 submissions. The book also contains two invited talks in ...
Formal Methods for Industrial Critical Systems: 23rd International Conference, FMICS 2018, Maynooth, Ireland, September 3-4, 2018, Proceedings
This book constitutes the proceedings of the 23rd International Conference on Formal Methods for Industrial Critical Systems, FMICS 2018, held in Maynooth, Ireland, in September 2018. The 9 regular papers presented in this volume were carefully reviewed and selected from 17 submissions. The book also contains two invited talks in full-paper length. In addition, there are 8 invited contributions in honor of Susanne Graf (Director of Research at VERIMAG Grenoble, France) on the occasion of her 60th birthday. The aim of the FMICS conference series is to provide a forum for researchers who are interested in the development and application of formal methods in industry. In particular, FMICS brings together scientists and engineers who are active in the area of formal methods and interested in exchanging their experiences in the industrial usage of these methods. The FMICS conference series also strives to promote research and development for the improvement of formal methods and tools for industrial applications.
https://magrudy-assets.storage.googleapis.com/9783030002435.jpg
73.490000 USD

Formal Methods for Industrial Critical Systems: 23rd International Conference, FMICS 2018, Maynooth, Ireland, September 3-4, 2018, Proceedings

Paperback / softback
Book cover image
This two-volume set, LNAI 11012 and 11013, constitutes the thoroughly refereed proceedings of the 15th Pacific Rim Conference on Artificial Intelligence, PRICAI 2018, held in Nanjing, China, in August 2018. The 82 full papers and 58 short papers presented in these volumes were carefully reviewed and selected from 382 submissions. ...
PRICAI 2018: Trends in Artificial Intelligence: 15th Pacific Rim International Conference on Artificial Intelligence, Nanjing, China, August 28-31, 2018, Proceedings, Part II
This two-volume set, LNAI 11012 and 11013, constitutes the thoroughly refereed proceedings of the 15th Pacific Rim Conference on Artificial Intelligence, PRICAI 2018, held in Nanjing, China, in August 2018. The 82 full papers and 58 short papers presented in these volumes were carefully reviewed and selected from 382 submissions. PRICAI covers a wide range of topics such as AI theories, technologies and their applications in the areas of social and economic importance for countries in the Pacific Rim.
https://magrudy-assets.storage.googleapis.com/9783319973098.jpg
104.990000 USD

PRICAI 2018: Trends in Artificial Intelligence: 15th Pacific Rim International Conference on Artificial Intelligence, Nanjing, China, August 28-31, 2018, Proceedings, Part II

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2018, the 37th International Conference on Computer Safety, Reliability, and Security, held in Vasteras, Sweden, in September 2018. The 28 revised full papers and 21 short papers presented together with 5 introductory papers to each workshop were carefully ...
Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Vasteras, Sweden, September 18, 2018, Proceedings
This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2018, the 37th International Conference on Computer Safety, Reliability, and Security, held in Vasteras, Sweden, in September 2018. The 28 revised full papers and 21 short papers presented together with 5 introductory papers to each workshop were carefully reviewed and selected from 73 submissions. This year's workshops are: ASSURE 2018 - Assurance Cases for Software-Intensive Systems; DECSoS 2018 - ERCIM/EWICS/ARTEMIS Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems; SASSUR 2018 - Next Generation of System Assurance Approaches for Safety-Critical Systems; STRIVE 2018 - Safety, securiTy, and pRivacy In automotiVe systEms; and WAISE 2018 - Artificial Intelligence Safety Engineering.
https://magrudy-assets.storage.googleapis.com/9783319992280.jpg
104.990000 USD

Computer Safety, Reliability, and Security: SAFECOMP 2018 Workshops, ASSURE, DECSoS, SASSUR, STRIVE, and WAISE, Vasteras, Sweden, September 18, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the First International Workshop on PRedictive Intelligence in MEdicine, PRIME 2018, held in conjunction with MICCAI 2018, in Granada, Spain, in September 2018. The 20 full papers presented were carefully reviewed and selected from 23 submissions. The main aim of the workshop is ...
PRedictive Intelligence in MEdicine: First International Workshop, PRIME 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings
This book constitutes the refereed proceedings of the First International Workshop on PRedictive Intelligence in MEdicine, PRIME 2018, held in conjunction with MICCAI 2018, in Granada, Spain, in September 2018. The 20 full papers presented were carefully reviewed and selected from 23 submissions. The main aim of the workshop is to propel the advent of predictive models in a broad sense, with application to medical data. Particularly, the workshop will admit papers describing new cutting-edge predictive models and methods that solve challenging problems in the medical field.
https://magrudy-assets.storage.googleapis.com/9783030003197.jpg
62.990000 USD

PRedictive Intelligence in MEdicine: First International Workshop, PRIME 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings

Paperback / softback
Book cover image
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications ...
Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time
Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using normal IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity Who This Book Is For Cybersecurity specialists, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, software developers and engineers developing new cybersecurity defenses, incident response teams, software developers and engineers in general, and hobbyists wanting to expand the application of Raspberry Pi into both IoT and cybersecurity
https://magrudy-assets.storage.googleapis.com/9781484236994.jpg
29.390000 USD

Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time

by Chet Hosmer
Paperback / softback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 11th International Conference, Spatial Cognition 2018, held in Tubingen, Germany, in September 2018. The 22 revised full papers presented in this book were carefully selected and reviewed from 44 submissions. They focus on the following topics: navigating in space; talking about ...
Spatial Cognition XI: 11th International Conference, Spatial Cognition 2018, Tubingen, Germany, September 5-8, 2018, Proceedings
This book constitutes the thoroughly refereed proceedings of the 11th International Conference, Spatial Cognition 2018, held in Tubingen, Germany, in September 2018. The 22 revised full papers presented in this book were carefully selected and reviewed from 44 submissions. They focus on the following topics: navigating in space; talking about space; agents, actions, and space; and individuals in space.
https://magrudy-assets.storage.googleapis.com/9783319963846.jpg
83.990000 USD

Spatial Cognition XI: 11th International Conference, Spatial Cognition 2018, Tubingen, Germany, September 5-8, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 ...
Search-Based Software Engineering: 10th International Symposium, SSBSE 2018, Montpellier, France, September 8-9, 2018, Proceedings
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing. Chapter Deploying Search Based Software Engineering with Sapienz at Facebook is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
https://magrudy-assets.storage.googleapis.com/9783319992402.jpg
83.990000 USD

Search-Based Software Engineering: 10th International Symposium, SSBSE 2018, Montpellier, France, September 8-9, 2018, Proceedings

Paperback / softback
Page 1 of 40