Filter
(found 2835 products)
Book cover image
This book adopts a holistic interpretation of information architecture, to offer libraries and information professionals a variety of methods, tools, and techniques that may be used when designing websites and information systems that support workflows and what people require when managing information . The editors argue that information architecture for ...
Process and Information Practice for Information Systems
This book adopts a holistic interpretation of information architecture, to offer libraries and information professionals a variety of methods, tools, and techniques that may be used when designing websites and information systems that support workflows and what people require when managing information . The editors argue that information architecture for libraries has largely been the study of content architecture and that, on the other hand, library assessment literature has dealt with performance measurement and change management strategies. There is a gap in the middle for information services, with little on the ways of looking at the process architecture of a library and information service and on methods for business process analysis. Process and Information Practice for Information Systems aims to fill that gap with a combination of theory and supporting case studies written by an international line-up of contributors, including Sally Burford, Fernando Loizides, Catherine Burns and Adam Euerby. Case studies cover a wide variety of settings, from discrete resource discovery projects for academic and cultural institutions, through design for large organizational websites, the research evidence about user experience for semi-structured document design on websites, to the health sector with examples including patient support websites and clinical document management. This book: * takes a holistic view and interpretation of Information architecture in the context of libraries across the sector, globally * discusses research and methods that help libraries and information services work from strategic business objectives through the organisation of processes that support the information services offered, and information management functions supported * opens a new area of research/investigation on the link between information behaviour research and information systems and architecture, supported by case studies and projects * includes contributions from an international range of experts from diverse backgrounds * uses introductory sections and chapter commentary from the editors to draw the discussions together. This will be essential reading for researchers in information science specifically in the areas of digital libraries, information architecture and information systems. It will also be useful for practitioners and students in these areas who want to know the different research issues and challenges and learn how they have been handled in course of various research projects in these areas.
https://magrudy-assets.storage.googleapis.com/9781783302420.jpg
238.79 USD

Process and Information Practice for Information Systems

Hardback
Book cover image
New solutions are needed for future scaling down of nonvolatile memory. Advances in Non-volatile Memory and Storage Technology provides an overview of developing technologies and explores their strengths and weaknesses. After an overview of the current market, part one introduces improvements in flash technologies, including developments in 3D NAND flash ...
Advances in Non-volatile Memory and Storage Technology
New solutions are needed for future scaling down of nonvolatile memory. Advances in Non-volatile Memory and Storage Technology provides an overview of developing technologies and explores their strengths and weaknesses. After an overview of the current market, part one introduces improvements in flash technologies, including developments in 3D NAND flash technologies and flash memory for ultra-high density storage devices. Part two looks at the advantages of designing phase change memory and resistive random access memory technologies. It looks in particular at the fabrication, properties, and performance of nanowire phase change memory technologies. Later chapters also consider modeling of both metal oxide and resistive random access memory switching mechanisms, as well as conductive bridge random access memory technologies. Finally, part three looks to the future of alternative technologies. The areas covered include molecular, polymer, and hybrid organic memory devices, and a variety of random access memory devices such as nano-electromechanical, ferroelectric, and spin-transfer-torque magnetoresistive devices. Advances in Non-volatile Memory and Storage Technology is a key resource for postgraduate students and academic researchers in physics, materials science, and electrical engineering. It is a valuable tool for research and development managers concerned with electronics, semiconductors, nanotechnology, solid-state memories, magnetic materials, organic materials, and portable electronic devices.
https://magrudy-assets.storage.googleapis.com/9780081014189.jpg
241.500000 USD

Advances in Non-volatile Memory and Storage Technology

Paperback
Book cover image
This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such ...
Advances in User Authentication: 2017
This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists.
https://magrudy-assets.storage.googleapis.com/9783319588063.jpg
89.240000 USD

Advances in User Authentication: 2017

by Abhijit Nag, Dipankar Dasgupta
Hardback
Book cover image
The motivation of this edited book is to generate an understanding about information, related concepts and the roles they play in the modern, technology permeated world. In order to achieve our goal, we observe how information is understood in domains, such as cosmology, physics, biology, neuroscience, computer science, artificial intelligence, ...
Understanding Information: From the Big Bang to Big Data: 2017
The motivation of this edited book is to generate an understanding about information, related concepts and the roles they play in the modern, technology permeated world. In order to achieve our goal, we observe how information is understood in domains, such as cosmology, physics, biology, neuroscience, computer science, artificial intelligence, the Internet, big data, information society, or philosophy. Together, these observations form an integrated view so that readers can better understand this exciting building-block of modern-day society. On the surface, information is a relatively straightforward and intuitive concept. Underneath, however, information is a relatively versatile and mysterious entity. For instance, the way a physicist looks at information is not necessarily the same way as that of a biologist, a neuroscientist, a computer scientist, or a philosopher. Actually, when it comes to information, it is common that each field has its domain specific views, motivations, interpretations, definitions, methods, technologies, and challenges. With contributions by authors from a wide range of backgrounds, Understanding Information: From the Big Bang to Big Data will appeal to readers interested in the impact of 'information' on modern-day life from a variety of perspectives.
https://magrudy-assets.storage.googleapis.com/9783319590899.jpg
157.490000 USD

Understanding Information: From the Big Bang to Big Data: 2017

Hardback
Book cover image
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not ...
Mathematical Modelling for Next-Generation Cryptography: Crest Crypto-Math Project: 2018
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
https://magrudy-assets.storage.googleapis.com/9789811050640.jpg
167.990000 USD

Mathematical Modelling for Next-Generation Cryptography: Crest Crypto-Math Project: 2018

Hardback
Book cover image
The ubiquitous nature of mobile and pervasive computing has begun to reshape and complicate our notions of space, time, and identity. In this collection, over thirty internationally recognized contributors reflect on ubiquitous computing's implications for the ways in which we interact with our environments, experience time, and develop identities individually ...
Ubiquitous Computing, Complexity and Culture
The ubiquitous nature of mobile and pervasive computing has begun to reshape and complicate our notions of space, time, and identity. In this collection, over thirty internationally recognized contributors reflect on ubiquitous computing's implications for the ways in which we interact with our environments, experience time, and develop identities individually and socially. Interviews with working media artists lend further perspectives on these cultural transformations. Drawing on cultural theory, new media art studies, human-computer interaction theory, and software studies, this cutting-edge book critically unpacks the complex ubiquity-effects confronting us every day. Visit the book's companion website at: http://ubiquity.dk
https://magrudy-assets.storage.googleapis.com/9781138296329.jpg
75.06 USD

Ubiquitous Computing, Complexity and Culture

Paperback
Book cover image
The Applications of Computer Algebra (ACA) conference covers a wide range of topics from Coding Theory to Differential Algebra to Quantam Computing, focusing on the interactions of these and other areas with the discipline of Computer Algebra. This volume provides the latest developments in the field as well as its ...
Applications of Computer Algebra: Kalamata, Greece, July 20-23 2015: 2017
The Applications of Computer Algebra (ACA) conference covers a wide range of topics from Coding Theory to Differential Algebra to Quantam Computing, focusing on the interactions of these and other areas with the discipline of Computer Algebra. This volume provides the latest developments in the field as well as its applications in various domains, including communications, modelling, and theoretical physics. The book will appeal to researchers and professors of computer algebra, applied mathematics, and computer science, as well as to engineers and computer scientists engaged in research and development.
https://magrudy-assets.storage.googleapis.com/9783319569307.jpg
230.990000 USD

Applications of Computer Algebra: Kalamata, Greece, July 20-23 2015: 2017

Hardback
Book cover image
This monograph describes the principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper's observation of the communication. The focus is on secrecy generation in two settings: a multiterminal ...
Multiterminal Secrecy by Public Discussion
This monograph describes the principles of information theoretic secrecy generation by legitimate parties with public discussion in the presence of an eavesdropper. The parties are guaranteed secrecy in the form of independence from the eavesdropper's observation of the communication. The focus is on secrecy generation in two settings: a multiterminal source model and a multiterminal channel model, in both of which the legitimate parties are given privileged access to correlated data of which the eavesdropper has only partial knowledge. Part I is concerned with basic technical tools for secrecy generation, many of which are potentially of independent interest beyond secrecy settings. Part II applies the methods of Part I to secrecy generation for the multiterminal source and channel models. Based largely on known recent results, this self-contained tutorial also includes new formulations with associated new proofs.
https://magrudy-assets.storage.googleapis.com/9781680831863.jpg
103.950000 USD

Multiterminal Secrecy by Public Discussion

by Himanshu Tyagi, Prakash Narayan
Paperback
Book cover image
David Forster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems - motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which ...
Verifiable Privacy Protection for Vehicular Communication Systems
David Forster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems - motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Forster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.
https://magrudy-assets.storage.googleapis.com/9783658185497.jpg
83.990000 USD

Verifiable Privacy Protection for Vehicular Communication Systems

by David Forster
Paperback
Book cover image
This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017.The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based ...
Post-Quantum Cryptography : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings
This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017.The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.
https://magrudy-assets.storage.googleapis.com/9783319598789.jpg
89.240000 USD

Post-Quantum Cryptography : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings

Paperback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Image Analysis and Recognition, ICIAR 2017, held in Montreal, QC, Canada, in July 2017. The 73 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in the following topical sections: ...
Image Analysis and Recognition: 14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5-7, 2017, Proceedings: 2017
This book constitutes the thoroughly refereed proceedings of the 14th International Conference on Image Analysis and Recognition, ICIAR 2017, held in Montreal, QC, Canada, in July 2017. The 73 revised full papers presented were carefully reviewed and selected from 133 submissions. The papers are organized in the following topical sections: machine learning in image recognition; machine learning for medical image computing; image enhancement and reconstruction; image segmentation; motion and tracking; 3D computer vision; feature extraction; detection and classification; biomedical image analysis; image analysis in ophthalmology; remote sensing; applications.
https://magrudy-assets.storage.googleapis.com/9783319598758.jpg
115.490000 USD

Image Analysis and Recognition: 14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5-7, 2017, Proceedings: 2017

Paperback
Book cover image
This book constitutes the refereed proceedings of the 17th International Conference on Innovations for Community Services, I4CS 2017, held in Darmstadt, Germany, in June 2017.The 12 revised full papers presented together with two short papers were carefully reviewed and selected from 31 submissions. The papers are organized in topical sections ...
Innovations for Community Services: 17th International Conference, I4CS 2017, Darmstadt, Germany, June 26-28, 2017, Proceedings
This book constitutes the refereed proceedings of the 17th International Conference on Innovations for Community Services, I4CS 2017, held in Darmstadt, Germany, in June 2017.The 12 revised full papers presented together with two short papers were carefully reviewed and selected from 31 submissions. The papers are organized in topical sections on Social Networks; Cooperative Networks; Optimization Algorithms; Infrastructure Planning; Energy Management; Short Papers.
https://magrudy-assets.storage.googleapis.com/9783319604466.jpg
78.740000 USD

Innovations for Community Services: 17th International Conference, I4CS 2017, Darmstadt, Germany, June 26-28, 2017, Proceedings

Paperback
Book cover image
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step ...
Smart Cards, Tokens, Security and Applications
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
https://magrudy-assets.storage.googleapis.com/9783319504988.jpg
94.490000 USD

Smart Cards, Tokens, Security and Applications

Hardback
Book cover image
Algorithms increasingly run our lives. They find books, movies, jobs, and dates for us, manage our investments, and discover new drugs. More and more, these algorithms work by learning from the trails of data we leave in our newly digital world. Like curious children, they observe us, imitate, and experiment. ...
The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World
Algorithms increasingly run our lives. They find books, movies, jobs, and dates for us, manage our investments, and discover new drugs. More and more, these algorithms work by learning from the trails of data we leave in our newly digital world. Like curious children, they observe us, imitate, and experiment. And in the world's top research labs and universities, the race is on to invent the ultimate learning algorithm: one capable of discovering any knowledge from data, and doing anything we want, before we even ask.Machine learning is the automation of discovery,the scientific method on steroids,that enables intelligent robots and computers to program themselves. No field of science today is more important yet more shrouded in mystery. Pedro Domingos, one of the field's leading lights, lifts the veil for the first time to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He charts a course through machine learning's five major schools of thought, showing how they turn ideas from neuroscience, evolution, psychology, physics, and statistics into algorithms ready to serve you. Step by step, he assembles a blueprint for the future universal learner,the Master Algorithm,and discusses what it means for you, and for the future of business, science, and society.If data-ism is today's rising philosophy, this book will be its bible. The quest for universal learning is one of the most significant, fascinating, and revolutionary intellectual developments of all time. A ground-breaking book, The Master Algorithm is the essential guide for anyone and everyone wanting to understand not just how the revolution will happen, but how to be at its forefront.
https://magrudy-assets.storage.googleapis.com/9780465065707.jpg
31.490000 USD

The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World

by Pedro Domingos
Hardback
Book cover image
Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for ...
Pro Access 2010 Development
Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, complex form development, and user interface customizations. You'll then deploy your solution to the web and integrate it with other external data sources. This book is full of handy tricks to help you get the most out of what Access has to offer, including its comprehensive set of features and tools for collecting, using, and acting on business data, whether your data is in Access or stored on another platform. You'll also see how to smoothly integrate your applications with SQL Server databases and other Office programs, such as Outlook. What you'll learn * How to build business applications that integrate local data, web-generated data, and data available from SQL Server and other sources * How to develop VBA routines and macros to enhance the automation of your database * How to deploy databases to your users and web-ify your application for access from anywhere * How to secure access to your data and maintain its integrity * How to integrate Access with SharePoint and other business applications Who this book is for This book is for intermediate to advanced Access developers who want to get up to speed with the new features available in Access 2010. Experienced Access users who want to begin developing code-based applications and project solutions in Access will also find this book useful. Table of Contents * Introduction * Defining and Relating Tables * Using Data Macros * Designing Queries * Creating PivotTables * Standard Forms * Creating a CheckOut Form * Creating a Customer Admin Form * Enhancing Product Administration * Enhancing the User Experience * Branding with Themes and Styles * Reports * Upsizing * Distributing the Application * Publishing to the Web * Integrating Outlook * Using External Data * Miscellaneous Features * Security
https://magrudy-assets.storage.googleapis.com/9781430235781.jpg
47.240000 USD

Pro Access 2010 Development

by Creative Enterprises, Mark Collins
Paperback
Book cover image
The two-volume set LNCS 10297 + 10298 constitutes the refereed proceedings of the Third International Conference on Human Aspects of IT for the Aged Population, ITAP 2017, held as part of HCI International 2017 in Vancouver, BC, Canada. HCII 2017 received a total of 4340 submissions, of which 1228 papers ...
Human Aspects of IT for the Aged Population. Aging, Design and User Experience: Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I
The two-volume set LNCS 10297 + 10298 constitutes the refereed proceedings of the Third International Conference on Human Aspects of IT for the Aged Population, ITAP 2017, held as part of HCI International 2017 in Vancouver, BC, Canada. HCII 2017 received a total of 4340 submissions, of which 1228 papers were accepted for publication after a careful reviewing process. The 83 papers presented in the two volumes of ITAP 2017 were organized in topical sections as follows: Part I: aging and technology acceptance; user-centred design for the elderly; product design for the elderly; aging and user experience; digital literacy and training. Part II: mobile and wearable interaction for the elderly; aging and social media; silver and intergenerational gaming; health care and assistive technologies and services for the elderly; aging and learning, working and leisure.
https://magrudy-assets.storage.googleapis.com/9783319585291.jpg
104.990000 USD

Human Aspects of IT for the Aged Population. Aging, Design and User Experience: Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings, Part I

Paperback
Book cover image
This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before ...
Fading and Shadowing in Wireless Systems
This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided.
https://magrudy-assets.storage.googleapis.com/9783319531977.jpg
293.990000 USD

Fading and Shadowing in Wireless Systems

by P. Mohana Shankar
Hardback
Book cover image
This book develops a framework that shows how uncertainty in Artificial Intelligence (AI) expands and generalizes traditional AI. It explores the uncertainties of knowledge and intelligence. The authors focus on the importance of natural language - the carrier of knowledge and intelligence, and introduce efficient physical methods for data mining ...
Artificial Intelligence with Uncertainty
This book develops a framework that shows how uncertainty in Artificial Intelligence (AI) expands and generalizes traditional AI. It explores the uncertainties of knowledge and intelligence. The authors focus on the importance of natural language - the carrier of knowledge and intelligence, and introduce efficient physical methods for data mining amd control. In this new edition, we have more in-depth description of the models and methods, of which the mathematical properties are proved strictly which make these theories and methods more complete. The authors also highlight their latest research results.
https://magrudy-assets.storage.googleapis.com/9781498776264.jpg
213.29 USD

Artificial Intelligence with Uncertainty

by Yi Du, Deyi Li
Hardback
Book cover image
A Mind at Play: How Claude Shannon Invented the Information Age
https://magrudy-assets.storage.googleapis.com/9781476766683.jpg
28.350000 USD

A Mind at Play: How Claude Shannon Invented the Information Age

by Jimmy Soni
Hardback
Book cover image
Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the information ubiquitous in nature.Introduction to Evolutionary Informatics fuses results from complexity modeling and information theory that allow both meaning and design difficulty in nature to be ...
Introduction To Evolutionary Informatics
Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the information ubiquitous in nature.Introduction to Evolutionary Informatics fuses results from complexity modeling and information theory that allow both meaning and design difficulty in nature to be measured in bits. Built on the foundation of a series of peer-reviewed papers published by the authors, the book is written at a level easily understandable to readers with knowledge of rudimentary high school math. Those seeking a quick first read or those not interested in mathematical detail can skip marked sections in the monograph and still experience the impact of this new and exciting model of nature's information.This book is written for enthusiasts in science, engineering and mathematics interested in understanding the essential role of information in closely examined evolution theory.
https://magrudy-assets.storage.googleapis.com/9789813142145.jpg
60.900000 USD

Introduction To Evolutionary Informatics

by Winston Ewert, William A Dembski
Paperback
Book cover image
This book provides a practically-oriented introduction to high-level programming language implementation. It demystifies what goes on within a compiler and stimulates the reader's interest in compiler design, an essential aspect of computer science. Programming language analysis and translation techniques are used in many software application areas. A Practical Approach to ...
A Practical Approach to Compiler Construction: 2017
This book provides a practically-oriented introduction to high-level programming language implementation. It demystifies what goes on within a compiler and stimulates the reader's interest in compiler design, an essential aspect of computer science. Programming language analysis and translation techniques are used in many software application areas. A Practical Approach to Compiler Construction covers the fundamental principles of the subject in an accessible way. It presents the necessary background theory and shows how it can be applied to implement complete compilers. A step-by-step approach, based on a standard compiler structure is adopted, presenting up-to-date techniques and examples. Strategies and designs are described in detail to guide the reader in implementing a translator for a programming language. A simple high-level language, loosely based on C, is used to illustrate aspects of the compilation process. Code examples in C are included, together with discussion and illustration of how this code can be extended to cover the compilation of more complex languages. Examples are also given of the use of the flex and bison compiler construction tools. Lexical and syntax analysis is covered in detail together with a comprehensive coverage of semantic analysis, intermediate representations, optimisation and code generation. Introductory material on parallelisation is also included. Designed for personal study as well as for use in introductory undergraduate and postgraduate courses in compiler design, the author assumes that readers have a reasonable competence in programming in any high-level language.
https://magrudy-assets.storage.googleapis.com/9783319527871.jpg
52.490000 USD

A Practical Approach to Compiler Construction: 2017

by Des Watson
Paperback
Book cover image
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of ...
Privately and Publicly Verifiable Computing Techniques: A Survey
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work.The book is of interest to anyone wanting to understand the state of the art of this research field.
https://magrudy-assets.storage.googleapis.com/9783319537979.jpg
73.490000 USD

Privately and Publicly Verifiable Computing Techniques: A Survey

by Johannes Buchmann, Lucas Schabhuser, Denise Demirel
Paperback
Book cover image
DESCRIPTION Being able to make near-real-time decisions is becoming increasingly crucial. To succeed, we need machine learning systems that can turn massive amounts of data into valuable insights. But when you're just starting out in the data science field, how do you get started creating machine learning applications? The answer ...
Machine Learning with Tensorflow
DESCRIPTION Being able to make near-real-time decisions is becoming increasingly crucial. To succeed, we need machine learning systems that can turn massive amounts of data into valuable insights. But when you're just starting out in the data science field, how do you get started creating machine learning applications? The answer is TensorFlow, a new open source machine learning library from Google. The TensorFlow library can take your high level designs and turn them into the low level mathematical operations required by machine learning algorithms. Machine Learning with TensorFlow teaches readers about machine learning algorithms and how to implement solutions with TensorFlow. It starts with an overview of machine learning concepts and moves on to the essentials needed to begin using TensorFlow. Each chapter zooms into a prominent example of machine learning. Readers can cover them all to master the basics or skip around to cater to their needs. By the end of this book, readers will be able to solve classification, clustering, regression, and prediction problems in the real world. KEY FEATURES * Lots of diagrams, code examples, and exercises * Solves real-world problems with TensorFlow * Uses well-studied neural network architectures * Presents code that can be used for the readers' own applications AUDIENCE This book is for programmers who have some experience with Python and linear algebra concepts like vectors and matrices. No experience with machine learning is necessary. ABOUT THE TECHNOLOGY Google open-sourced their machine learning framework called TensorFlow in late 2015 under the Apache 2.0 license. Before that, it was used proprietarily by Google in its speech recognition, Search, Photos, and Gmail, among other applications. TensorFlow is one the most popular machine learning libraries.
https://magrudy-assets.storage.googleapis.com/9781617293870.jpg
41.50 USD

Machine Learning with Tensorflow

by Nishant Shukla
Paperback
Book cover image
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the ...
Error-Correction Coding and Decoding: Bounds, Codes, Decoders, Analysis and Applications
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors' twenty-five years of research organized into five parts: Part I is concerned with the theoretical performance attainable by using error correcting codes to achieve communications efficiency in digital communications systems. Part II explores the construction of error-correcting codes and explains the different families of codes and how they are designed. Techniques are described for producing the very best codes. Part III addresses the analysis of low-density parity-check (LDPC) codes, primarily to calculate their stopping sets and low-weight codeword spectrum which determines the performance of these codes. Part IV deals with decoders designed to realize optimum performance. Part V describes applications which include combined error correction and detection, public key cryptography using Goppa codes, correcting errors in passwords and watermarking. This book is a valuable resource for anyone interested in error-correcting codes and their applications, ranging from non-experts to professionals at the forefront of research in their field. This book is open access under a CC BY 4.0 license.
https://magrudy-assets.storage.googleapis.com/9783319511023.jpg
62.990000 USD

Error-Correction Coding and Decoding: Bounds, Codes, Decoders, Analysis and Applications

by Marcel A. Ambroze, Martin Tomlinson
Hardback
Book cover image
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016. The 134 full papers presented were selected from 223 submissions. LNCS ...
Computer Vision - ACCV 2016 Workshops: ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016. The 134 full papers presented were selected from 223 submissions. LNCS 10116 contains the papers selected
https://magrudy-assets.storage.googleapis.com/9783319544267.jpg
115.490000 USD

Computer Vision - ACCV 2016 Workshops: ACCV 2016 International Workshops, Taipei, Taiwan, November 20-24, 2016, Revised Selected Papers, Part II

Paperback
Book cover image
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The ...
Architectural Transformations in Network Services and Distributed Systems
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed.
https://magrudy-assets.storage.googleapis.com/9783658148409.jpg
78.740000 USD

Architectural Transformations in Network Services and Distributed Systems

by Josef Spillner, Andriy Luntovskyy
Paperback
Book cover image
This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and ...
Information Science and Applications (ICISA) 2016: 2016
This book contains selected papers from the 7th International Conference on Information Science and Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The contributions describe the most recent developments in information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readers are researchers in academia, industry and other research institutes focusing on information science and technology.
https://magrudy-assets.storage.googleapis.com/9789811005565.jpg
524.990000 USD

Information Science and Applications (ICISA) 2016: 2016

Hardback
Book cover image
The emphasis in this book is placed on general models (Markov chains, random fields, random graphs), universal methods (the probabilistic method, the coupling method, the Stein-Chen method, martingale methods, the method of types) and versatile tools (Chernoff's bound, Hoeffding's inequality, Holley's inequality) whose domain of application extends far beyond the ...
Discrete Probability - Models and Methods: Probability on Graphs and Trees, Markov Chains and Random Fields, Entropy and Coding
The emphasis in this book is placed on general models (Markov chains, random fields, random graphs), universal methods (the probabilistic method, the coupling method, the Stein-Chen method, martingale methods, the method of types) and versatile tools (Chernoff's bound, Hoeffding's inequality, Holley's inequality) whose domain of application extends far beyond the present text. Although the examples treated in the book relate to the possible applications, in the communication and computing sciences, in operations research and in physics, this book is in the first instance concerned with theory. The level of the book is that of a beginning graduate course. It is self-contained, the prerequisites consisting merely of basic calculus (series) and basic linear algebra (matrices). The reader is not assumed to be trained in probability since the first chapters give in considerable detail the background necessary to understand the rest of the book.
https://magrudy-assets.storage.googleapis.com/9783319434759.jpg
136.49 USD

Discrete Probability - Models and Methods: Probability on Graphs and Trees, Markov Chains and Random Fields, Entropy and Coding

by Pierre Bremaud
Hardback
Book cover image
Information retrieval used to mean looking through thousands of strings of texts to find words or symbols that matched a user's query. Today, there are many models that help index and search more effectively so retrieval takes a lot less time. Information retrieval (IR) is often seen as a subfield ...
Fuzzy Information Retrieval
Information retrieval used to mean looking through thousands of strings of texts to find words or symbols that matched a user's query. Today, there are many models that help index and search more effectively so retrieval takes a lot less time. Information retrieval (IR) is often seen as a subfield of computer science and shares some modeling, applications, storage applications and techniques, as do other disciplines like artificial intelligence, database management, and parallel computing. This book introduces the topic of IR and how it differs from other computer science disciplines. A discussion of the history of modern IR is briefly presented, and the notation of IR as used in this book is defined. The complex notation of relevance is discussed. Some applications of IR is noted as well since IR has many practical uses today. Using information retrieval with fuzzy logic to search for software terms can help find software components and ultimately help increase the reuse of software. This is just one practical application of IR that is covered in this book. Some of the classical models of IR is presented as a contrast to extending the Boolean model. This includes a brief mention of the source of weights for the various models. In a typical retrieval environment, answers are either yes or no, i.e., on or off. On the other hand, fuzzy logic can bring in a degree of match, vs. a crisp, i.e., strict match. This, too, is looked at and explored in much detail, showing how it can be applied to information retrieval. Fuzzy logic is often times considered a soft computing application and this book explores how IR with fuzzy logic and its membership functions as weights can help indexing, querying, and matching. Since fuzzy set theory and logic is explored in IR systems, the explanation of where the fuzz is ensues. The concept of relevance feedback, including pseudorelevance feedback is explored for the various models of IR. For the extended Boolean model, the use of genetic algorithms for relevance feedback is delved into. The concept of query expansion is explored using rough set theory. Various term relationships is modeled and presented, and the model extended for fuzzy retrieval. An example using the UMLS terms is also presented. The model is also extended for term relationships beyond synonyms. Finally, this book looks at clustering, both crisp and fuzzy, to see how that can improve retrieval performance. An example is presented to illustrate the concepts.
https://magrudy-assets.storage.googleapis.com/9781627059527.jpg
36.750000 USD

Fuzzy Information Retrieval

by Donald H. Kraft
Paperback
Book cover image
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected ...
Foundations and Practice of Security: 9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016. Revised Selected Papers
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016. The 18 revised regular papers presented together with 5 short papers and 3 invited talks were carefully reviewed and selected from 34 submissions. The accepted papers cover diverse research themes, ranging from classic topics, such as malware, anomaly detection, and privacy, to emerging issues, such as security and privacy in mobile computing and cloud.
https://magrudy-assets.storage.googleapis.com/9783319519654.jpg
83.990000 USD

Foundations and Practice of Security: 9th International Symposium, FPS 2016, Quebec City, QC, Canada, October 24-25, 2016. Revised Selected Papers

Paperback
Page 1 of 40