Filter
(found 196352 products)
Book cover image
Videogames were once made with a vast range of tools and technologies, but in recent years a small number of commercially available 'game engines' have reached an unprecedented level of dominance in the global videogame industry. In particular, the Unity game engine has penetrated all scales of videogame development, from ...
The Unity Game Engine and the Circuits of Cultural Software
Videogames were once made with a vast range of tools and technologies, but in recent years a small number of commercially available 'game engines' have reached an unprecedented level of dominance in the global videogame industry. In particular, the Unity game engine has penetrated all scales of videogame development, from the large studio to the hobbyist bedroom, such that over half of all new videogames are reportedly being made with Unity. This book provides an urgently needed critical analysis of Unity as 'cultural software' that facilitates particular production workflows, design methodologies, and software literacies. Building on long-standing methods in media and cultural studies, and drawing on interviews with a range of videogame developers, Benjamin Nicoll and Brendan Keogh argue that Unity deploys a discourse of democratization to draw users into its 'circuits of cultural software'. For scholars of media production, software culture, and platform studies, this book provides a framework and language to better articulate the increasingly dominant role of software tools in cultural production. For videogame developers, educators, and students, it provides critical and historical grounding for a tool that is widely used yet rarely analysed from a cultural angle.
https://magrudy-assets.storage.googleapis.com/9783030250119.jpg
62.990000 USD

The Unity Game Engine and the Circuits of Cultural Software

by Brendan Keogh, Benjamin Nicoll
Hardback
Book cover image
This book reviews the literature on hand posture estimation using generative methods, identifying the current gaps, such as sensitivity to hand shapes, sensitivity to a good initial posture, difficult hand posture recovery in cases of loss in tracking, and lack of addressing multiple objectives to maximize accuracy and minimize computational ...
Optimisation Algorithms for Hand Posture Estimation
This book reviews the literature on hand posture estimation using generative methods, identifying the current gaps, such as sensitivity to hand shapes, sensitivity to a good initial posture, difficult hand posture recovery in cases of loss in tracking, and lack of addressing multiple objectives to maximize accuracy and minimize computational cost. To fill these gaps, it proposes a new 3D hand model that combines the best features of the current 3D hand models in the literature. It also discusses the development of a hand shape optimization technique. To find the global optimum for the single-objective problem formulated, it improves and applies particle swarm optimization (PSO), one of the most highly regarded optimization algorithms and one that is used successfully in both science and industry. After formulating the problem, multi-objective particle swarm optimization (MOPSO) is employed to estimate the Pareto optimal front as the solution for this bi-objective problem. The book also demonstrates the effectiveness of the improved PSO in hand posture recovery in cases of tracking loss. Lastly, the book examines the formulation of hand posture estimation as a bi-objective problem for the first time. The case studies included feature 50 hand postures extracted from five standard datasets, and were used to benchmark the proposed 3D hand model, hand shape optimization, and hand posture recovery.
https://magrudy-assets.storage.googleapis.com/9789811397561.jpg
157.490000 USD

Optimisation Algorithms for Hand Posture Estimation

by Seyedali Mirjalili, Shahrzad Saremi
Hardback
Book cover image
This book addresses the topic of hyperconnectivity by building on, expanding, and critically examining issues that have to do with information communication technology (ICT) and networked societies. The book explores questions relating to attention and consciousness, techno-capitalism and communicative action taking. Adopting different philosophical angles to assess the challenges we ...
Hyperconnectivity and Digital Reality: Towards the Eutopia of Being Human
This book addresses the topic of hyperconnectivity by building on, expanding, and critically examining issues that have to do with information communication technology (ICT) and networked societies. The book explores questions relating to attention and consciousness, techno-capitalism and communicative action taking. Adopting different philosophical angles to assess the challenges we face due to our entanglement with hyperconnected technologies, the book studies performance and performativity in a digitised world by considering the unfolding of our onlife and by looking at what this means to educated future scientists and engineers in a hyperconnected world. The book further discusses digital activities as the new constructs of ourselves and poses questions about how much literacy is needed for us not to be enslaved by those constructs. The book also explores the challenges of hyperconnectivity and the health sector to showcase the vulnerabilities we are increasingly exposed to. It makes clear that - since the boundaries between on- and offline are becoming increasingly blurred - we will require new, flexible frameworks that reconsider what it means to be human in a hyperconnected world.
https://magrudy-assets.storage.googleapis.com/9783030241421.jpg
115.490000 USD

Hyperconnectivity and Digital Reality: Towards the Eutopia of Being Human

Hardback
Book cover image
Over the past 15 years, there has been a growing need in the medical image computing community for principled methods to process nonlinear geometric data. Riemannian geometry has emerged as one of the most powerful mathematical and computational frameworks for analyzing such data. Riemannian Geometric Statistics in Medical Image Analysis ...
Riemannian Geometric Statistics in Medical Image Analysis
Over the past 15 years, there has been a growing need in the medical image computing community for principled methods to process nonlinear geometric data. Riemannian geometry has emerged as one of the most powerful mathematical and computational frameworks for analyzing such data. Riemannian Geometric Statistics in Medical Image Analysis is a complete reference on statistics on Riemannian manifolds and more general nonlinear spaces with applications in medical image analysis. It provides an introduction to the core methodology followed by a presentation of state-of-the-art methods. Beyond medical image computing, the methods described in this book may also apply to other domains such as signal processing, computer vision, geometric deep learning, and other domains where statistics on geometric features appear. As such, the presented core methodology takes its place in the field of geometric statistics, the statistical analysis of data being elements of nonlinear geometric spaces. The foundational material and the advanced techniques presented in the later parts of the book can be useful in domains outside medical imaging and present important applications of geometric statistics methodology Content includes: The foundations of Riemannian geometric methods for statistics on manifolds with emphasis on concepts rather than on proofs Applications of statistics on manifolds and shape spaces in medical image computing Diffeomorphic deformations and their applications As the methods described apply to domains such as signal processing (radar signal processing and brain computer interaction), computer vision (object and face recognition), and other domains where statistics of geometric features appear, this book is suitable for researchers and graduate students in medical imaging, engineering and computer science.
https://magrudy-assets.storage.googleapis.com/9780128147252.jpg
131.250000 USD

Riemannian Geometric Statistics in Medical Image Analysis

Paperback / softback
Book cover image
Reliable test design is important in software testing; without it, defects in software may remain undetected. This book presents the key test design techniques, in line with ISTQB, and explains when and how to use them, including in combination, with practical, real-life examples. Automated test design methods are also explored. ...
Practical Test Design: Selection of traditional and automated test design techniques
Reliable test design is important in software testing; without it, defects in software may remain undetected. This book presents the key test design techniques, in line with ISTQB, and explains when and how to use them, including in combination, with practical, real-life examples. Automated test design methods are also explored. Tips and exercises are included throughout the book, allowing you to test your knowledge as you progress.
https://magrudy-assets.storage.googleapis.com/9781780174723.jpg
65.07 USD

Practical Test Design: Selection of traditional and automated test design techniques

by Attila Kovacs, Istvan Forgacs
Paperback / softback
Book cover image
This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more green supply ...
Integration of Information Flow for Greening Supply Chain Management
This book provides a framework for integrating information management in supply chains. Current trends in business practice have made it necessary to explore the potential held by information integration with regard to environmental aspects. Information flow integration provides an opportunity to focus on the creation of a more green supply chain. However, it is currently difficult to identify the impact of information integration on greening a supply chain in a wide range of practical applications. Accordingly, this book focuses on the potential value of information integration solutions in terms of greening supply chain management. It covers the following major topics: Application of information flow standards in the supply chain Information systems and technological solutions for integrating information flows in supply chains The Internet of Things and the industry 4.0 concept, with regard to the integration of supply chains Modeling and simulation of logistics processes Decision-making tools enabling the greening of supply chains
https://magrudy-assets.storage.googleapis.com/9783030243548.jpg
157.490000 USD

Integration of Information Flow for Greening Supply Chain Management

Hardback
Book cover image
This book presents the outcomes of the 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019), which was held on July 8-10, 2019, in Toyama, Japan. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer ...
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
This book presents the outcomes of the 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2019), which was held on July 8-10, 2019, in Toyama, Japan. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them. The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference's most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.
https://magrudy-assets.storage.googleapis.com/9783030264277.jpg
167.990000 USD

Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing

Hardback
Book cover image
The book provides readers with an overview of the state of the art in the field of Industry 4.0 and related research advancements. The respective chapters identify and discuss new dimensions of both risk factors and success factors, along with performance metrics that can be employed in future research work. ...
New Paradigm of Industry 4.0: Internet of Things, Big Data & Cyber Physical Systems
The book provides readers with an overview of the state of the art in the field of Industry 4.0 and related research advancements. The respective chapters identify and discuss new dimensions of both risk factors and success factors, along with performance metrics that can be employed in future research work. They also discuss a number of real-time issues, problems and applications with corresponding solutions and suggestions. Sharing new theoretical findings, tools and techniques for Industry 4.0, and covering both theoretical and application-oriented approaches, the book offers a valuable asset for newcomers to the field and practicing professionals alike.
https://magrudy-assets.storage.googleapis.com/9783030257774.jpg
188.990000 USD

New Paradigm of Industry 4.0: Internet of Things, Big Data & Cyber Physical Systems

Hardback
Book cover image
Developers often struggle when first encountering the cloud. Learning about distributed systems, becoming familiar with technologies such as containers and functions, and knowing how to put everything together can be daunting. With this practical guide, you'll get up to speed on patterns for building cloud native applications and best practices ...
Cloud Native: Using containers, functions, and data to build next-generation applications
Developers often struggle when first encountering the cloud. Learning about distributed systems, becoming familiar with technologies such as containers and functions, and knowing how to put everything together can be daunting. With this practical guide, you'll get up to speed on patterns for building cloud native applications and best practices for common tasks such as messaging, eventing, and DevOps. Authors Boris Scholl, Trent Swanson, and Peter Jausovec describe the architectural building blocks for a modern cloud native application. You'll learn how to use microservices, containers, serverless computing, storage types, portability, and functions. You'll also explore the fundamentals of cloud native applications, including how to design, develop, and operate them. Explore the technologies you need to design a cloud native application Distinguish between containers and functions, and learn when to use them Architect applications for data-related requirements Learn DevOps fundamentals and practices for developing, testing, and operating your applications Use tips, techniques, and best practices for building and managing cloud native applications Understand the costs and trade-offs necessary to make an application portable
https://magrudy-assets.storage.googleapis.com/9781492053828.jpg
62.990000 USD

Cloud Native: Using containers, functions, and data to build next-generation applications

by Peter Jausovec, Trent Swanson, Boris Scholl
Paperback / softback
Book cover image
This book demonstrates how the creation of emotional satisfaction will change in tomorrow's connected, IoT world. The importance of emotional satisfaction will increase in the IoT Connected Society of World 2.0, in which humans and machines work together as members of the same team with no walls between the two, ...
Self Engineering: Learning From Failures
This book demonstrates how the creation of emotional satisfaction will change in tomorrow's connected, IoT world. The importance of emotional satisfaction will increase in the IoT Connected Society of World 2.0, in which humans and machines work together as members of the same team with no walls between the two, and where production is also team-based. Developing emotional satisfaction in such a diverse team and in a very different environment is a major challenge and needs to be studied from a broad perspective. This book describes the emerging issues and how they can be to tackled, introducing paths for moving beyond static value toward developing dynamic value.
https://magrudy-assets.storage.googleapis.com/9783030267247.jpg
62.990000 USD

Self Engineering: Learning From Failures

by Shuichi Fukuda
Paperback / softback
Book cover image
Development of formal proofs of correctness of programs can increase actual and perceived reliability and facilitate better understanding of program specifications and their underlying assumptions. Tools supporting such development have been available for over 40 years but have only recently seen wide practical use. Projects based on construction of machine-checked ...
QED at Large: A Survey of Engineering of Formally Verified Software
Development of formal proofs of correctness of programs can increase actual and perceived reliability and facilitate better understanding of program specifications and their underlying assumptions. Tools supporting such development have been available for over 40 years but have only recently seen wide practical use. Projects based on construction of machine-checked formal proofs are now reaching an unprecedented scale, comparable to large software projects, which leads to new challenges in proof development and maintenance. Despite its increasing importance, the field of proof engineering is seldom considered in its own right; related theories, techniques, and tools span many fields and venues. QED at Large covers the timeline and research literature concerning proof development for program verification, including theories, languages, and tools. It emphasizes challenges and breakthroughs at each stage in history and highlights challenges that are currently present due to the increasing scale of proof developments. This monograph is intended for use by researchers and students who are new to the field. It provides the reader with an insightful overview of the work that has led to modern-day techniques for formally verifying software. In times of increasing automation, this underpins many software systems so future trends are also highlighted.
https://magrudy-assets.storage.googleapis.com/9781680835946.jpg
103.950000 USD

QED at Large: A Survey of Engineering of Formally Verified Software

by Zachary Tatlock, Milos Gligoric, Ilya Sergey, Karl Palmskog, Talia Ringer
Paperback / softback
Book cover image
If you're one of many developers still uncertain about concurrent and multithreaded development, this practical cookbook will change your mind. With more than 85 code-rich recipes in this updated second edition, author Stephen Cleary demonstrates parallel processing and asynchronous programming techniques using libraries and language features in .NET and C# ...
Concurrency in C# Cookbook: Asynchronous, Parallel, and Multithreaded Programming
If you're one of many developers still uncertain about concurrent and multithreaded development, this practical cookbook will change your mind. With more than 85 code-rich recipes in this updated second edition, author Stephen Cleary demonstrates parallel processing and asynchronous programming techniques using libraries and language features in .NET and C# 8.0. Concurrency is now more common in responsive and scalable application development, but it's still extremely difficult to code. The detailed solutions in this cookbook show you how modern tools raise the level of abstraction, making concurrency much easier than before. Complete with ready-to-use code and discussions about how and why solutions work, these recipes help you: Get up to speed on concurrency and async and parallel programming Use async and await for asynchronous operations Enhance your code with asynchronous streams Explore parallel programming with .NET's Task Parallel Library Create dataflow pipelines with .NET's TPL Dataflow library Understand the capabilities that System.Reactive builds on top of LINQ Utilize threadsafe and immutable collections Learn how to conduct unit testing with concurrent code Make the thread pool work for you Enable clean, cooperative cancellation Examine scenarios for combining concurrent approaches Dive into asynchronous-friendly object-oriented programming Recognize and write adapters for code using older asynchronous styles
https://magrudy-assets.storage.googleapis.com/9781492054504.jpg
52.490000 USD

Concurrency in C# Cookbook: Asynchronous, Parallel, and Multithreaded Programming

by Stephen Cleary
Paperback / softback
Book cover image
This book gathers the outcomes of the 7th International Conference on Applied Computing and Information Technology (ACIT 2019), which was held on May 29-31, 2019 in Honolulu, Hawaii. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to ...
Applied Computing and Information Technology
This book gathers the outcomes of the 7th International Conference on Applied Computing and Information Technology (ACIT 2019), which was held on May 29-31, 2019 in Honolulu, Hawaii. The aim of the conference was to bring together researchers and scientists, businesspeople and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Further, they presented research results on all aspects (theory, applications and tools) of computer and information science, and discussed the practical challenges encountered in their work and the solutions they adopted to overcome them. The book highlights the best papers from those accepted for presentation at the conference. They were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round, 15 of the conference's most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.
https://magrudy-assets.storage.googleapis.com/9783030252168.jpg
157.490000 USD

Applied Computing and Information Technology

Hardback
Book cover image
Create games from start to finish while learning game design and programming principles using the GameMaker Studio 2 game engine and GameMaker Language (GML). Game Development with GameMaker Studio 2 covers all aspects of game design and development from the initial idea to the final release, using an award-winning game ...
Game Development with GameMaker Studio 2: Make Your Own Games with GameMaker Language
Create games from start to finish while learning game design and programming principles using the GameMaker Studio 2 game engine and GameMaker Language (GML). Game Development with GameMaker Studio 2 covers all aspects of game design and development from the initial idea to the final release, using an award-winning game engine. You learn how to create real-world video games based on classic and legendary video game genres. Each game project introduces and explains concepts of game development and design and coding principles, allowing you to build a wide set of skills while creating an exciting portfolio to kick-start a career in game development. Author Sebastiano Cossu teaches you to design levels in your games, draw sprites to populate your virtual worlds, program game objects for interaction with the player, incorporate custom music and sound effects, build GUIs for your menus and game interfaces, and support keyboard, mouse, and gamepad controls in your projects. He shows you how to build cross-platform games to run on all desktop platforms (Windows, Linux, Mac OS) and publish them on the most popular game stores such as Steam, GOG, Humble Store, and Itch.io. What You'll Learn Create games for different genres Master GameMaker Language (GML) programming Apply game design principles Delve into game programming patterns Who This Book is For Video game enthusiasts interested in game development and design. No prior programming experience is required.
https://magrudy-assets.storage.googleapis.com/9781484250099.jpg
36.740000 USD

Game Development with GameMaker Studio 2: Make Your Own Games with GameMaker Language

by Sebastiano M. Cossu
Paperback / softback
Book cover image
Build Java-based enterprise applications using the open source Eclipse Jakarta EE platform. This feature-packed book teaches you enterprise Java development top to bottom. It covers Java web-tier development using servlets, JavaServer Faces (JSF), RESTful applications, and JSON. You'll also cover Java data-tier development using persistence and transaction handling, messaging services, ...
Beginning Jakarta EE: Enterprise Edition for Java: From Novice to Professional
Build Java-based enterprise applications using the open source Eclipse Jakarta EE platform. This feature-packed book teaches you enterprise Java development top to bottom. It covers Java web-tier development using servlets, JavaServer Faces (JSF), RESTful applications, and JSON. You'll also cover Java data-tier development using persistence and transaction handling, messaging services, remote procedure calls, concurrency, and security to round out a complete Java-based enterprise application. Step by step and easy to follow, Beginning Jakarta EE includes many practical examples. Written by a Java expert and consultant, this book contains the best information possible on enterprise Java technologies. You'll see that Jakarta EE is the next evolution of Java EE 8 and how it is one of the leading Java platforms for enterprise application development. What You Will Learn Build enterprise Java applications using Jakarta EE Set up your development environment Create page-flow web applications with JSF Write single-page web applications with REST and JSON Persist data using JPA in Jakarta EE Build enterprise Java modules using EJBs and CDI Work with transaction engines using JTA Secure, log, and monitor your Jakarta EE applications Who This Book Is For Beginning Java EE application developers with some experience of Java 8.
https://magrudy-assets.storage.googleapis.com/9781484250785.jpg
34.640000 USD

Beginning Jakarta EE: Enterprise Edition for Java: From Novice to Professional

by Peter Spath
Paperback / softback
Book cover image
Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this ...
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security
Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous functionalities but randomized manifestations. The 10 papers included in this State-of-the Art Survey present recent advances made by a large team of researchers working on the same US Department of Defense Multidisciplinary University Research Initiative (MURI) project during 2013-2019. This project has developed a new class of technologies called Adaptive Cyber Defense (ACD) by building on two active but heretofore separate research areas: Adaptation Techniques (AT) and Adversarial Reasoning (AR). AT methods introduce diversity and uncertainty into networks, applications, and hosts. AR combines machine learning, behavioral science, operations research, control theory, and game theory to address the goal of computing effective strategies in dynamic, adversarial environments.
https://magrudy-assets.storage.googleapis.com/9783030307189.jpg
73.490000 USD

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security

Paperback / softback
Book cover image
This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 45 submissions. The conference was organized in tracks on security, usability and technical issues, administrative, legal, ...
Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings
This book constitutes the proceedings of the 4th International Conference on Electronic Voting, E-Vote-ID 2019, held in Bregenz, Austria, in October 2019. The 13 revised full papers presented were carefully reviewed and selected from 45 submissions. The conference was organized in tracks on security, usability and technical issues, administrative, legal, political and social issues, elections and practical experiences, posters and e-voting system demo.
https://magrudy-assets.storage.googleapis.com/9783030306243.jpg
73.490000 USD

Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings

Paperback / softback
Book cover image
The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio ...
Introduction to the Theory of Radiopolarimetric Navigation Systems
The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio waves polarization when they are reflected from objects with non-linear properties. The purpose of this book is to develop the foundations for creating autonomous radionavigation systems to provide aviation with navigation systems that will substantially increase its capabilities, specifically acting where satellite technologies do not work. The book is intended for specialists involved in the development and operation of aviation-technical complexes, as well as for specialists of national aviation regulators and ICAO experts dealing with the problems of improving flight safety.
https://magrudy-assets.storage.googleapis.com/9789811383946.jpg
188.990000 USD

Introduction to the Theory of Radiopolarimetric Navigation Systems

by Zavalishin O.I., Shatrakov Y.G., Sarychev V.A., Logvin A.I., Kozlov A.I.
Hardback
Book cover image
This year the 21st International Conference on Human-Computer Interaction, HCII 2019, which was held in Orlando, Florida, USA, in July 2019, introduced the additional option of late-breaking work , which applied both for papers and posters with the corresponding volumes of the proceedings. The 47 late-breaking papers included in this ...
HCI International 2019 - Late Breaking Papers: 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings
This year the 21st International Conference on Human-Computer Interaction, HCII 2019, which was held in Orlando, Florida, USA, in July 2019, introduced the additional option of late-breaking work , which applied both for papers and posters with the corresponding volumes of the proceedings. The 47 late-breaking papers included in this volume were published after the conference has taken place. They were organized in the following topical sections: user experience design and evaluation; information, visualization, and decision making; virtual and augmented reality; learning and games; human and task models in HCI; and design and user experience case studies.
https://magrudy-assets.storage.googleapis.com/9783030300326.jpg
115.490000 USD

HCI International 2019 - Late Breaking Papers: 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings

Paperback / softback
Book cover image
Role of Blockchain Technology in IoT Applications, Volume 115 in the Advances in Computers series, reviews the latest information on this topic that promises many applications in human life. According to forecasts made by various market research/survey agencies, there will be around 50 Billion connected devices (IoT) by 2020. Updates ...
Role of Blockchain Technology in IoT Applications: Volume 115
Role of Blockchain Technology in IoT Applications, Volume 115 in the Advances in Computers series, reviews the latest information on this topic that promises many applications in human life. According to forecasts made by various market research/survey agencies, there will be around 50 Billion connected devices (IoT) by 2020. Updates in this new release include chapters on the Technical Aspects of Blockchain and IoT, Integrated Platforms for Blockchain-Enablement, Intersections Between IoT and Distributed Ledger, Blockchain and Artificial Intelligence: How and Why Combining These Two Groundbreaking Technologies, Blockchain Applications in Health Care and Opportunities and Advancements Due to New Information Technology Frameworks, and more.
https://magrudy-assets.storage.googleapis.com/9780128171899.jpg
191.100000 USD

Role of Blockchain Technology in IoT Applications: Volume 115

Hardback
Book cover image
A rare insight into how industry practices like regional restrictions have shaped global media culture in the digital era This content is not available in your country. At some point, most media consumers around the world have run into a message like this. Whether trying to watch a DVD purchased ...
Locked Out: Regional Restrictions in Digital Entertainment Culture
A rare insight into how industry practices like regional restrictions have shaped global media culture in the digital era This content is not available in your country. At some point, most media consumers around the world have run into a message like this. Whether trying to watch a DVD purchased during a vacation abroad, play an imported Japanese video game, or listen to a Spotify library while traveling, we are constantly reminded of geography's imprint on digital culture. We are locked out. Despite utopian hopes of a borderless digital society, DVDs, video games, and streaming platforms include digital rights management mechanisms that block media access within certain territories. These technologies of regional lockout are meant first and foremost to keep the entertainment industries' global markets distinct. But they also frustrate consumers and place territories on a hierarchy of global media access. Drawing on extensive research of media-industry strategies, consumer and retailer practices, and media regulation, Locked Out explores regional lockout's consequences for media around the globe. Power and capital are at play when it comes to who can consume what content and who can be a cultural influence. Looking across digital technologies, industries, and national contexts, Locked Out argues that the practice of regional lockout has shaped and reinforced global hierarchies of geography and culture.
https://magrudy-assets.storage.googleapis.com/9781479873876.jpg
44.61 USD

Locked Out: Regional Restrictions in Digital Entertainment Culture

by Evan Elkins
Paperback / softback
Book cover image
The first book to look critically at digital technologies and the role they play within queer lives in contemporary India This pioneering interdisciplinary collection works across mainstream and alternative spaces such as Twitter, Youtube, Facebook, Grindr and gay men's health websites. These digital platforms are then situated within the contemporary ...
Queering Digital India: Activisms, Identities, Subjectivities
The first book to look critically at digital technologies and the role they play within queer lives in contemporary India This pioneering interdisciplinary collection works across mainstream and alternative spaces such as Twitter, Youtube, Facebook, Grindr and gay men's health websites. These digital platforms are then situated within the contemporary socio-political conjuncture in India, offering a way of understanding queerness and Indian-ness in contemporary India. Queering in this book does not simply refer to a sexual category rather queerness is a mode of dispossession through which certain bodies are rendered as bodies marked for discipline and regulation. This book takes on diverse strands of queer theory in order to name the ways neoliberalism, nationalism, digital technologies, and movements for queer rights converge with each other within present day India. This analytical approach to queerness in India is the first of its kind and the result is a pioneering interdisciplinary collection.
https://magrudy-assets.storage.googleapis.com/9781474452663.jpg
26.200000 USD

Queering Digital India: Activisms, Identities, Subjectivities

Paperback / softback
Book cover image
Modern cyber systems acquire more emergent system properties, as far as their complexity increases: cyber resilience, controllability, self-organization, proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience ...
Cyber Resilience
Modern cyber systems acquire more emergent system properties, as far as their complexity increases: cyber resilience, controllability, self-organization, proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system, especially during the transition to the sixth technological stage and related Industry 4.0 technologies: Artificial Intelligence (AI), Cloud and foggy computing, 5G +, IoT/IIoT, Big Data and ETL, Q-computing, Blockchain, VR/AR, etc. We should even consider the cyber resilience as a primary one, because the mentioned systems cannot exist without it. Indeed, without the sustainable formation made of the interconnected components of the critical information infrastructure, it does not make sense to discuss the existence of 4.0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats, the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4.0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and sleep hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery. A new formulation of the cyber resilience problem under heterogeneous mass cyber-attacks is proposed, in which the cyber system performance recovery in destructive software impacts prevents significant or catastrophic consequences. Here, the idea of ensuring the cyber resilience is to give the cyber systems the ability to develop immunity to disturbances of the computational processes under destructive influences, by analogy with the immune system protecting a living organism. The book contains three chapters, devoted to the following topics: - Development of the Cyber Resilience Management Concept of modern technological platforms and cyber-systems of 4.0 Industry; - Development of a corporate cyber risk management methodology; - Technical implementation of the corporate program of business sustainability management based on the best practices (standards).
https://magrudy-assets.storage.googleapis.com/9788770221160.jpg
120.750000 USD

Cyber Resilience

by Sergei Petrenko
Hardback
Book cover image
This open access book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile software development conference combining research and practice. It is a hybrid forum ...
Agile Processes in Software Engineering and Extreme Programming - Workshops: XP 2019 Workshops, Montreal, QC, Canada, May 21-25, 2019, Proceedings
This open access book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile software development conference combining research and practice. It is a hybrid forum where agile researchers, academics, practitioners, thought leaders, coaches, and trainers get together to present and discuss their most recent innovations, research results, experiences, concerns, challenges, and trends. Following this history, for both researchers and seasoned practitioners XP 2019 provided an informal environment to network, share, and discover trends in Agile for the next 20 years. Research papers and talks submissions were invited for the three XP 2019 research workshops, namely, agile transformation, autonomous teams, and large scale agile. This book includes 15 related papers. In addition, a summary for each of the four panels at XP 2019 is included. The panels were on security and privacy; the impact of the agile manifesto on culture, education, and software practices; business agility - agile's next frontier; and Agile - the next 20 years.
https://magrudy-assets.storage.googleapis.com/9783030301255.jpg
62.990000 USD

Agile Processes in Software Engineering and Extreme Programming - Workshops: XP 2019 Workshops, Montreal, QC, Canada, May 21-25, 2019, Proceedings

Paperback / softback
Book cover image
This volume presents selected papers from the International Conference on Reliability, Safety, and Hazard. It presents the latest developments in reliability engineering and probabilistic safety assessment, and brings together contributions from a diverse international community and covers all aspects of safety, reliability, and hazard assessment across a host of interdisciplinary ...
Reliability, Safety and Hazard Assessment for Risk-Based Technologies: Proceedings of ICRESH 2019
This volume presents selected papers from the International Conference on Reliability, Safety, and Hazard. It presents the latest developments in reliability engineering and probabilistic safety assessment, and brings together contributions from a diverse international community and covers all aspects of safety, reliability, and hazard assessment across a host of interdisciplinary applications. This book will be of interest to researchers in both academia and the industry.
https://magrudy-assets.storage.googleapis.com/9789811390074.jpg
262.490000 USD

Reliability, Safety and Hazard Assessment for Risk-Based Technologies: Proceedings of ICRESH 2019

Hardback
Book cover image
A rare insight into how industry practices like regional restrictions have shaped global media culture in the digital era This content is not available in your country. At some point, most media consumers around the world have run into a message like this. Whether trying to watch a DVD purchased ...
Locked Out: Regional Restrictions in Digital Entertainment Culture
A rare insight into how industry practices like regional restrictions have shaped global media culture in the digital era This content is not available in your country. At some point, most media consumers around the world have run into a message like this. Whether trying to watch a DVD purchased during a vacation abroad, play an imported Japanese video game, or listen to a Spotify library while traveling, we are constantly reminded of geography's imprint on digital culture. We are locked out. Despite utopian hopes of a borderless digital society, DVDs, video games, and streaming platforms include digital rights management mechanisms that block media access within certain territories. These technologies of regional lockout are meant first and foremost to keep the entertainment industries' global markets distinct. But they also frustrate consumers and place territories on a hierarchy of global media access. Drawing on extensive research of media-industry strategies, consumer and retailer practices, and media regulation, Locked Out explores regional lockout's consequences for media around the globe. Power and capital are at play when it comes to who can consume what content and who can be a cultural influence. Looking across digital technologies, industries, and national contexts, Locked Out argues that the practice of regional lockout has shaped and reinforced global hierarchies of geography and culture.
https://magrudy-assets.storage.googleapis.com/9781479830572.jpg
93.450000 USD

Locked Out: Regional Restrictions in Digital Entertainment Culture

by Evan Elkins
Hardback
Book cover image
Understand the constructs of the Python programming language and use them to build data science projects Key Features Learn the basics of developing applications with Python and deploy your first data application Take your first steps in Python programming by understanding and using data structures, variables, and loops Delve into ...
Learn Python by Building Data Science Applications: A fun, project-based guide to learning Python 3 while building real-world apps
Understand the constructs of the Python programming language and use them to build data science projects Key Features Learn the basics of developing applications with Python and deploy your first data application Take your first steps in Python programming by understanding and using data structures, variables, and loops Delve into Jupyter, NumPy, Pandas, SciPy, and sklearn to explore the data science ecosystem in Python Book DescriptionPython is the most widely used programming language for building data science applications. Complete with step-by-step instructions, this book contains easy-to-follow tutorials to help you learn Python and develop real-world data science projects. The secret sauce of the book is its curated list of topics and solutions, put together using a range of real-world projects, covering initial data collection, data analysis, and production. This Python book starts by taking you through the basics of programming, right from variables and data types to classes and functions. You'll learn how to write idiomatic code and test and debug it, and discover how you can create packages or use the range of built-in ones. You'll also be introduced to the extensive ecosystem of Python data science packages, including NumPy, Pandas, scikit-learn, Altair, and Datashader. Furthermore, you'll be able to perform data analysis, train models, and interpret and communicate the results. Finally, you'll get to grips with structuring and scheduling scripts using Luigi and sharing your machine learning models with the world as a microservice. By the end of the book, you'll have learned not only how to implement Python in data science projects, but also how to maintain and design them to meet high programming standards. What you will learn Code in Python using Jupyter and VS Code Explore the basics of coding - loops, variables, functions, and classes Deploy continuous integration with Git, Bash, and DVC Get to grips with Pandas, NumPy, and scikit-learn Perform data visualization with Matplotlib, Altair, and Datashader Create a package out of your code using poetry and test it with PyTest Make your machine learning model accessible to anyone with the web API Who this book is forIf you want to learn Python or data science in a fun and engaging way, this book is for you. You'll also find this book useful if you're a high school student, researcher, analyst, or anyone with little or no coding experience with an interest in the subject and courage to learn, fail, and learn from failing. A basic understanding of how computers work will be useful.
https://magrudy-assets.storage.googleapis.com/9781789535365.jpg
36.740000 USD

Learn Python by Building Data Science Applications: A fun, project-based guide to learning Python 3 while building real-world apps

by David Katz, Philipp Kats
Paperback / softback
Book cover image
In the past decade, social media has become increasingly popular for news consumption due to its easy access, fast dissemination, and low cost.However, social media also enables the wide propagation of fake news, i.e., news with intentionally false information. Fake news on social media can have significant negative societal effects. ...
Detecting Fake News on Social Media
In the past decade, social media has become increasingly popular for news consumption due to its easy access, fast dissemination, and low cost.However, social media also enables the wide propagation of fake news, i.e., news with intentionally false information. Fake news on social media can have significant negative societal effects. Therefore, fake news detection on social media has recently become an emerging research area that is attracting tremendous attention. This book, from a data mining perspective, introduces the basic concepts and characteristics of fake news across disciplines, reviews representative fake news detection methods in a principled way, and illustrates challenging issues of fake news detection on social media. In particular, we discussed the value of news content and social context, and important extensions to handle early detection, weakly-supervised detection, and explainable detection. The concepts, algorithms, and methods described in this lecture can help harness the power of social media to build effective and intelligent fake news detection systems. This book is an accessible introduction to the study of detecting fake news on social media. It is an essential reading for students, researchers, and practitioners to understand, manage, and excel in this area. This book is supported by additional materials, including lecture slides, the complete set of figures, key references, datasets, tools used in this book, and the source code of representative algorithms.
https://magrudy-assets.storage.googleapis.com/9781681735849.jpg
73.450000 USD

Detecting Fake News on Social Media

by Huan Liu, Kai Shu
Hardback
Book cover image
This text presents an historical examination of political fact-checking, highlighting how this is part of a larger phenomenon of online scrutiny that manifests itself in multiple forms. Reflecting the long history of fake facts in America, the book discusses important developments in this area from the emergence of the public ...
From Urban Legends to Political Fact-Checking: Online Scrutiny in America, 1990-2015
This text presents an historical examination of political fact-checking, highlighting how this is part of a larger phenomenon of online scrutiny that manifests itself in multiple forms. Reflecting the long history of fake facts in America, the book discusses important developments in this area from the emergence of the public Internet in the 1990s to the start of the Trump-Clinton presidential election campaigns. Topics and features: describes how some of the major players in political fact-checking began with the purpose of scrutinizing and debunking of urban legends; considers how this was part of a wider culture, encompassing B-grade horror movies, truth-or-fiction television shows, and groups warning about computer viruses; explains how such developments are connected, revealing political fact-checking as one of many forms of scrutiny applied in the face of a complex, dangerous world; provides a range of detailed case studies, covering such topics as the rumors surrounding the 9/11 terrorist attacks, and academic interest in contemporary legends; discusses how pre-Internet technologies such as bulletin boards, Usenet, and proprietary online service providers such as CompuServe and AOL were used to both disseminate and debunk urban legends; examines the rise of political fact-checking, reviewing all of the major initiatives in this area undertaken in the United States. This timely study touches on issues of popular culture and major events, and offers profiles of colorful individuals and organizations, and as such will appeal to a broad audience interested in the history of fact-checking and efforts to protect the political process from falsehoods.
https://magrudy-assets.storage.googleapis.com/9783030229511.jpg
39.890000 USD

From Urban Legends to Political Fact-Checking: Online Scrutiny in America, 1990-2015

by James W. Cortada, William Aspray
Hardback
Book cover image
The development of intelligent systems that can take decisions and perform autonomously might lead to faster and more consistent decisions. A limiting factor for a broader adoption of AI technology is the inherent risks that come with giving up human control and oversight to intelligent machines. For sensitive tasks involving ...
Explainable AI: Interpreting, Explaining and Visualizing Deep Learning
The development of intelligent systems that can take decisions and perform autonomously might lead to faster and more consistent decisions. A limiting factor for a broader adoption of AI technology is the inherent risks that come with giving up human control and oversight to intelligent machines. For sensitive tasks involving critical infrastructures and affecting human well-being or health, it is crucial to limit the possibility of improper, non-robust and unsafe decisions and actions. Before deploying an AI system, we see a strong need to validate its behavior, and thus establish guarantees that it will continue to perform as expected when deployed in a real-world environment. In pursuit of that objective, ways for humans to verify the agreement between the AI decision structure and their own ground-truth knowledge have been explored. Explainable AI (XAI) has developed as a subfield of AI, focused on exposing complex AI models to humans in a systematic and interpretable manner. The 22 chapters included in this book provide a timely snapshot of algorithms, theory, and applications of interpretable and explainable AI and AI techniques that have been proposed recently reflecting the current discourse in this field and providing directions of future development. The book is organized in six parts: towards AI transparency; methods for interpreting AI systems; explaining the decisions of AI systems; evaluating interpretability and explanations; applications of explainable AI; and software for explainable AI.
https://magrudy-assets.storage.googleapis.com/9783030289539.jpg
94.490000 USD

Explainable AI: Interpreting, Explaining and Visualizing Deep Learning

Paperback / softback
Page 40 of 40