ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (228)
  • Data
  • Computer Science  (227)
  • Information Science and Librarianship  (7)
Collection
Source
Language
  • 1
    Unknown
    Beijing : O'Reilly
    Keywords: Open Source ; Urheberrecht ; Copyright
    Pages: Online-Ressource (193 Seiten)
    Edition: 1st ed.
    ISBN: 0596005814
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Beijing : O'Reilly
    Keywords: PHPUnit ; API ; PHP
    Pages: Online-Ressource (84 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897215152
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Unknown
    Bonn : Galileo Press
    Keywords: Informatik ; Informationstechnik ; Lehrbuch
    Description / Table of Contents: Dieses Standardwerk hat sich seit vielen Jahren in Ausbildung und Studium bewährt. Gut strukturiert und in gut lesbaren Lerneinheiten vermittelt es Ihnen einen Überblick über das Gesamtgebiet der Fachinformatik, wie es die Prüfungsordnung der IHK für eine zwei- oder dreijährige Berufsausbildung vorschreibt. Sascha Kersken bietet Ihnen einen leichten Zugang zu allen Themen und Grundlagen der modernen Informationstechnik, wie sie Fachinformatiker in Ihrer Ausbildung benötigen: Aufbau der Computerhardware, Betriebssysteme, Netzwerktechnik, -protokolle und -anwendungen sowie Grundlagen der Programmierung werden ebenso wie das Thema Datenbanken und Multimedia berücksichtigt. Die neue Auflage wurde um viele aktuelle Themen und Trends erweitert. HTML5, CSS3, jQuery, Cloud Computing oder Scrum wurden dabei ebenso behandelt wie die aktuellen Versionen der Betriebssysteme Windows, Mac OS X und Linux.
    Pages: Online-Ressource (1216 Seiten)
    Edition: 6., akt. und erw. Aufl.
    ISBN: 9783836222341
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Bonn : Galileo Press
    Keywords: EXCEL 2007
    Description / Table of Contents: Dieses Buch bietet Ihnen umfassendes Excel-Wissen für den beruflichen Alltag. Es ist gleichermaßen Schritt-für-Schritt-Anleitung und Nachschlagewerk sowie eine Fundgrube praktischer Tipps. Lösungsorientiert lernen Sie »on the job« die wichtigsten Funktionen des Programms.
    Pages: Online-Ressource (1012 Seiten)
    Edition: 3., erw. und akt. Aufl.
    ISBN: 9783898428644
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Spam-Mail ; Computervirus ; Mail-Filter ; Open Source
    Pages: Online-Ressource (351 Seiten)
    Edition: 1. Aufl.
    ISBN: 389721377X
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Unknown
    Rijeka : InTech
    Keywords: computer science ; web engineering ; semantics ; semantic web
    Description / Table of Contents: Chapter 1: UnBBayes: Modeling Uncertainty for Plausible Reasoning in the Semantic Web by Rommel Carvalho, Kathryn Laskey, Paulo Costa, Marcelo Ladeira, Laecio Santos and Shou Matsumoto --- Chapter 2: Alternative Bootstrapping Design for the PORTAL-DOORS Cyberinfrastructure with Self-Referencing and Self-Describing Features by Carl Taswell --- Chapter 3: Providing Semantic Content for the Next Generation Web by Irina Efimenko, Serge Minor, Anatoli Starostin, Grigory Drobyazko and Vladimir Khoroshevsky --- Chapter 4: Sustainable Advantage for the Investor Relations Team through Semantic Content by Daniel Hladky --- Chapter 5: Semantic Infrastructures by Jiri Dokulil, Jakub Yaghob and Filip Zavoral --- Chapter 6: Prime Number Labeling Scheme for Transitive Closure Computation by Gang Wu and Juanzi Li --- Chapter 7: Towards an Automatic Semantic Data Integration: Multi-agent Framework Approach by Miklos Nagy and Maria Vargas-Vera --- Chapter 8: Using Semantic Technology to Enable Behavioural Coordination of Heterogeneous Systems by Artem Katasonov and Vagan Terziyan --- Chapter 9: Leveraging Semantic Web Computing for Context-Aware Software Engineering Environments by Roy Oberhauser --- Chapter 10: Reasoning and Representing Viewpoints on the Semantic Web by Christiana Panayiotou --- Chapter 11: Semantic Web Technologies for Managing EHR-related Clinical Knowledge by Catalina Martinez-Costa, Marcos Menarguez-Tortosa, Jose Alberto Maldonado and Jesualdo Tomas Fernandez-Breis --- Chapter 12: Use Case Semantics for Business Process Validation by Michael Wolters and German Nemirovskij --- Chapter 13: Semantic-based eService Delivery for eGovernment Domain by Luis Alvarez Sabucedo, Luis Anido Rifon, Flavio Corradini, Alberto Polzonetti and Barbara Re --- Chapter 14: Context-aware Service Composition and Change-over Using BPEL Engine and Semantic Web by Yoji Yamato, Yuusuke Nakano and Hiroshi Sunaga --- Chapter 15: Metaphor and the Semantic Web by Jonathan Biguenet, Bogdan D. Czejdo and John Biguenet --- Chapter 16: Code Clone Detection Using String Based Tree Matching Technique by Ali Selamat and Norfaradilla Wahid
    Pages: Online-Ressource (310 Seiten)
    ISBN: 9789537619541
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Information technology ; Information systems ; Information Systems ; Information Systems Applications (incl. Internet) ; IT in Business ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Thinking of Business Processes Systematically --- From Language Acquisition to Subject-oriented Modeling --- The Integrated S-BPM Process Model --- Subject-oriented Process Analysis --- Modeling Processes in a Subject-Oriented Way --- Subject-Oriented Modeling by Construction and Restriction --- Subject-oriented Validation of Processes and Process Models --- Subject-oriented Optimization of Processes --- Organization-specific Implementation of Subject-oriented Processes --- IT-Implementation of Subject-Oriented Business Processes --- Subject-oriented Monitoring of Processes --- A Precise Description of the S-BPM Modeling Method --- Tools for S-BPM --- S-BPM Method by Comparison --- Conclusion --- A Subject-Oriented Interpreter Model for S-BPM
    Pages: Online-Ressource (XVI, 376 pages)
    ISBN: 9783642323928
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Unknown
    Amsterdam : Elsevier
    Pages: Online-Ressource (829-1660)
    ISBN: 9780444512536
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Extrapolation (Mathematics)
    Pages: Online-Ressource (vi, 464 pages)
    Edition: 1st ed
    ISBN: 9780444888143
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Hilbertian Kernels
    Pages: Online-Ressource (xii, 386 pages)
    Edition: 1st ed
    ISBN: 9780444897183
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Unknown
    Bonn : Galileo Press
    Keywords: iPad ; iPhone ; XCode ; Apps
    Description / Table of Contents: Unsere Autoren zeigen Ihnen, wie Sie schnell zur eigenen App kommen. Dabei werden alle wichtigen Themen in der gebotenen Tiefe mit viel Hintergrundwissen beschrieben. Praktische und direkt nachvollziehbare Beispiele helfen beim Verständnis. Natürlich kommt in diesem Buch auch die Programmierung nicht zu kurz. Grundkenntnisse sollten jedoch vorhanden sein. Eine kurze Einführung in Objective-C und Cocoa vermittelt Ihnen alles, was Sie wissen müssen. Inkl. Schnittstellen zum Datenaustausch, Events, Alerts, Datenverwaltung mit Core Data, Sicherheit und die verschiedenen Möglichkeiten der Netzwerkprogrammierung.
    Pages: Online-Ressource (1172 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836227346
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Keywords: (GIS) ; Abfrageoptimierung ; Constraint Databases ; Constraint Datenbanken ; Constraint Processing ; Constraint-Verarbeitung ; Geographic Information Systems ; Geoinformationssysteme ; Indexierungstechniken ; Indexing Techniques ; Query Optimization ; database ; optimization ; programming
    Description / Table of Contents: This book constitutes the refereed proceedings of the ESPRIT Working Group CONTESSA Workshop on Constraint Databases and Applications, held in Friedrichshafen, Germany in September 1995. The 10 full revised papers selected for inclusion in this volume are written by and for practitioners, researchers, and application users of core constraint database technology; they can be classified in three sections on expressiveness of the various constraint database models; implementation and optimization issues in areas like spatial databases, geographic information systems, scheduling and routing. This book is the first to focus on the extension of the important new programming paradigm of constraint processing to database design and management.
    Pages: Online-Ressource (VIII, 192 pages)
    ISBN: 9783540494560
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: Dokument-Bildanalyse - Engineering Drawings - Erkennungsalgorithmen - Graphics Recognition - Ingenieurzeichnungen ; Landkarteninterpretation ; Map Interpretation ; Recognition Algorithms ; algorithms ; cognition ; construction ; knowledge ; learning ; model ; verificat
    Description / Table of Contents: This book contains revised refereed papers selected from the presentations at the First International Workshop on Graphics Recognition, held in University Park, PA, USA, in August 1995. The 23 full papers included are divided into sections on low-level processing, vectorization and segmentation of scanned graphics documents; symbol and diagram recognition, map processing, interpretation of engineering drawings. Each section contains both survey articles to assess the state of the art, and research papers presenting novel results. One section is devoted to a contest held to determine the best algorithm for detection of dashed lines in drawings. The final chapter summarizes the conclusions and recommendations of the discussions held during the workshop.
    Pages: Online-Ressource (X, 314 pages)
    ISBN: 9783540683872
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: 3D Surface Reconstruction - Bildanalyse - Bildverarbeitung - Bildverarbeitungsanwenungen - Closing - Computer Vision ; Mustererkennung ; Triangulation ; digital elevation model ; genetic algorithms ; hidden Markov Model ; image analysis ; model ; rendering ; robot
    Description / Table of Contents: This book presents the proceedings of the Sixth International Conference on Computer Analysis of Images and Patterns, CAIP '95, held in Prague, Czech Republic in September 1995. The volume presents 61 full papers and 75 posters selected from a total of 262 submissions and thus gives a comprehensive view on the state-of-the-art in computer analysis of images and patterns, research, design, and advanced applications. The papers are organized in sections on invariants, segmentation and grouping, optical flow, model recovery and parameter estimation, low level vision, motion detection, structure and matching, active vision and shading, human face recognition, calibration, contour, and sessions on applications in diverse areas.
    Pages: Online-Ressource (XVIII, 962 pages)
    ISBN: 9783540447818
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Unknown
    Berlin ; Heidelberg : Springer
    Keywords: Racter ; information system ; knowledge ; knowledge base ; model ; qualitative inference ; robot
    Description / Table of Contents: This book develops, for the first time, a qualitative model for the representation of spatial knowledge based only on locative relations between the objects involved. The core of this book is devoted to the study of qualitative inference methods that take into account the rich structure of space. These methods can be applied to quite a number of areas characterized by uncertain or incomplete knowledge, as for example geographic information systems, robot control, computer-aided architectural design, and natural language information systems.
    Pages: Online-Ressource (XII, 208 pages)
    ISBN: 9783540484257
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Unknown
    Berlin ; Heidelberg : Springer
    Keywords: Bewegungsanalyse ; Bildfolgen ; Bildverarbeitung ; Image Sequences ; Motion Analysis ; Processing ; Raum-Zeit Bilder ; Space-Time Images ; computer vision ; image processing ; linear optimization
    Description / Table of Contents: Image sequence processing is becoming a tremendous tool to analyze spatio-temporal data in all areas of natural science. It is the key to studythe dynamics of of complex scientific phenomena. Methods from computer science and the field of application are merged establishing new interdisciplinary research areas. This monograph emerged from scientific applications and thus is an example for such an interdisciplinaryapproach. It is addressed both to computer scientists and to researchers from other fields who are applying methods of computer vision. The results presented are mostly from environmental physics (oceanography) but they will be illuminating and helpful for researchers applying similar methods in other areas.
    Pages: Online-Ressource (XIV, 214 pages)
    ISBN: 9783540481454
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: GIS ; Geoinformationssysteme ; database ; databases ; geographic data ; information system ; knowledge engineering ; modeling ; topology
    Description / Table of Contents: The Third International Symposium on Large Spatial Databases (SSD '93) was held at the National University of Singapore in June 1993. The previous meetings of the series were at Sanata Barbara (1989) and Zurich (1991). The meetings are planned as a forum for researchers and practitioners specializing in database theory for and advanced applications of Spatial Information Systems. This volume constitutes the proceedings of the symposium. It contains 25 selected papersand three keynotes papers: "Spatial data management in database systems: research directions" (W. Kim), "From extensible databases to interoperability between multiple databases and GIS applications" (H.-J. Schek), and "The SEQUOIA 2000 project" (M. Stonebraker). The selectedpapers are collected into sections on: data modeling, spatial indexing, indexing mechanisms, handling of raster and vector data, spatial database systems, topology, storage management, query retrieval,knowledge engineering in SDS, and 3-dimensional data handling.
    Pages: Online-Ressource (XV, 537 pages)
    ISBN: 9783540477655
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Unknown
    London : Ubiquity Press
    Keywords: Open Data ; Open Science ; Open Access ; Text Mining ; Data Mining
    Description / Table of Contents: In 2010 the Panton Principles for Open Data in Science were published. These principles were founded upon the idea that "Science is based on building on, reusing and openly criticising the published body of scientific knowledge" (http://pantonprinciples.org) and they provide a succinct list of the fundamentals to observe when making your data open. Intended for a broad audience of academics, publishers and librarians, Issues in Research Data explores the implications of the Panton Principles through a number of perspectives on open research data in the sciences and beyond. The book features chapters by open data experts in a range of academic disciplines, covering practical information on licensing, ethics, and advice for data curators, alongside more theoretical issues surrounding the adoption of open data. As the book is open access, each chapter can stand alone from the main volume so that communities can host, distribute, build upon and remix the content that is relevant to them. Readers can access the online version via the QR code or DOI link at the front of the book.
    Pages: Online-Ressource (VI, 164 Seiten)
    ISBN: 9781909188327
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Unknown
    Rijeka : InTech
    Keywords: artificial intelligence ; pattern recognition
    Description / Table of Contents: Pattern recognition continued to be one of the important research fields in computer science and electrical engineering. Lots of new applications are emerging, and hence pattern analysis and synthesis become significant subfields in pattern recognition. This book is an edited volume and has six chapters arranged into two sections, namely, pattern recognition analysis and pattern recognition applications. This book will be useful for graduate students, researchers, and practicing engineers working in the field of machine vision and computer science and engineering.
    Pages: Online-Ressource (134 Seiten)
    ISBN: 9789535128045
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Unknown
    Rijeka : InTech
    Keywords: mobile devices ; wireless devices ; MANET
    Description / Table of Contents: Chapter 1: Data-Gathering and Aggregation Protocol for Networked Carrier Ad Hoc Networks: The Optimal and Heuristic Approach by Chao Gao, Guorong Zhao and Jianhua Lu --- Chapter 2: A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks by Rutvij H. Jhaveri, Narendra M. Patel and Devesh C. Jinwala --- Chapter 3: Performance Analysis of Three Routing Protocols in MANET Using the NS-2 and ANOVA Test with Varying Speed of Nodes by Subhrananda Goswami, Subhankar Joardar, Chandan Bikash Das, Samarajit Kar and Dibyendu Kumar Pal --- Chapter 4: Cooperative Routing in Multi-Radio Multi-Hop Wireless Network by Kun Xie, Shiming He, Xin Wang, Dafang Zhang and Keqin Li --- Chapter 5: MANET Network in Internet of Things System by Rasa Bruzgiene, Lina Narbutaite and Tomas Adomkus --- Chapter 6: Radio Frequency-Based Indoor Localization in Ad-Hoc Networks by Mehdi Golestanian, Joshua Siva and Christian Poellabauer
    Pages: Online-Ressource (146 Seiten)
    ISBN: 9789535131106
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Unknown
    Rijeka : InTech
    Keywords: Cloud computing ; Internet of Things
    Description / Table of Contents: Chapter 1: State-of-the-Art Antenna Technology for Cloud Radio Access Networks (C-RANs) by Waleed Tariq Sethi, Abdullah Alfakhri, Muhammad Ahmad Ashraf, Amr G. Alasaad and Saleh Alshebeili --- Chapter 2: Cloud Computing for Next-Generation Sequencing Data Analysis by Shanrong Zhao, Kirk Watrous, Chi Zhang and Baohong Zhang --- Chapter 3: Green-Aware Virtual Machine Migration Strategy in Sustainable Cloud Computing Environments by Xiaoying Wang, Guojing Zhang, Mengqin Yang and Lei Zhang --- Chapter 4: M-ary Optical Computing by Jian Wang and Yun Long --- Chapter 5: Networking Solutions for Integrated Heterogeneous Wireless Ecosystem by Roman Florea, Aleksandr Ometov, Adam Surak, Sergey Andreev and Yevgeni Koucheryavy
    Pages: Online-Ressource (138 Seiten)
    ISBN: 9789535132448
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Unknown
    Rijeka : InTech
    Keywords: parallel computing ; distributed computing
    Description / Table of Contents: Chapter 1: Introductory Chapter: The Newest Research in Parallel and Distributed Computing by Wen-Jyi Hwang --- Chapter 2: Social Trust: Evaluating Node Influential Capability in Social Networks by Yap Hock Yeow and Lim Tong-Ming --- Chapter 3: A Distributed Computing Architecture for the Large-Scale Integration of Renewable Energy and Distributed Resources in Smart Grids by Ignacio Aravena, Anthony Papavasiliou and Alex Papalexopoulos --- Chapter 4: GPU Computing Taxonomy by Abdelrahman Ahmed Mohamed Osman --- Chapter 5: Distributed Software Development Tools for Distributed Scientific Applications by Vaidas Giedrimas, Leonidas Sakalauskas and Anatoly Petrenko --- Chapter 6: DANP-Evaluation of AHP-DSS by Wolfgang Ossadnik, Ralf H. Kaspar and Benjamin Föcke
    Pages: Online-Ressource (122 Seiten)
    ISBN: 9789535133162
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Vorwort --- Einleitung --- Bürger --- Wenn Bots sich unter Leute mischen: Social Bots in den Sozialen Medien --- Digitale Partizipation in Wissenschaft und Wirtschaft --- Entwicklung einer soziodigitalen Souveränität --- Unternehmen --- Digitale Souveränität – ein mehrdimensionales Handlungskonzept für die deutsche Wirtschaft --- Privatheit und digitale Souveränität in der Arbeitswelt 4.0 --- Staat --- Mehr Daten, weniger Vertrauen in Statistik – freie Fahrt für ‚alternative Fakten‘? --- Internationale Perspektiven auf digitale Souveränität --- Digitalisierung der Bildung als staatliche Aufgabe --- Ausblick
    Pages: Online-Ressource (IX, 187 Seiten) , 40 Abbildungen in Farbe
    ISBN: 9783662557969
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Unknown
    Rijeka : InTech
    Keywords: software agents
    Description / Table of Contents: Chapter 1: Introductory Chapter: Multi-Agent Systems by Jorge Rocha, Inês Boavida-Portugal and Eduardo Gomes --- Chapter 2: Motion Coordination Problems with Collision Avoidance for Multi-Agent Systems by Jesús Santiaguillo-Salinas and Eduardo Aranda-Bricaire --- Chapter 3: Multiagent Systems in Automotive Applications by Raul Campos-Rodriguez, Luis Gonzalez-Jimenez, Francisco Cervantes-Alvarez, Francisco Amezcua-Garcia and Miguel Fernandez-Garcia --- Chapter 4: Time Critical Mass Evacuation Simulation Combining A Multi- Agent System and High-Performance Computing by Leonel Aguilar, Maddegedara Lalith and Muneo Hori --- Chapter 5: Robust Adaptive Cooperative Control for Formation-Tracking Problem in a Network of Non-Affine Nonlinear Agents by Muhammad Nasiruddin bin Mahyuddin and Ali Safaei --- Chapter 6: Management of a Single-User Multi-Robot Teleoperated System for Maintenance in Offshore Plants by Seungyeol Lee and Jeon-Il Moon --- Chapter 7: Multiagent System for Image Mining by Nicksson Ckayo Arrais de Freitas and Marcelino Pereira dos Santos Silva --- Chapter 8: A Toolbox to Analyze Emergence in Multiagent Simulations by Danilo Saft and Volker Nissen --- Chapter 9: Hybrid Architecture to Support Context-Aware Systems by Maricela Bravo, José A. Reyes-Ortiz, Leonardo Sánchez-Martínez and Roberto A. Alcántara-Ramírez --- Chapter 10: Resilience Enhancement in Cyber-Physical Systems: A Multiagent-Based Framework by Fábio Emanuel Pais Januário, Joaquim Leitão, Alberto Cardoso and Paulo Gil
    Pages: Online-Ressource (212 Seiten)
    ISBN: 9789535135364
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Xeon Phi™ Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It also examines the source code-level optimizations that can be performed to exploit the powerful features of the processor. Xeon Phi is at the heart of world’s fastest commercial supercomputer, which thanks to the massively parallel computing capabilities of Intel Xeon Phi processors coupled with Xeon Phi coprocessors attained 33.86 teraflops of benchmark performance in 2013. Extracting such stellar performance in real-world applications requires a sophisticated understanding of the complex interaction among hardware components, Xeon Phi cores, and the applications running on them. In this book, Rezaur Rahman, an Intel leader in the development of the Xeon Phi coprocessor and the optimization of its applications, presents and details all the features of Xeon Phi core design that are relevant to the practice of application developers, such as its vector units, hardware multithreading, cache hierarchy, and host-to-coprocessor communication channels. Building on this foundation, he shows developers how to solve real-world technical computing problems by selecting, deploying, and optimizing the available algorithms and data structure alternatives matching Xeon Phi’s hardware characteristics. From Rahman’s practical descriptions and extensive code examples, the reader will gain a working knowledge of the Xeon Phi vector instruction set and the Xeon Phi microarchitecture whereby cores execute 512-bit instruction streams in parallel
    Pages: Online-Ressource (XXI, 232 pages)
    ISBN: 9781430259275
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Keywords: Computer science ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics)
    Description / Table of Contents: Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, classifications, genetic algorithms, neural networking, kernel methods, and biologically-inspired techniques. Mariette Awad and Rahul Khanna’s synthetic approach weaves together the theoretical exposition, design principles, and practical applications of efficient machine learning. Their experiential emphasis, expressed in their close analysis of sample algorithms throughout the book, aims to equip engineers, students of engineering, and system designers to design and create new and more efficient machine learning systems. Readers of Efficient Learning Machines will learn how to recognize and analyze the problems that machine learning technology can solve for them, how to implement and deploy standard solutions to sample problems, and how to design new systems and solutions. Advances in computing performance, storage, memory, unstructured information retrieval, and cloud computing have coevolved with a new generation of machine learning paradigms and big data analytics, which the authors present in the conceptual context of their traditional precursors. Awad and Khanna explore current developments in the deep learning techniques of deep neural networks, hierarchical temporal memory, and cortical algorithms. Nature suggests sophisticated learning techniques that deploy simple rules to generate highly intelligent and organized behaviors with adaptive, evolutionary, and distributed properties. The authors examine the most popular biologically-inspired algorithms, together with a sample application to distributed datacenter management. They also discuss machine learning techniques for addressing problems of multi-objective optimization in which solutions in real-world systems are constrained and evaluated based on how well they perform with respect to multiple objectives in aggregate. Two chapters on support vector machines and their extensions focus on recent improvements to the classification and regression techniques at the core of machine learning
    Pages: Online-Ressource (XIX, 268 pages) , 88 illustrations
    ISBN: 9781430259909
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Android on x86: an Introduction to Optimizing for Intel® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel’s x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x86 devices. The fundamental idea is that extending your applications to support x86 or creating new ones is not difficult, but it is imperative to know all of the technicalities. This book is dedicated to providing you with an awareness of these nuances and an understanding of how to tackle them. Second, and most importantly, this book provides a one-stop detailed resource for best practices and procedures associated with the installation issues, hardware optimization issues, software requirements, programming tasks, and performance optimizations that emerge when developers consider the x86 Android devices. Optimization discussions dive into native code, hardware acceleration, and advanced profiling of multimedia applications. The authors have collected this information so that you can use the book as a guide for the specific requirements of each application project. This book is not dedicated solely to code; instead it is filled with the information you need in order to take advantage of x86 architecture. It will guide you through installing the Android SDK for Intel Architecture, help you understand the differences and similarities between processor architectures available in Android devices, teach you to create and port applications, debug existing x86 applications, offer solutions for NDK and C++ optimizations, and introduce the Intel Hardware Accelerated Execution Manager. This book provides the most useful information to help you get the job done quickly while utilizing best practices
    Pages: Online-Ressource (XXVII, 380 pages) , 180 illustrations
    ISBN: 9781430261315
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Keywords: Computer science ; Special purpose computers ; Computer security ; User interfaces (Computer systems) ; Artificial intelligence ; Image processing ; Computer Science ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Artificial Intelligence (incl. Robotics) ; Systems and Data Security ; Image Processing and Computer Vision ; Special Purpose and Application-Based Systems
    Description / Table of Contents: This book is published open access under a CC BY license. This book constitutes the proceedings of the 5th International Workshop on Symbiotic Interaction, Symbiotic 2016, held in Padua, Italy, in October 2016. The 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The idea of symbiotic systems put forward in this workshop capitalizes on the computers’ ability to implicitly detect the users goals, preferences or/and psycho-physiological states and thereby enhancing human-computer interaction (HCI). The papers present an overview of the symbiotic relationships between humans and computers with emphasis on user-driven research on symbiotic systems, adaptive systems, implicit input data, physiological computing and BCI, but also on understanding the nature of the interdependence and agency between computers and humans more broadly
    Pages: Online-Ressource (XIV, 182 pages) , 51 illustrations
    ISBN: 9783319577531
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Agile requirements --- COSMIC User Story Standard --- Improving Mockup-based Requirement Specification with End-User Annotations --- Agile testing --- Combining STPA and BDD for Safety Analysis and Verification in Agile Development: A Controlled Experiment --- Software tester, we want to hire you! An analysis of the demand for soft skills --- Developers' initial perceptions on TDD practice: A thematic analysis with distinct domains and languages --- Myths and Facts about Static Application Security Testing Tools: An Action Research at Telenor Digital --- Automated Acceptance Tests as Software Requirements: An Experiment to Compare the Applicability of Fit tables and Gherkin Language --- Agile transformation --- Interface Problems of Agile in a Non-Agile Environment --- Enterprise agility: Why is transformation so hard? --- Technical and Organizational Agile Practices: A Latin-American Survey --- Agile Software Development { Adoption & Maturity: An Activity Theory Perspective --- Scaling agile --- Do Agile Methods Work for Large Software Projects? --- Learning in the Large - An Exploratory Study of Retrospectives in Large-Scale Agile Development --- Reporting in Agile Portfolio Management: Routines, Metrics and Artefacts to Maintain an Effective Oversight --- Inter-team Coordination in Large-Scale Agile Development: A Case Study of Three Enabling Mechanisms --- Supporting Large-Scale Agile Development with Domain-driven Design --- Towards Agile Scalability Engineering --- Human-centric agile --- Stress in Agile Software Development: Practices and Outcomes --- Teamwork quality and team performance: Exploring differences between small and large agile projects --- Continuous experimentation --- Challenges and Strategies for Undertaking Continuous Experimentation to Embedded Systems: Industry and Research Perspectives --- ICOs overview: should investors choose an ICO developed with the Lean Startup methodology?
    Pages: Online-Ressource (XV, 309 pages) , 50 illustrations
    ISBN: 9783319916026
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Robotics ; Automation ; Industrial engineering ; Production engineering ; Economic sociology ; Engineering ; Industrial and Production Engineering ; Organizational Studies, Economic Sociology ; Robotics and Automation
    Description / Table of Contents: Einleitung --- Prognostizierte Veränderungen der gestaltbaren Arbeitssystemdimensionen --- Systeme zur Assistenz und Effizienzsteigerung in manuellen Produktionsprozessen der Industrie auf Basis von Projektion und Tiefendatenerkennung --- Betriebliche Auswirkungen industrieller Servicerobotik am Beispiel der Kleinteilemontage --- Erweiterte Horizonte – Ein technischer Blick in die Zukunft der Arbeit --- Soziotechnische Assistenzsysteme für die Produktionsarbeit in der Textilbranche --- Lernförderliche Arbeitssysteme für die Arbeitswelt von morgen --- Assistenz und Wissensvermittlung am Beispiel von Montage- und Instandhaltungstätigkeiten --- Der Mensch in Interaktion mit autonomen Planungs- und Steuerungssystemen für Cyber-Physische Produktionssysteme --- ReApp – Wiederverwendbare Roboterapplikationen für flexible Roboteranlagen - Auswirkungen der Ergebnisse aus ReApp auf betriebliche Funktionen am Beispiel eines Anwendungsfalls in der Elektroindustrie --- Modellierungsansatz für ein arbeitsplatznahes Beschreibungsmodell der »Arbeitswelt Industrie 4.0 --- Die Zukunft der Arbeit im demografischen Wandel --- “Social Manufacturing and Logistics“ – Arbeit in der digitalisierten Produktion --- Lernförderliche Arbeitsorganisation in der Industrie 4.0 --- Decision Support Pipelines – Durchgängige Datenverarbeitungsinfrastrukturen für die Entscheidungen von morgen --- Gerechtigkeit in flexiblen Arbeits- und Managementprozessen --- Technologie, Organisation, Qualifikation
    Pages: Online-Ressource (XI, 246 Seiten) , 62 Abbildungen, 56 Abbildungen in Farbe
    ISBN: 9783662492666
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Keywords: Computer science ; Computer hardware ; Computer organization ; Software engineering ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computer Systems Organization and Communication Networks ; Computing Methodologies ; Computing Milieux ; Computer Hardware
    Description / Table of Contents: Concurrent and Distributed Systems --- Computing the concurrency threshold of sound free-choice workflow nets --- Fine-Grained Complexity of Safety Verification --- Parameterized verification of synchronization in constrained reconfigurable broadcast networks --- EMME: a formal tool for the ECMAScript Memory Model Evaluation --- SAT and SMT II --- What a Difference a Variable Makes --- Abstraction Refinement for Emptiness Checking of Alternating Data Automata --- Revisiting Enumerative Instantiation --- An Non-linear Arithmetic Procedure for Control-Command Software Verification --- Security and Reactive Systems --- Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection --- Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts --- RVHyper: A Runtime Verification Tool for Temporal Hyperproperties --- The Refinement Calculus of Reactive Systems Toolset --- Static and Dynamic Program Analysis --- TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation --- Optimal Dynamic Partial Order Reduction with Observers --- Structurally Defined Conditional Data-flow Static Analysis --- Geometric Nontermination Arguments --- Hybrid and Stochastic Systems --- Efficient dynamic error reduction for hybrid systems reachability analysis --- AMT2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic --- Multi-Cost Bounded Reachability in MDPs --- A Statistical Model Checker for Nondeterminism and Rare Events --- Temporal logic and mu-calculus --- Permutation Games for the Weakly Aconjunctive mu-Calculus --- Symmetry Reduction for the Local Mu-Calculus --- Bayesian Statistical Parameter Synthesis for Linear Temporal Properties of Stochastic Models --- 7th Competition on Software Verification (SV-COMP) --- 2LS: Memory Safety and Non-Termination (Competition contribution) --- Yogar-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement (Competition Contribution) --- CPA-BAM-Slicing: Block-Abstraction Memorization and Slicing with Region-Based Dependency Analysis (Competition Contribution) --- InterpChecker: Reducing State Space via Interpolations (Competition Contribution) --- Map2Check using LLVM and KLEE (Competition Contribution) --- Symbiotic 5: Boosted Instrumentation (Competition Contribution) --- Ultimate Automizer and the Search for Perfect Interpolants (Competition Contribution) --- Ultimate Taipan with Dynamic Block Encoding (Competition Contribution) --- VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)
    Pages: Online-Ressource (XX, 465 pages) , 92 illustrations
    ISBN: 9783319899633
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Unknown
    Cham : Springer
    Keywords: Computer science ; Music ; Consciousness ; User Interfaces and Human Computer Interaction ; Music ; Cognitive Psychology
    Description / Table of Contents: Introduction --- Part 1- Haptics in Musical Interaction: Psychophysics and User Experience --- A Brief Overview of the Somatosensory System --- Once More with Feeling: The Dynamics of Performer-Instrument Interaction --- Perception of Vibrotactile Cues in Musical Performance --- The Role of Haptic Cues in Musical Instrument Quality Perception --- A Functional Analysis of Haptic Feedback in Digital Musical Instrument Interactions --- Auditory-Tactile Experience of Music --- Part II - Haptic Musical Interfaces: Design and Applications --- The MSCI Platform: A Framework for the Design and Simulation of Multisensory Virtual Musical Instruments --- Implementation and Characterization of Vibrotactile Interfaces --- Touchscreens and Musical Interaction --- Design of Vibrotactile Feedback --- Haptic Force-Feedback Instruments for the Laptop Orchestra of Louisiana --- Haptics for the Development of Fundamental Rhythm Skills Including Multi-Limb Coordination
    Pages: Online-Ressource (XV, 285 pages) , 107 illustrations, 58 illustrations in color
    ISBN: 9783319583167
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XIX, 703 pages) , 146 illustrations
    ISBN: 9783319961453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Keywords: Computer science ; Computer graphics ; Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Introduction --- System Theory --- Image Processing --- Endoscopy --- Microscopy --- Magnetic Resonance Imaging --- X-ray Imaging --- Computed Tomography --- X-ray Phase Contrast: Research on a Future Imaging Modality --- Emission Tomography --- Ultrasound --- Optical Coherence Tomography --- Acronyms.
    Pages: Online-Ressource (X, 259 pages) , 167 illustrations
    ISBN: 9783319965208
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XX, 545 pages) , 106 illustrations
    ISBN: 9783319961422
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Robotics ; Automation ; Industrial engineering ; Production engineering ; Engineering economics ; Engineering economy ; Manufacturing industries ; Machines ; Tools ; Engineering ; Industrial and Production Engineering ; Robotics and Automation ; Engineering Economics, Organization, Logistics, Marketing ; Manufacturing, Machines, Tools ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Einordnung und Hintergründe --- Positionen der Sozialpartner --- Erfahrungen und Herausforderungen in der Industrie --- Forschungsfragen und Entwicklungsstrategien --- Ausblick
    Pages: Online-Ressource (VIII, 167 Seiten) , 38 Abbildungen
    ISBN: 9783662459157
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Keywords: Engineering ; Commercial law ; Automotive engineering ; Robotics ; Automation ; Community psychology ; Environmental psychology ; Engineering ; Automotive Engineering ; Robotics and Automation ; Community and Environmental Psychology ; Commercial Law
    Description / Table of Contents: Teil I Human and Machine --- Teil II Mobilität --- Teil III Verkehr --- Teil IV Sicherheit --- Teil V Recht und Haftung --- Teil VI Akzeptanz
    Pages: Online-Ressource (XIV, 732 Seiten)
    ISBN: 9783662458549
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Computers ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Information Systems and Communication Service ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Seit Jahren wird unser Alltag geprägt von zunehmender Automation und Vernetzung, die Digitalisierung genannt wird. Sensoren erfassen immer mehr unterschiedliche Daten und werden von intelligenten Algorithmen zunehmend präzisier analysiert. Dies führt nicht nur zu einem anderen Verhältnis im Umgang und bei der Nutzung von Daten durch Menschen und Maschinen, sondern wird auch dramatisch Aufgaben und Prozesse verändern. Die damit verbundenen Arbeitsanforderungen werden zum massiven Wandel von Berufsbildern führen, in dem einfache Tätigkeiten automatisiert und komplexe Tätigkeiten vereinfacht werden. Nicht nur das Arbeiten sondern auch das Lernen, Lehren und Forschen verändert sich durch die Digitalisierung. Die technischen Möglichkeiten wandeln die Lebenswelten mit ihren urbanen Versorgungs- und Infrastrukturen und eröffnen den Wirtschaftsräumen neue Geschäftsmodelle. Diese parallel einsetzenden Entwicklungen führen zu radikalen Umbrüchen, die in den kommenden Jahren sämtliche Aspekte der Gesellschaft verändern werden
    Pages: Online-Ressource (IX, 199 Seiten)
    ISBN: 9783662528549
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Vorwort --- Einleitung --- Bürger --- Wenn Bots sich unter Leute mischen: Social Bots in den Sozialen Medien --- Digitale Partizipation in Wissenschaft und Wirtschaft --- Entwicklung einer soziodigitalen Souveränität --- Unternehmen --- Digitale Souveränität – ein mehrdimensionales Handlungskonzept für die deutsche Wirtschaft --- Privatheit und digitale Souveränität in der Arbeitswelt 4.0 --- Staat --- Mehr Daten, weniger Vertrauen in Statistik – freie Fahrt für ‚alternative Fakten‘? --- Internationale Perspektiven auf digitale Souveränität --- Digitalisierung der Bildung als staatliche Aufgabe --- Ausblick
    Pages: Online-Ressource (IX, 187 Seiten) , 40 Abbildungen in Farbe
    ISBN: 9783662557969
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Keywords: Engineering ; Project management ; Engineering design ; Automotive Engineering ; Project Management ; Engineering Design
    Description / Table of Contents: A - Die Entwicklung: Drei Erfolgsstories --- Die StreetScooter-Gründer-Story --- Die StreetScooter-Meilensteine 2008-2017 --- Die StreetScooter-Entwicklungsstory --- Die StreetScooter-Protagonisten-Story --- B - Die Lösung: Return on Engineering: Die StreetScooter-Lösungsbausteine. C - Die Perspektive: Die StreetScooter-Netzwerk-Story --- Die StreetScooter-Produktions-Story --- Die StreetScooter-Post-Story --- Die StreetScooter-Mobilitätslösung --- Die StreetScooter-Vision. A - The Development: Three Stories of Success --- The StreetScooter Founder Story --- The StreetScooter Milestones 2008-2017 --- The StreetScooter Development Story --- The StreetScooter Protagonists Story --- B - The Solution: Return on Engineering: The StreetScooter Building Blocks --- C - The Perspective: The StreetScooter Network Story --- The StreetScooter Production Story --- The StreetScooter Post Story --- The StreetScooter Mobility Solution --- The StreetScooter Vision
    Pages: Online-Ressource (VII, 213 Seiten)
    ISBN: 9783662549971
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Keywords: Computer science ; Management ; Industrial management ; Information technology ; Business ; Data processing ; Computers ; Computer Science ; Information Systems and Communication Service ; Innovation/Technology Management ; IT in Business
    Description / Table of Contents: Modelle --- Modellierungssprachen --- Vorgehensweise von der Modellbildung zur Digitalisierung --- Vorbereitung der Prozessimplementierung --- Umsetzung --- Praxisbeispiel
    Pages: Online-Ressource (X, 254 Seiten) , 143 Abbildungen, 69 Abbildungen in Farbe
    ISBN: 9783658226480
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Unknown
    Bonn : Galileo Press
    Keywords: Windows Server 2008 R2 ; Hyper-V ; Active Directory ; Remotedesktopdienste ; Webserver IIS ; Netzwerkprotokolle ; Kerberos-Authentifizierung
    Description / Table of Contents: Das lösungsorientierte und praktische Handbuch zum Windows Server 2008 R2 mit zahlreichen fundierten Hintergrundinformationen! Der Autor Ulrich B. Boddenberg greift bei der Beschreibung des Servers auf seine praktischen Erfahrungen in zahlreichen Projekten bei mittleren und großen Kunden zurück. Denn ein modernes Betriebssystem wie Windows Server 2008 R2 bietet weit mehr als nur die Möglichkeit, Programme auszuführen. Er beschreibt alle zentralen Technologien, wie die Virtualisierung mit Hyper-V, Active Directory, Terminaldienste und den Webserver IIS. Neben diesen konkreten Technologien geht es auch um Grundlagen wie Netzwerkprotokolle, Kerberos-Authentifizierung oder die eingesetzte Hardware. Zentrale Aspekte wie Performance, Verfügbarkeit und Sicherheit ziehen sich durch das gesamte Buch.
    Pages: Online-Ressource (1410 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836215282
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Keywords: LINUX ; Operating systems
    Pages: Online-Ressource (474 Seiten)
    Edition: 2nd ed.
    ISBN: 1565924002
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Keywords: GNU ; GNU Emacs ; Make ; Utilities
    Pages: Online-Ressource (280 Seiten)
    Edition: 3rd ed., completely rev. & updated
    ISBN: 0596006101
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Unknown
    Beijing : O'Reilly
    Keywords: Mason ; Perl ; HTML
    Pages: Online-Ressource (297 Seiten)
    Edition: 1st ed.
    ISBN: 0596002254
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Keywords: Mod Perl ; Perl ; Apache
    Pages: Online-Ressource (893 Seiten)
    Edition: 1st ed.
    ISBN: 0596002270
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Unknown
    Beijing : O'Reilly
    Keywords: MySQL 5.0 ; MySQL 5.1 ; PHP 5.2
    Pages: Online-Ressource (349 Seiten)
    Edition: 2. Aufl.
    ISBN: 9783897217171
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Unknown
    Bonn : Galileo Press
    Keywords: LINUX ; UNIX ; SHELL ; Systemprogrammierung
    Description / Table of Contents: Dieses umfassende Handbuch bietet Ihnen nahezu vollständiges Linux-Wissen. Es erklärt, wie man Linux als leistungsstarke Workstation nutzen kann und widmet sich ausführlich professionelleren Themen wie Administration des Systems, Shell, Netzwerkkonfiguration und Sicherheit. Das Buch ist geeignet für Nutzer aller gängigen Linux-Distributionen. Die beiliegenden Multiboot-DVDs enthalten eine große Auswahl an Linux-Systemen. Das Buch ist konsequent praxisnah geschrieben, immer verständlich und sehr gründlich in der Behandlung aller Themen. Diese 5. Auflage wurde umfassend aktualisiert und verbessert. Sowohl Einsteiger als auch Profis werden von diesem kompetenten Handbuch profitieren.
    Pages: Online-Ressource (1282 Seiten)
    Edition: 5., akt. Aufl.
    ISBN: 9783836218221
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Unknown
    Beijing : O'Reilly
    Keywords: Firewall ; SuSE LINUX 9.0 ; LINUX 2.6 ; Kernel ; Debian GNU/LINUX 3.1
    Pages: Online-Ressource (632 Seiten)
    Edition: 2. Aufl.
    ISBN: 3897214466
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Keywords: LINUX
    Pages: Online-Ressource (430 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897214164
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Keywords: LINUX
    Pages: Online-Ressource (825 Seiten)
    Edition: 3. Aufl.
    ISBN: 3897211335
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Keywords: LINUX ; Netzwerkverwaltung
    Pages: Online-Ressource (359 Seiten)
    Edition: 3. Aufl.
    ISBN: 3897214148
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Unknown
    Saarbrücken : Bomots
    Keywords: Scribus
    Pages: Online-Ressource (118 Seiten)
    Edition: 2. Aufl.
    ISBN: 9783000143878
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Unknown
    München : Open Source Press
    Keywords: Linux ; Betriebssysteme
    Description / Table of Contents: Linux-Nutzer, die bei Einrichtung und Verwaltung ihres Systems großen Wert auf Unabhängigkeit legen, greifen zu Gentoo Linux. Herz einer jeden Gentoo-Installation ist Portage, ein fortschrittliches, den FreeBSD-Ports ähnliches Paketmanagementsystem. Anders als die Paketmanager anderer Distributionen setzt Portage nicht auf vorkompilierte Binärpakete, sondern arbeitet auf Quellcodebasis. Portage sowie die Vor- und Nachteile quellbasierten Paketmanagements allgemein bilden Kernthemen dieses Buches. Der Autor führt praxisnah durch Installation und Administration und beschreibt Besonderheiten insbesondere für jene, die bereits Erfahrung mit anderen Linux-Distributionen gesammelt haben, so dass auch versierte Anwender Neues über die Konzepte von Linux bzw. das Zusammenspiel seiner Komponenten erfahren. Als Beispielszenario dient das Einrichten eines Webservers. Das Buch zeigt darüber hinaus, wie man die Distribution selbst erweitert und den eigenen Rechner in ein maßgeschneidertes Linux-System verwandelt gemäß dem Motto des Projekts: "Gentoo is all about choices".
    Pages: Online-Ressource (416 Seiten)
    ISBN: 9783937514345
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Unknown
    Bonn : Galileo Press
    Keywords: Softwareentwicklung ; Objektorientierung ; Objektorientierte Programmierung ; Aspektorientierte Programmierung
    Description / Table of Contents: Kaum eine Software, die nicht mehr objektorientiert entworfen und entwickelt wird! Die beiden Autoren geben eine umfassende Einführung in die Prinzipien und die Anwendung der Objektorientierung. Das Buch ist aufgabenorientiert, bietet Beispiele in den Sprachen C++, Java, Ruby, und C# sowie ein Kapitel zur aspektorientierten Programmierung.
    Pages: Online-Ressource (609 Seiten)
    Edition: 1. Aufl.
    ISBN: 3898426246
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Unknown
    Bonn : Galileo Press
    Keywords: iPad ; iPhone ; XCode ; Apps
    Description / Table of Contents: Klaus M. Rodewig und Clemens Wagner geben Ihnen einen Einblick in die Architektur des iPhone und des iPad und eine Anleitung zum Programmieren eigener Applikationen. Dabei werden alle wichtigen Themen in der gebotenen Tiefe mit Hintergrundwissen beschrieben. Praktische Beispiele unterstützen Sie von Anfang an, so dass Sie direkt loslegen können. Erste Ergebnisse können Sie im iPhone Simulator direkt testen. Sie erhalten einen Überblick über die verschiedenen iPhone- und iPod Touch-Modelle, erfahren, wie Sie in der Apple Developer Connection Mitglied werden können und Applikationen für das iPhone im Appstore anbieten können. Natürlich kommt in diesem Buch auch der Hintergrund nicht zu kurz. Eine kurze Einführung in Objective-C und Cocoa vermittelt Ihnen alles, was Sie wissen müssen. Inkl. Schnittstellen zum Datenaustausch, Events, Alerts, Datenverwaltung mit Core Data und die verschiedenen Möglichkeiten der Netzwerkprogrammierung. Profis werden von den Tipps und Tricks zur Konfiguration und Verwendung von Xcode, Debugging und der Arbeit mit einem Versionierungssystem profitieren.
    Pages: Online-Ressource (515 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836214636
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Keywords: Rechnernetz ; Systemverwaltung ; Netzwerkverwaltung ; Windows Server 2003 ; Active Directory ; Exchange Server 2003 ; Windows XP Professional Edition
    Description / Table of Contents: Ein Integrationshandbuch im besten Sinne: Das Wissen um das Zusammenspiel von Microsoft Windows Server 2003, ADS, Windows XP Professional, Office XP/2003 oder Exchange Server ist sehr komplex. Administratoren, die nach einer Gesamtlösung suchen, stellen fest, dass es immens viele Informationen, Fehlerbeschreibungen, Service Packs, Patches und Hotfixes zu den Einzelprodukten gibt, aber keinen Lösungsansatz, der dieses Wissen bündelt und in Beziehung setzt. Anders dieses Buch: Schritt für Schritt wird ein Gesamtsystem implementiert, das nicht nur über einen kurzen Zeitraum läuft, sondern wartbar bleibt und später auf neue Versionen upgedated werden kann. Die 3. Auflage des Standardwerkes wurde aktualisiert und erweitert um Ausführungen zu Small Business Server, Windows Server 2003 R2, Windows Terminalserver, Access-based Enumeration und Best Practices zum Drucken im Netzwerk.
    Pages: Online-Ressource (997 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 3898428478
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Unknown
    Bonn : Galileo Press
    Keywords: C ; ANSI C
    Description / Table of Contents: Hier bekommen Sie C-Wissen pur. Egal, ob Sie gerade anfangen, C zu lernen oder ein kompetentes Nachschlagewerk für Fragen rund um C benötigen, mit diesem Buch sind Sie bestens beraten. Ausführlich werden die Grundlagen von C dargestellt, angefangen von den elementaren Datentypen bis hin zu Arrays, Zeigern und dynamischer Speicherverwaltung. Auch fortgeschrittene Themen wie das Programmieren von Webanwendungen mit der CGI-Schnittstelle und eigenen Datenbank-Clients mit der C-API von MySQL, Netzwerk- und Cross-Plattform-Entwicklung kommen nicht zu kurz.
    Pages: Online-Ressource (1190 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836214117
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Unknown
    Bonn : Galileo Press
    Keywords: UNIX ; LINUX ; Einführung
    Description / Table of Contents: Vorwort Dieses Buch wurde für den Einsteiger geschrieben. Leicht verständlich sollte es sein. Da ich mich oft darüber ärgerte, dass ich von Einsteigerbüchern immer so bald im Regen stehen gelassen wurde, sollte dieses Buch so lange wie möglich nützlich sein. Also sollten zu möglichst vielen Stichworten, die einem Anfänger begegnen können, ein paar erklärende Worte fallen. Na ja, dann kann man ja gerade noch ein paar Worte dazu sagen, wie man das installiert und konfiguriert. Was sollte in das Buch hinein? Klar, die grundlegenden Befehle zum Umgang mit Dateien und Verzeichnissen sind wichtig. Die Editoren vi und emacs und die Shell sind die Standardwerkzeuge eines jeden UNIX-Anwenders und müssen natürlich erläutert werden. Neben diesen klassischen Themen will man aber auch mit einem CD-Brenner arbeiten. Auch die Administration darf nicht fehlen. Immerhin gibt es immer mehr Einzelplatzbenutzer, insbesondere im Bereich Linux und MacOS X, die letztlich ihr System auch selbst administrieren müssen. Wer es im professionellen Umfeld mit UNIX zu tun bekommt, wird schnell in das Umfeld der Administration geraten. Und dann wird man über kurz oder lang auch mal ein paar kleine Skripten zaubern müssen. Wenn man dann als Administrator Perl kennt, ist das nicht verkehrt. Auf der anderen Seite kann man in der heutigen Zeit das Thema grafische Oberflächen nicht mehr weglassen. Und dass eine Maschine ohne Netzwerk betrieben wird, ist im Internet-Zeitalter einfach unglaubwürdig. So kam dann eins zum anderen. Inzwischen ist dieses Buch fast schon eine UNIX-Enzyklopädie, aber immer noch soll es für den Anfänger leicht verständlich sein. Denn Verständlichkeit schätzt nicht nur der Anfänger, sondern auch der Profi, wenn ihm mal ein neues Thema begegnet...
    Pages: Online-Ressource (654 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898422406
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Keywords: High Dynamic Range ; Digitale Photographie ; Bildverarbeitung
    Pages: Online-Ressource (281 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836211031
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Keywords: Java 7
    Description / Table of Contents: Die Fortsetzung des Java-Kultbuchs für Entwickler! Hier bekommen Sie umfassendes und kompetentes Praxiswissen zu den vielen Bibliotheken und Technologien in einem Band. Am Beispiel konkreter Java-Projekte zeigt Christian Ullenboom, was man wissen muss über Swing, Netzwerk- und Grafikprogrammierung, RMI und Web-Services, JavaServer Pages und Servlets, Applets, JDBC, Reflection und Annotationen, Logging und Monitoring, Java Native Interface (JNI) und vieles mehr. Dieses Buch ist Ihr unersetzlicher Begleiter bei der täglichen Arbeit!
    Pages: Online-Ressource (1433 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836215077
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Keywords: ActionScript ; Flash 8 ; Flash MX 2004
    Pages: Online-Ressource (413 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898427746
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Keywords: Dreamweaver 8.0
    Pages: Online-Ressource (639 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898427395
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Keywords: ActionScript 1.0 ; ActionScript 2.0 ; Flash MX 2004
    Pages: Online-Ressource (668 Seiten)
    Edition: 1. Aufl.
    ISBN: 3898422216
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Unknown
    Beijing : O'Reilly
    Keywords: Netscape ; Mozilla ; Source code
    Pages: Online-Ressource (454 Seiten)
    ISBN: 0596000529
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Unknown
    Bonn : Galileo Press
    Keywords: Adobe Photoshop CS2
    Description / Table of Contents: Sie kennen sich mit Photoshop gut aus, suchen aber noch Tipps und Tricks für einen produktiveren Einsatz? Dieses Buch bietet reines Profiwissen! Im Fokus stehen hier Techniken für Fortgeschrittene, Hilfestellungen für einen effektiven Workflow und Tipps zur Automatisierung und Optimierung. So finden Sie Profiwissen z.B. zu den Themen Auswahlen, Effekte, Dritthersteller-Tools, Druckausgabe, Farbmanagement, Workflow, Bridge, Skripte, CameraRAW, Probleme mit Digitalfotos und vieles mehr. Grundlagenwissen wird hier nicht mehr erläutert! Ein Buch, das zum Schmökern einlädt und viele erhellende Zusammenhänge aufzeigt, Ihnen aber besonders hilft, Zeit zu sparen!
    Pages: Online-Ressource (508 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898427005
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Unknown
    Beijing : O'Reilly
    Keywords: DocBook
    Pages: Online-Ressource (635 Seiten)
    Edition: 1st ed.
    ISBN: 1565925807
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Unknown
    Beijing : O'Reilly
    Keywords: Debian GNU/LINUX
    Pages: Online-Ressource (343 Seiten)
    Edition: 1st ed.
    ISBN: 1565927052
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Keywords: LINUX ; Linux device drivers ; Treiber
    Pages: Online-Ressource (615 Seiten)
    Edition: 3rd ed.
    ISBN: 9780596005900
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Keywords: Kultur ; Internet ; digitale Netze
    Description / Table of Contents: Noch nie war es einfacher, Menschen und ihr Wissen in Form von Texten, Bildern oder Tönen zusammenzubringen und zu vernetzen. Freie Netze sind der Versuch, dieses Potential von Internet und PC auszuschöpfen und möglichst alle Menschen daran teilhaben zu lassen. FREIES WISSEN. Der Zugang zu digitalen Netzen bedeutet noch nicht den Zugang zu Inhalten. Ein freier Zugang zu Wissen ist aber die Basis für Innovation und Emanzipation. Den neuen Möglichkeiten für freien Zugang zu Wissen stehen neue und alte, soziale und rechtliche Barrieren gegenüber. Von siebzehn Autorinnen und Autoren werden die verschiedenen Anwendungsbereiche von Freien Netzen und Freiem Wissen dargestellt. In jedem der neun Kapitel kommen in Interviews Menschen wie Lawrence Lessig oder Richard Stallman zu Wort, die mit dem Thema als ExpertInnen, PionierInnen oder unmittelbar Betroffene zu tun hatten oder haben. Am Ende jedes Kapitels finden sich konkrete Projektvorschläge zur Umsetzung auf lokaler Ebene als Beitrag für das Linzer Kulturhauptstadtjahr 2009.
    Pages: Online-Ressource (328 Seiten)
    ISBN: 3901761640
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Unknown
    München : Open Source Press
    Keywords: Linux ; Betriebssysteme ; Intrusion Detection System ; IDS ; Snort
    Description / Table of Contents: VORWORT Dieses Buch möchte Ihnen helfen, ein eigenes Intrusion Detection System (IDS) auf der Basis von Snort aufzubauen. Wir werden auf ca. 250 Seiten nicht sämtliche Aspekte und Möglichkeiten der Einbruchserkennung er örtern können – aber das soll das Buch auch nicht leisten. Vielmehr möchten wir Ihnen eine kompakte, von Fachleuten entworfene und geprüfte Anleitung geben, wie Sie mit möglichst wenig Aufwand möglichst schnell zu einem grundsätzlich ausreichenden IDS kommen. Dieses Buch wendet sich, bildlich gesprochen, an den gestressten Administrator, der partout genug Arbeit auf dem Schreibtisch und keine Zeit hat, sich in Hunderte Seiten dicke Grundlagenwerke einzuarbeiten, daraus das für ihn Wichtige abzuleiten und anschließend mühsam nach dem Trial-and-Error-Verfahren ein eigenes SnortIDS aufzubauen. Wir präsentieren Ihnen eine fertige Lösung, die Sie in kürzester Zeit nachbauen und später weiter verfeinern und anpassen können. Dennoch widmen wir uns selbstverständlich auch den Grundlagen der Intrusion Detection – sozusagen am lebenden Beispiel, am gerade gemeinsam aufgebauten IDSNetzwerk. Eine solche Schritt-für-Schritt-Bauanleitung bringt natürlich Kompromisse und Probleme mit sich: Was in einer SoftwareVersion reibungslos funktionierte, kann sich in einer anderen Version wieder anders verhalten. Parameter und Pfade werden umbenannt, Pakete und Bibliotheken kommen zu einer Distribution hinzu oder werden ersetzt – und nicht zuletzt unterscheiden sich auch SUSE und Debian oft genug grundlegend voneinander. Wir haben die hier geschilderten Bauanleitungen basierend auf Debian Woody und SUSE Version 9.1 entworfen. Es steht Ihnen frei, abweichend davon eine andere (ältere oder neuere) Version oder vielleicht eine ganz andere Distribution einzusetzen, doch müssen Sie damit rechnen, dass dann einiges von unserer Lösung abweichen, anders heißen oder funktionieren kann. Insoweit bitten wir um Verständnis, dass wir weder alle alten Versionen beachten, noch alle zukünftigen änderungen in unserer Kristallkugel vorhersehen können. Am zugrunde liegenden Prinzip dürfte sich jedoch nicht allzu viel ändern, so dass es für Administratoren mit etwas Erfahrung ein Leichtes sein sollte, die hier geschilderten Wege an andere Gegebenheiten anzupassen. Ob Sie SUSE oder Debian einsetzen, spielt prinzipiell keine Rolle – wir gehen jeweils auf beide Varianten ein, sofern Unterschiede bestehen. Bezüglich SUSE Linux möchten wir Ihnen aber empfehlen, mindestens Version 9.1 zu nutzen, da erst diese ein aktuelles Snort 2.1 enthält; SUSE 9.0 würde bereits das eigene Kompilieren von Snort erfordern. Das können Sie tun, das können Sie sich aber auch ersparen...
    Pages: Online-Ressource (258 Seiten)
    ISBN: 9783937514031
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Unknown
    München : Addison-Wesley
    Keywords: XML ; Extensible Markup Language ; Web-Publishing ; XHTML ; XPath ; XSL ; DTD
    Description / Table of Contents: XML - leicht verständlich und praxisnah. XML verändert das Web wie nichts zuvor. Das Buch erklärt Ihnen sowohl die Idee von XML als auch deren Anwendungsmöglichkeiten. Neben der vollständigen Spezifikation enthält es vor allem auch praktische Tipps für den Einsatz von XML im WWW. Jeder Web-Publisher, der die Beschränkungen von HTML ablegen möchte, findet hier eine unentbehrliche Grundlage und Referenz. Erläuterungen und Tipps zu wichtigen Aspekten wie XSL, RDF und Linking runden die Darstellung ab.
    Pages: Online-Ressource (512 Seiten)
    Edition: 2., erw. Aufl.
    ISBN: 9783827316367
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Wavelets (Mathematics)
    Description / Table of Contents: "Beyond Wavelets" presents state-of-the-art theories, methods, algorithms, and applications of mathematical extensions for classical wavelet analysis. Wavelets, introduced 20 years ago by Morlet and Grossmann and developed very rapidly during the 1980's and 1990's, has created a common link between computational mathematics and other disciplines of science and engineering. Classical wavelets have provided effective and efficient mathematical tools for time-frequency analysis which enhances and replaces the Fourier approach. However, with the current advances in science and technology, there is an immediate need to extend wavelet mathematical tools as well. "Beyond Wavelets" presents a list of ideas and mathematical foundations for such extensions, including: continuous and digital ridgelets, brushlets, steerable wavelet packets, contourlets, eno-wavelets, spline-wavelet frames, and quasi-affine wavelets. Wavelet subband algorithms are extended to pyramidal directional and nonuniform filter banks. In addition, this volume includes a method for tomographic reconstruction using a mechanical image model and a statistical study for independent adaptive signal representation. Investigators already familiar with wavelet methods from areas such as engineering, statistics, and mathematics will benefit by owning this volume. *Curvelets, Contourlets, Ridgelets, *Digital Implementation of Ridgelet Packets *Steerable Wavelet Packets *Essentially Non-Oscillatory Wavelets *Medical Imaging *Non-Uniform Filter Banks *Spline-wavelet frames and *Vanishing Moment Recovery Functions
    Pages: Online-Ressource (xiv, 305 pages)
    Edition: 1st ed
    ISBN: 9780127432731
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 519.5/35 ; LC QA278 ; Approximation theory - Research ; Interpolation - Research ; Multivariate analysis - Research
    Pages: Online-Ressource (ix, 346 pages)
    Edition: 1st ed
    ISBN: 9780444518446
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 577.01/5118 ; LC TD170.2 ; Ecology - Mathematical models ; Environmental protection - Mathematical models ; Pollution - Mathematical models
    Pages: Online-Ressource (xviii, 373 pages)
    Edition: 1st ed
    ISBN: 9780444522092
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Keywords: computer and information science ; artificial intelligence
    Pages: Online-Ressource (254 Seiten)
    ISBN: 9789535109211
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Unknown
    Freexian SARL
    Keywords: Debian ; Ubuntu ; Debian GNU/Linux ; Linux ; Administrator
    Description / Table of Contents: Accessible to all, this book teaches the essentials to anyone who wants to become an effective and independent Debian GNU/Linux administrator. It covers all the topics that a competent Linux administrator should master, from the installation and the update of the system, up to the creation of packages and the compilation of the kernel, but also monitoring, backup and migration, without forgetting advanced topics like SELinux setup to secure services, automated installations, or virtualization with Xen, KVM or LXC.
    Pages: Online-Ressource (XXIV, 468 Seiten)
    ISBN: 9791091414012
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Unknown
    Bonn : Galileo Press
    Keywords: Visual Basic ; Visual Basic 2012 ; Visual Studio ; Objektorientierte Programmierung ; OOP ; C# ; .NET
    Description / Table of Contents: Wenn Sie ein Buch suchen, dass Ihnen bei allen Fragen der C#-Entwicklung zuverlässig mit Rat und Tat zur Seite steht, dann ist unser bewährtes Kompendium genau das Richtige für Sie. Mittlerweile in der 6. Auflage dient es ambitionierten Ein- und Umsteigern durch seine strukturierte Vorgehensweise und die zahlreichen Anwendungsbeispiele als praxisorientierte Einführung; Fortgeschrittene und Profis unterstützt es als Nachschlagewerk optimal bei ihrer täglichen Arbeit. In den ersten Kapiteln werden zunächst die Grundlagen von C#, .NET und der objektorientierten Programmierung vermittelt. Es folgen Kapitel zur effizienten Entwicklung mit Visual Studio 2012, zur Fehlerbehandlung sowie zu fortgeschrittenen C#-Themen wie LINQ, Multithreading, Serialisierung u. v. m. Den größten Themenblock bildet die Entwicklung von grafischen Benutzeroberflächen. Neben einer fundierten Einführung in die WPF und XAML erfahren Sie hier alles Notwendige, um auch komplexe Anwendungen zu gestalten. Anschließend wird die Datenbankprogrammierung mit ADO.NET ausführlich behandelt und zu guter Letzt die Weitergabe von .NET-Anwendungen thematisiert. So sind Sie für Ihren Arbeitsalltag bestens gerüstet!
    Pages: Online-Ressource (1402 Seiten)
    Edition: 6., akt. und erw. Aufl.
    ISBN: 9783836219976
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Keywords: Visual Basic 2012 ; .NET
    Description / Table of Contents: Sie möchten das Programmieren mit Visual Basic lernen? Dann führt Sie dieses Buch schnell und sicher zum Ziel. Anhand anschaulicher und leicht nachvollziehbarer Beispiele werden alle wichtigen Themen erläutert: Grundlagen zu Variablen, Operatoren, Schleifen und Co., objektorientierte Programmierung, Fehlerbehandlung, Erstellen von Datenbank- und Internetanwendungen. Auch in die Entwicklung von GUIs mit der Windows Presentation Foundation und von Windows Store Apps für Windows 8 werden Sie eingeführt. Ausführliche Schritt-für-Schritt-Anleitungen und regelmäßige Zusammenfassungen sichern Ihren Lernerfolg. Ihr neu gewonnenes Wissen können Sie an einer Vielzahl von Übungsaufgaben unter Beweis stellen und an Musterlösungen überprüfen. So werden Sie schon bald selbstständig eigene Windows-Programme entwickeln.
    Pages: Online-Ressource (579 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836219594
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Unknown
    Rijeka : InTech
    Keywords: environmental data mining ; big data
    Description / Table of Contents: 1. Ensemble Methods in Environmental Data Mining / by Goksu Tuysuzoglu, Derya Birant and Aysegul Pala --- 2. Estimating Customer Lifetime Value Using Machine Learning Techniques / by Sien Chen --- 3. Determination and Classification of Crew Productivity with Data Mining Methods / by Abdullah Emre Keleş and Mümine Kaya Keleş --- 4. Mining HCI Data for Theory of Mind Induction / by Oksana Arnold and Klaus P. Jantke --- 5. Performance-Aware High-Performance Computing for Remote Sensing Big Data Analytics / by Mustafa Kemal Pektürk and Muhammet Ünal --- 6. Early Prediction of Patient Mortality Based on Routine Laboratory Tests and Predictive Models in Critically Ill Patients / by Sven Van Poucke, Ana Kovacevic and Milan Vukicevic --- 7. Semantic Infrastructure for Service Environment Supporting Successful Aging / by Vesa Salminen, Päivi Sanerma, Seppo Niittymäki and Patrick Eklund --- 8. Adaptive Neural Network Classifier-Based Analysis of Big Data in Health Care / by Manaswini Pradhan --- 9. Identification of Research Thematic Approaches Based on Keywords Network Analysis in Colombian Social Sciences / by José Hernando Ávila-Toscano, Ivón Catherine Romero-Pérez, Ailed Marenco-Escuderos and Eugenio Saavedra Guajardo --- 10. Data Privacy for Big Data Publishing Using Newly Enhanced PASS Data Mining Mechanism / by Priyank Jain, Manasi Gyanchandani and Nilay Khare
    ISBN: 9781789235975
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Keywords: Bitcoin ; Blockchain ; cryptocurrency ; governance
    Description / Table of Contents: Chapter 1: Introduction: What are blockchains and how are they relevant to governance in the contemporary global political economy? / Malcolm Campbell-Verduyn --- Chapter 2: Moneys at the Margins – From Political Experiment to Cashless Societies / Moritz Hütten and Matthias Thiemann --- Chapter 3: The Internal and External Governance of Blockchain-Based Organisations: Evidence from Cryptocurrencies / Ying-Ying Hsieh, JP Vergne, and Sha Wang --- Chapter 4: The Mutual Constitution of Technology and Global Governance: Bitcoin, Blockchains, and the International Anti-Money Laundering Regime / Malcolm Campbell-Verduyn and Marcel Goguen --- Chapter 5: Between Liberalization and Prohibition: Prudent Enthusiasm and the Governance of Bitcoin/Blockchain Technology / Kai Jia and Falin Zhang --- Chapter 6: Cryptocurrencies and Digital Payment Rails in Networked Global Governance: Perspectives on Inclusion and Innovation / Daivi Rodima-Taylor and William W. Grimes --- Chapter 7: Governing What Wasn’t Meant To Be Governed: A Controversy-Based Approach to the Study of Bitcoin Governance / Francesca Musiani, Alexandre Mallard and Cécile Méadel --- Chapter 8: Experiments in Algorithmic Governance: A History and Ethnography of "The DAO," a Failed Decentralized Autonomous Organization / Quinn DuPont --- Chapter 9: Conclusion: Towards A Block Age or Blockages of Global Governance? / Malcolm Campbell-Verduyn
    Pages: Online-Ressource (XIII, 207 Seiten) , Diagramme
    ISBN: 9781315211909
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: Introduction --- Industrial Challenges. S-BPM's Industrial Capabilities --- Lot-Size One Production. People-Centred Production Design --- Human-Controlled Production --- Learnings --- The Future: Obstacles and Opportunities
    Pages: Online-Ressource (XIV, 232 pages) , 78 illustrations
    ISBN: 9783319484662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...