ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (155)
  • English  (155)
  • Russian
  • Computer Science  (155)
Collection
  • Books  (155)
Source
Language
  • 1
    Unknown
    Tokyo : TERRAPUB
    Keywords: space simulations ; simulation techniques ; simulation software
    Description / Table of Contents: Simulation Techniques --- One-dimensional Electromagnetic Particle Code: KEMPO1 A Tutorial on Microphysics in Space Plasmas / Y. Omura / pp. 1-21 --- Vlasov-code simulation / J. Büuchner / pp. 23-46 --- δf Particle-in-Cell Plasma Simulation Model: Properties and Applications / R. D. Sydora / pp. 47-60 --- Automatic Adaptive Multi-Dimensional Particle In Cell / G. Lapenta / pp. 61-76 --- Generalized Curvilinear Coordinates in Hybrid and Electromagnetic Codes / D. W. Swift / pp. 77-89 --- A New Methodology for Multi-Scale Simulation of Plasmas / H. Karimabadi, Y. Omelchenko, J. Driscoll, R. Fujimoto, and K. Perumalla / pp. 91-99 --- Numerical methods used in the Lyon-Fedder-Mobarry Global code to model the magnetosphere / J. G. Lyon / pp. 101-109 --- Unstructured Meshes and Finite Elements in Space Plasma Modelling: Principles and Applications / R. Marchand, J. Y. Lu, K. Kabin, and R. Rankin / pp. 111-143 --- Visualization of Tangled Vector Field Topology and Global Bifurcation of Magnetospheric Dynamics / D. Cai, K. Nishikawa, and B. Lembege / pp. 145-166 --- Introduction to Virtual Reality Visualization by the CAVE system / N. Ohno and A. Kageyama / pp. 167-207 --- Simulation Software --- KEMPO1 Kyoto university ElectroMagnetic Particle cOde: 1d version / Y. Omura / pp. 209-235 --- The Elements for Setting up a Hybrid or Electromagnetic Code in Curvilinear Coordinates / D. W. Swift / pp. 237-282
    Pages: Online-Ressource (VII, 282 Seiten)
    ISBN: 9784887041387
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Tokyo : TERRAPUB
    Keywords: space plasmas ; computer simulations ; particle simulations ; MHD simulations
    Description / Table of Contents: PART I PARTICLE SIMULATIONS --- INTRODUCTION TO PARTICLE SIMULATION MODELS AND OTHER APPLICATION TO ELECTROSTATIC PLASMA WAVES / Hideo Okuda / pp. 3-41 --- PARTICLE SIMULATION OF ELECTROMAGNETIC WAVES AND ITS APPLICATION TO SPACE PLASMAS / Hiroshi Matsumoto and Yoshiharu Omura / pp. 43-102 --- RELATIVISTIC CODE APPLIED TO RADIATION GENERATION / A. T. Lin / pp. 103-116 --- MODERN DEVELOPMENT IN PARTICLE SIMULATION / J. C. Adam / pp. 117-130 --- PART II MHD SIMULATIONS --- PRINCIPLES OF MAGNETOHYDRODYNAMIC SIMULATION IN SPACE PLASMAS / Tetsuya Sato / pp. 133-153 --- MHD MODELLING OF THE EARTH'S MAGNETOSPHERE / C. C. Wu / pp. 155-177 --- NUMERICALLY-SIMULATED FORMATION AND PROPAGATION OF INTERPLANETARY SHOCKS / S. T. Wu / pp. 179-201 --- ANOMALOUS TRANSPORT BY KELVIN-HELMHOLTZ INSTABILITIES / Akira Miura / pp. 203-224 --- PART III OTHER-METHOD SIMULATIONS --- PARTICLE BEHAVIOR IN THE MAGNETOSPHERE / R. A. Wolf and R. W. Spiro / pp. 227-254 --- HYBRID SIMULATION TECHNIQUES APPLIED TO THE EARTH'S BOW SHOCK / D. Winske and M. M. Leroy / pp. 255-278 --- VLASOV SIMULATION OF ION ACOUSTIC DOUBLE LAYERS / G. Chanteur / pp. 279-301 --- SIMULATION MODELS FOR SPACE PLASMAS AND BOUNDARY CONDITIONS AS A KEY TO THEIR DESIGN AND ANALYSIS / Christian T. Dum / pp. 303-375
    Pages: Online-Ressource (X, 380 Seiten)
    ISBN: 9027719527
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: space plasma physics ; simulation techniques ; simulation software
    Description / Table of Contents: I. Introduction --- 1. Computer Experiments of Space Plasmas --- II. Simulation Techniques --- 2. KEMPO1 --- 3. TRISTAN --- 4. MACRO-EM --- 5. HYBRID CODES --- 6. TWO-DIMENSIONAL MHD CODE --- 7. HIGH-PRECISION MHD SIMULATION --- 8. TUTORIAL FOR UNIX OPERATIONS --- III. Simulation Software --- 9. KEMPO1 --- 10. TRISTAN --- 11. MACROEM --- 12. HYBRID1 --- 13. MHD2 --- 14. WAVE
    Pages: Online-Ressource (VI, 487 Seiten)
    ISBN: 488704111X
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Beijing : O'Reilly
    Keywords: DocBook
    Pages: Online-Ressource (635 Seiten)
    Edition: 1st ed.
    ISBN: 1565925807
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Unknown
    Beijing : O'Reilly
    Keywords: Debian GNU/LINUX
    Pages: Online-Ressource (343 Seiten)
    Edition: 1st ed.
    ISBN: 1565927052
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: LINUX ; Operating systems
    Pages: Online-Ressource (474 Seiten)
    Edition: 2nd ed.
    ISBN: 1565924002
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    Amsterdam ; London : Elsevier
    Keywords: DDC 512.9422 ; LC QA161.P59 ; Equations, Roots of ; Polynomials
    Pages: Online-Ressource (2 v)
    ISBN: 9780444527295
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Wavelets (Mathematics)
    Description / Table of Contents: "Beyond Wavelets" presents state-of-the-art theories, methods, algorithms, and applications of mathematical extensions for classical wavelet analysis. Wavelets, introduced 20 years ago by Morlet and Grossmann and developed very rapidly during the 1980's and 1990's, has created a common link between computational mathematics and other disciplines of science and engineering. Classical wavelets have provided effective and efficient mathematical tools for time-frequency analysis which enhances and replaces the Fourier approach. However, with the current advances in science and technology, there is an immediate need to extend wavelet mathematical tools as well. "Beyond Wavelets" presents a list of ideas and mathematical foundations for such extensions, including: continuous and digital ridgelets, brushlets, steerable wavelet packets, contourlets, eno-wavelets, spline-wavelet frames, and quasi-affine wavelets. Wavelet subband algorithms are extended to pyramidal directional and nonuniform filter banks. In addition, this volume includes a method for tomographic reconstruction using a mechanical image model and a statistical study for independent adaptive signal representation. Investigators already familiar with wavelet methods from areas such as engineering, statistics, and mathematics will benefit by owning this volume. *Curvelets, Contourlets, Ridgelets, *Digital Implementation of Ridgelet Packets *Steerable Wavelet Packets *Essentially Non-Oscillatory Wavelets *Medical Imaging *Non-Uniform Filter Banks *Spline-wavelet frames and *Vanishing Moment Recovery Functions
    Pages: Online-Ressource (xiv, 305 pages)
    Edition: 1st ed
    ISBN: 9780127432731
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Unknown
    Rijeka : InTech
    Keywords: artificial intelligence ; pattern recognition
    Description / Table of Contents: Pattern recognition continued to be one of the important research fields in computer science and electrical engineering. Lots of new applications are emerging, and hence pattern analysis and synthesis become significant subfields in pattern recognition. This book is an edited volume and has six chapters arranged into two sections, namely, pattern recognition analysis and pattern recognition applications. This book will be useful for graduate students, researchers, and practicing engineers working in the field of machine vision and computer science and engineering.
    Pages: Online-Ressource (134 Seiten)
    ISBN: 9789535128045
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Unknown
    Rijeka : InTech
    Keywords: wireless ; sensor networks ; mobile wireless ; connectivity
    Description / Table of Contents: Chapter 1: Mobile Wireless Sensor Networks: An Overview by Velmani Ramasamy --- Chapter 2: Routing Protocols for Wireless Sensor Networks (WSNs) by Noman Shabbir and Syed Rizwan Hassan --- Chapter 3: Gradient Descent Localization in Wireless Sensor Networks by Nuha A.S. Alwan and Zahir M. Hussain --- Chapter 4: A Novel Hybrid Methodology Applied Optimization Energy Consumption in Homogeneous Wireless Sensor Networks by Plácido Rogerio Pinheiro, Álvaro Meneses Sobreira Neto, Alexei Barbosa Aguiar and Pedro Gabriel Calíope Dantas Pinheiro --- Chapter 5: WSN in Conservation Management by Akbar Ghobakhlou and Shane Inder --- Chapter 6: Recent Advances on Implantable Wireless Sensor Networks by Hugo Dinis and Paulo M. Mendes --- Chapter 7: Low-Cost Energy-Efficient Air Quality Monitoring System Using Wireless Sensor Network by Kavi Kumar Khedo and Vishwakarma Chikhooreeah --- Chapter 8: Modern Clustering Techniques in Wireless Sensor Networks by I.S. Akila, S.V. Manisekaran and R. Venkatesan --- Chapter 9: Fuzzy Adaptive Setpoint Weighting Controller for WirelessHART Networked Control Systems by Sabo Miya Hassan, Rosdiazli Ibrahim, Nordin Saad, Vijanth Sagayan Asirvadam, Kishore Bingi and Tran Duc Chung --- Chapter 10: A Hybrid Sink Repositioning Technique for Data Gathering in Wireless Sensor Networks by Prerana Shrivastava
    Pages: Online-Ressource (206 Seiten)
    ISBN: 9789535135623
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Unknown
    Rijeka : InTech
    Keywords: image processing
    Description / Table of Contents: Chapter 1: Colorimetry and Dichromatic Vision by Humberto Moreira, Leticia Álvaro, Anna Melnikova and Julio Lillo --- Chapter 2: Image Segmentation Based on Mathematical Morphological Operator by Jianjun Chen, Haijian Shao and Chunlong Hu --- Chapter 3: Color Reconstruction and Resolution Enhancement Using Super-Resolution by Eduardo Quevedo Gutiérrez and Gustavo Marrero Callicó --- Chapter 4: Color Analysis and Image Processing Applied in Agriculture by Jesús Raúl Martínez Sandoval, Miguel Enrique Martínez Rosas, Ernesto Martínez Sandoval, Manuel Moisés Miranda Velasco and Humberto Cervantes De Ávila --- Chapter 5: A Proposal of Color Image Processing Applications for Education by Hiroshi Kamada, Tomohisa Ishikawa and Keitaro Yoshikawa --- Chapter 6: Real-Time Video Analysis in Agriculture by Using LabVIEW Software by Abdullah Beyaz --- Chapter 7: Diffusion-Steered Super-Resolution Image Reconstruction by Baraka J. Maiseli --- Chapter 8: A New Pansharpening Approach for Hyperspectral Images by Chiman Kwan, Jin Zhou and Bence Budavari --- Chapter 9: Thresholding Algorithm Optimization for Change Detection to Satellite Imagery by René Vázquez-Jiménez, Rocío N. Ramos-Bernal, Raúl Romero- Calcerrada, Patricia Arrogante-Funes, Sulpicio Sanchez Tizapa and Carlos J. Novillo --- Chapter 10: Clouds Motion Estimation from Ground-Based Sky Camera and Satellite Images by Ali Youssef Zaher and Afraa Ghanem
    Pages: Online-Ressource (206 Seiten)
    ISBN: 9789535137450
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Unknown
    Rijeka : InTech
    Keywords: time series analysis ; TSA ; data science ; forecasting
    Description / Table of Contents: Chapter 1: Introductory Chapter: Time Series Analysis (TSA) for Anomaly Detection in IoT by Nawaz Mohamudally --- Chapter 2: Anxiety, Worry and Fear: Quantifying the Mind Using EKG Time Series Analysis by Toru Yazawa --- Chapter 3: Agricultural Monitoring in Regional Scale Using Clustering on Satellite Image Time Series by Renata Ribeiro do Valle Gonçalves, Jurandir Zullo Junior, Bruno Ferraz do Amaral, Elaine Parros Machado Sousa and Luciana Alvim Santos Romani --- Chapter 4: Volatility Parameters Estimation and Forecasting of GARCH(1,1) Models with Johnson’s SU Distributed Errors by Mohammed Elamin Hassan, Henry Mwambi and Ali Babikir --- Chapter 5: Generation of Earth’s Surface Three-Dimensional (3-D) Displacement Time-Series by Multiple-Platform SAR Data by Antonio Pepe --- Chapter 6: Time Series and Renewable Energy Forecasting by Mahmoud Ghofrani and Musaad Alolayan --- Chapter 7: Modeling Nonlinear Vector Time Series Data by Jiancheng Jiang and Sha Yu --- Chapter 8: Symbolic Time Series Analysis and Its Application in Social Sciences by Wiston Adrián Risso --- Chapter 9: State-Space Models for Binomial Time Series with Excess Zeros by Fan Tang and Joseph E. Cavanaugh --- Chapter 10: Ensemble Prediction of Stream Flows Enhanced by Harmony Search Optimization by Milan Cisty and Veronika Soldanova
    Pages: Online-Ressource (178 Seiten)
    ISBN: 9789535137436
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Bitcoin ; Blockchain ; cryptocurrency ; governance
    Description / Table of Contents: Chapter 1: Introduction: What are blockchains and how are they relevant to governance in the contemporary global political economy? / Malcolm Campbell-Verduyn --- Chapter 2: Moneys at the Margins – From Political Experiment to Cashless Societies / Moritz Hütten and Matthias Thiemann --- Chapter 3: The Internal and External Governance of Blockchain-Based Organisations: Evidence from Cryptocurrencies / Ying-Ying Hsieh, JP Vergne, and Sha Wang --- Chapter 4: The Mutual Constitution of Technology and Global Governance: Bitcoin, Blockchains, and the International Anti-Money Laundering Regime / Malcolm Campbell-Verduyn and Marcel Goguen --- Chapter 5: Between Liberalization and Prohibition: Prudent Enthusiasm and the Governance of Bitcoin/Blockchain Technology / Kai Jia and Falin Zhang --- Chapter 6: Cryptocurrencies and Digital Payment Rails in Networked Global Governance: Perspectives on Inclusion and Innovation / Daivi Rodima-Taylor and William W. Grimes --- Chapter 7: Governing What Wasn’t Meant To Be Governed: A Controversy-Based Approach to the Study of Bitcoin Governance / Francesca Musiani, Alexandre Mallard and Cécile Méadel --- Chapter 8: Experiments in Algorithmic Governance: A History and Ethnography of "The DAO," a Failed Decentralized Autonomous Organization / Quinn DuPont --- Chapter 9: Conclusion: Towards A Block Age or Blockages of Global Governance? / Malcolm Campbell-Verduyn
    Pages: Online-Ressource (XIII, 207 Seiten) , Diagramme
    ISBN: 9781315211909
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XX, 545 pages) , 106 illustrations
    ISBN: 9783319961422
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Unknown
    Beijing : O'Reilly
    Keywords: Mason ; Perl ; HTML
    Pages: Online-Ressource (297 Seiten)
    Edition: 1st ed.
    ISBN: 0596002254
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Keywords: LINUX ; Linux device drivers ; Treiber
    Pages: Online-Ressource (615 Seiten)
    Edition: 3rd ed.
    ISBN: 9780596005900
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Keywords: Mod Perl ; Perl ; Apache
    Pages: Online-Ressource (893 Seiten)
    Edition: 1st ed.
    ISBN: 0596002270
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Samba
    Pages: Online-Ressource (398 Seiten)
    Edition: 1st ed.
    ISBN: 1565924495
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Unknown
    Amsterdam ; New York : Elsevier Science
    Keywords: DDC 512.9/42 ; LC QA214 ; Equations, Simultaneous - Numerical solutions ; Iterative methods (Mathematics)
    Pages: Online-Ressource (vii, 400 pages)
    ISBN: 9780444827777
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: DDC 512/.72 ; LC QA242 ; Algebras, Linear ; Euclidean algorithm ; Orthogonal polynomials ; Pade´ approximant
    Pages: Online-Ressource (xvii, 446 pages)
    ISBN: 9780444828729
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Unknown
    Amsterdam ; New York : North-Holland
    Keywords: DDC 519.4 ; LC QA297 ; Numerical analysis
    Pages: Online-Ressource (278 pages)
    ISBN: 9780444701893
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Unknown
    Berlin, Heidelberg : Springer
    Keywords: Computer science ; Management information systems ; Industrial management ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business Process Management ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Introduction --- The Problem - Part I --- The Solution --- Transition --- The Problem - Part II --- The Solution - Part II --- Transition - Part II --- The Problem - Part III --- The Solution - Part III --- Transition - Part III --- The Problem, The Solution and The End - Final Part --- Troubleshooting
    Pages: Online-Ressource (X, 143 pages) , 210 illustrations in color
    ISBN: 9783642369049
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Keywords: GIS ; Geoinformationssysteme ; database ; databases ; geographic data ; information system ; knowledge engineering ; modeling ; topology
    Description / Table of Contents: The Third International Symposium on Large Spatial Databases (SSD '93) was held at the National University of Singapore in June 1993. The previous meetings of the series were at Sanata Barbara (1989) and Zurich (1991). The meetings are planned as a forum for researchers and practitioners specializing in database theory for and advanced applications of Spatial Information Systems. This volume constitutes the proceedings of the symposium. It contains 25 selected papersand three keynotes papers: "Spatial data management in database systems: research directions" (W. Kim), "From extensible databases to interoperability between multiple databases and GIS applications" (H.-J. Schek), and "The SEQUOIA 2000 project" (M. Stonebraker). The selectedpapers are collected into sections on: data modeling, spatial indexing, indexing mechanisms, handling of raster and vector data, spatial database systems, topology, storage management, query retrieval,knowledge engineering in SDS, and 3-dimensional data handling.
    Pages: Online-Ressource (XV, 537 pages)
    ISBN: 9783540477655
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Unknown
    London : Ubiquity Press
    Keywords: Open Data ; Open Science ; Open Access ; Text Mining ; Data Mining
    Description / Table of Contents: In 2010 the Panton Principles for Open Data in Science were published. These principles were founded upon the idea that "Science is based on building on, reusing and openly criticising the published body of scientific knowledge" (http://pantonprinciples.org) and they provide a succinct list of the fundamentals to observe when making your data open. Intended for a broad audience of academics, publishers and librarians, Issues in Research Data explores the implications of the Panton Principles through a number of perspectives on open research data in the sciences and beyond. The book features chapters by open data experts in a range of academic disciplines, covering practical information on licensing, ethics, and advice for data curators, alongside more theoretical issues surrounding the adoption of open data. As the book is open access, each chapter can stand alone from the main volume so that communities can host, distribute, build upon and remix the content that is relevant to them. Readers can access the online version via the QR code or DOI link at the front of the book.
    Pages: Online-Ressource (VI, 164 Seiten)
    ISBN: 9781909188327
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Keywords: holography
    Description / Table of Contents: Chapter 1: Volume Holography: Novel Materials, Methods and Applications by Tina Sabel and Marga C. Lensen --- Chapter 2: Volume Holographic Optical Elements as Solar Concentrators by Maria Antonietta Ferrara, Gaetano Bianco, Fabio Borbone, Roberto Centore, Valerio Striano and Giuseppe Coppola --- Chapter 3: Volume Bragg Gratings: Fundamentals and Applications in Laser Beam Combining and Beam Phase Transformations by Ivan Divliansky --- Chapter 4: Holographically Recorded Low Spatial Frequency Volume Bragg Gratings and Holographic Optical Elements by Suzanne Martin, Hoda Akbari, Sanjay Keshri, Dennis Bade, Izabela Naydenova, Kevin Murphy and Vincent Toal --- Chapter 5: Holographic Optical Elements and Application by Nam Kim, Yan-Ling Piao and Hui-Ying Wu --- Chapter 6: Holographic Data Storage Using Parallel-Aligned Liquid Crystal on Silicon Displays by Francisco J. Martínez Guardiola, Andrés Márquez Ruiz, Sergi Gallego Rico, Roberto Fernández Fernández, Jorge Francés Monllor, Manuel Ortuño Sánchez, Inmaculada Pascual Villalobos and Augusto Beléndez Vázquez --- Chapter 7: Microtopography and Thickness Measurement with Digital Holographic Microscopy Highlighting and Its Tomographic Capacity by Miguel León-Rodríguez, Juan A. Rayas-Alvarez, Amalia Martínez- García and Raúl R. Cordero --- Chapter 8: 3D Capture and 3D Contents Generation for Holographic Imaging by Elena Stoykova, Hoonjong Kang, Youngmin Kim, Joosup Park, Sunghee Hong and Jisoo Hong --- Chapter 9: Multiwavelength Digital Holography and Phase-Shifting Interferometry Selectively Extracting Wavelength Information: Phase-Division Multiplexing (PDM) of Wavelengths by Tatsuki Tahara, Reo Otani, Yasuhiko Arai and Yasuhiro Takaki --- Chapter 10: Dynamic Imaging with X-ray Holography by Büttner Felix --- Chapter 11: Indirect Off-Axis Holography for Antenna Metrology by Ana Arboleya, Jaime Laviada, Juha Ala-Laurinaho, Yuri Álvarez, Fernando Las-Heras and Antti V. Räisänen --- Chapter 12: Surface Characterization by the Use of Digital Holography by Dahi Ghareab Abdelsalam, Takeshi Yasui, Takayuki Ogawa and Baoli Yao --- Chapter 13: Digital Holographic Interferometry for Analysing High-Density Gradients in Fluid Mechanics by Jean-Michel Desse and François Olchewsky --- Chapter 14: Holography: The Usefulness of Digital Holographic Microscopy for Clinical Diagnostics by Zahra El-Schich, Sofia Kamlund, Birgit Janicke, Kersti Alm and Anette Gjörloff Wingren --- Chapter 15: Unlabeled Semen Analysis by Means of the Holographic Imaging by Giuseppe Coppola, Maria Antonietta Ferrara, Giuseppe Di Caprio, Gianfranco Coppola and Brian Dale --- Chapter 16: One-Step Holographic Photoalignment for Twisted Nematic Liquid Crystal Gratings by Kotaro Kawai, Moritsugu Sakamoto, Kohei Noda, Tomoyuki Sasaki, Nobuhiro Kawatsuki and Hiroshi Ono --- Chapter 17: Application of High Performance Photoinitiating Systems for Holographic Grating Recording by C. Ley, C. Carré, A. Ibrahim and X. Allonas --- Chapter 18: Fluorite Crystals with Color Centers: A Medium for Recording Extremely Stable but Broadly Transformable Holograms by Aleksandr I. Ryskin, Aleksandr E. Angervaks and Andrei V. Veniaminov --- Chapter 19: New Photo-Thermo-Refractive Glasses for Holographic Optical Elements: Properties and Applications by Nikonorov Nikolay, Ivanov Sergey, Dubrovin Victor and Ignatiev Alexander --- Chapter 20: Active Holography by Zurab V. Wardosanidze --- Chapter 21: Two-Wave Mixing in Organic-Inorganic Hybrid Structures for Dynamic Holography by Vera Marinova, Shiuan Huei Lin and Ken Yuh Hsu
    Pages: Online-Ressource (516 Seiten)
    ISBN: 9789535130383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Keywords: FEM ; Finite Element Method ; simulation
    Description / Table of Contents: Chapter 1: FEM Analysis of Mechanical and Structural Properties of Long Fiber-Reinforced Composites by Michal Petrů and Ondřej Novák --- Chapter 2: Finite Element Dynamic Analysis on Residual Stress Distribution of Titanium Alloy and Titanium Matrix Composite after Shot Peening Treatment by Lechun Xie, Zhou Wang, Chengxi Wang, Yan Wen, Liqiang Wang, Chuanhai Jiang, Weijie Lu, Lai-Chang Zhang and Lin Hua --- Chapter 3: Multiscale Wavelet Finite Element Analysis in Structural Dynamics by Mutinda Musuva and Cristinel Mares --- Chapter 4: Numerical Analysis of Hot Polymer-Coated Steel Pipeline Joints in Bending by Finian McCann, Guido Ridolfi, Erwan Karjadi, Harm Demmink and Helen Boyd --- Chapter 5: Application of Finite Element Analysis in Multiscale Metal Forming Process by Zhengyi Jiang and Haibo Xie --- Chapter 6: Finite Element Thermal Analysis of Metal Parts Additively Manufactured via Selective Laser Melting by Dario Pitassi, Enrico Savoia, Vigilio Fontanari, Alberto Molinari, Valerio Luchin, Gianluca Zappini and Matteo Benedetti --- Chapter 7: Adaptive Modeling and Simulation of Elastic, Dielectric and Piezoelectric Problems by Grzegorz Zboiński --- Chapter 8: Vibration Simulation of Electric Machines by Marcel Janda and Kristyna Jandova --- Chapter 9: Numerically and Analytically Forecasting the Coal Burst Using Energy Based Approach Methods by Faham Tahmasebinia, Chengguo Zhang, Ismet Canbulat, Onur Vardar and Serkan Saydam --- Chapter 10: Linear Thermo-Poroelasticity and Geomechanics by Horacio Florez --- Chapter 11: Numerical Analysis of the Incompressible Fluid Flow and Heat Transfer by Toshio Tagawa --- Chapter 12: Numerical Simulation of Wave (Shock Profile) Propagation of the Kuramoto-Sivashinsky Equation Using an Adaptive Mesh Method by Denson Muzadziwa, Stephen T. Sikwila and Stanford Shateyi --- Chapter 13: Numerical Analysis on the Simulated Heavy Rainfall Event of Tropical Cyclone Fung-Wong by Lei-Ming Ma and Xu-Wei Bao --- Chapter 14: Weighted Finite-Element Method for Elasticity Problems with Singularity by Viktor Anatolievich Rukavishnikov and Elena Ivanovna Rukavishnikova
    Pages: Online-Ressource (322 Seiten)
    ISBN: 9789535138501
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Keywords: Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Description / Table of Contents: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Pages: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Keywords: Computer science ; Health informatics ; Computer system failures ; Image processing ; Computer Science ; Health Informatics ; Health Informatics ; Image Processing and Computer Vision ; System Performance and Evaluation
    Description / Table of Contents: VISCERAL: Evaluation-as-a-Service for Medical Imaging --- Using the Cloud as a Platform for Evaluation and Data Preparation --- Ethical and Privacy Aspects of Using Medical Image Data --- Annotating Medical Image Data --- Datasets created in VISCERAL --- Evaluation Metrics for Medical Organ Segmentation and Lesion Detection --- VISCERAL Anatomy Benchmarks for Organ Segmentation and Landmark Localisation: Tasks and Results --- Retrieval of Medical Cases for Diagnostic Decisions: VISCERAL Retrieval Benchmark --- Automatic Atlas-Free Multi-Organ Segmentation of Contrast-Enhanced CT Scans --- Multi-organ Segmentation Using Coherent Propagating Level Set Method Guided by Hierarchical Shape Priors and Local Phase Information --- Automatic Multi-organ Segmentation using Hierarchically-Registered Probabilistic Atlases --- Multi-Atlas Segmentation Using Robust Feature-Based Registration --- Combining Radiology Images and Clinical Meta-data for Multimodal Medical Case-based Retrieval --- Text and Content-based Medical Image Retrieval in the VISCERAL Retrieval Benchmark
    Pages: Online-Ressource (XVIII, 254 pages) , 93 illustrations, 39 illustrations in color
    ISBN: 9783319496443
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Keywords: Computer science ; Data mining ; Artificial intelligence ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Document Preparation and Text Processing ; Artificial Intelligence (incl. Robotics) ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Reconstruction of Separable Particle Verbs in a Corpus of Spoken German --- Detecting Vocal Irony --- The Devil is in the Details: Parsing Unknown German Words --- Exploring Ensemble Dependency Parsing to Reduce Manual Annotation Workload --- Different German and English Co-reference Resolution Models for Multi-Domain Content Curation Scenarios --- Word and Sentence Segmentation in German: Overcoming Idiosyncrasies in the Use of Punctuation in Private Communication --- Fine-Grained POS Tagging of German Social Media and Web Texts --- Developing a Stemmer for German Based on a Comparative Analysis of Publicly Available Stemmers --- Negation Modeling for German Polarity Classification --- NECKAr: A Named Entity Classifier for Wikidata --- Investigating the Morphological Complexity of German Named Entities: The Case of the GermEval NER Challenge --- Detecting Named Entities and Relations in German Clinical Reports --- In-Memory Distributed Training of Linear-Chain Conditional Random Fields with an Application to Fine-Grained Named Entity Recognition --- What does this imply? Examining the Impact of Implicitness on the Perception of Hate Speech --- Automatic Classification of Abusive Language and Personal Attacks in Various Forms of Online Communication --- Token Level Code-Switching Detection Using Wikipedia as a Lexical Resource --- How Social Media Text Analysis Can Inform Disaster Management --- A Comparative Study of Uncertainty Based Active Learning Strategies for General Purpose Twitter Sentiment Analysis with Deep Neural Networks --- An Infrastructure for Empowering Internet Users to Handle Fake News and Other Online Media Phenomena --- Different Types of Automated and Semi-automated Semantic Storytelling: Curation Technologies for Different Sectors --- Twitter Geolocation Prediction Using Neural Networks --- Diachronic Variation of Temporal Expressions in Scientific Writing Through the Lens of Relative Entropy --- A Case Study on the Relevance of the Competence Assumption for Implicature Calculation in Dialogue Systems --- Supporting Sustainable Process Documentation --- Optimizing Visual Representations in Semantic Multi-Modal Models with Dimensionality Reduction, De-noising and Contextual Information --- Using Argumentative Structure to Grade Persuasive Essays
    Pages: Online-Ressource (XIII, 310 pages) , 54 illustrations
    ISBN: 9783319737065
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Keywords: Computer science ; Computer system failures ; Software engineering ; Data structures (Computer science) ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Theorem Proving --- Unification with Abstraction and Theory Instantiation in Saturation-based Reasoning --- Efficient verification of imperative programs using auto2 --- Frame Inference for Inductive Entailment Proofs in Separation Logic --- Verified Model Checking of Timed Automata --- SAT and SMT I --- Chain Reduction for Binary and Zero-Suppressed Decision Diagrams --- CDCLSym: Introducing E_ective Symmetry Breaking in SAT Solving --- Automatic Generation of Precise and Useful Commutativity Conditions --- Bit-Vector Model Counting using Statistical Estimation --- Deductive Verification --- Hoare Logics for Time Bounds --- A Verified Implementation of the Bounded List Container --- Automating Deductive Verification for Weak-Memory Programs --- Software Verification and Optimisation --- Property Checking Array Programs Using Loop Shrinking --- Invariant Synthesis for Incomplete Verification Engines --- Accelerating Syntax-Guided Invariant Synthesis --- Daisy - Framework for Analysis and Optimization of Numerical Programs --- Model Checking --- Oink: an Implementation and Evaluation of Modern Parity Game Solvers --- More Scalable LTL Model Checking via Discovering Design-Space Dependencies (D^3) --- Generation of Minimum Tree-like Witnesses for Existential CTL --- From Natural Projection to Partial Model Checking and Back --- Machine Learning --- ICE-based Refinement Type Discovery for Higher-Order Functional Programs --- Strategy Representation by Decision Trees in Reactive Synthesis --- Feature-Guided Black-Box Safety Testing of Deep Neural Networks.
    Pages: Online-Ressource (XX, 429 pages) , 93 illustrations
    ISBN: 9783319899602
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Keywords: Computer science ; Computer hardware ; Computer organization ; Software engineering ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computer Systems Organization and Communication Networks ; Computing Methodologies ; Computing Milieux ; Computer Hardware
    Description / Table of Contents: Concurrent and Distributed Systems --- Computing the concurrency threshold of sound free-choice workflow nets --- Fine-Grained Complexity of Safety Verification --- Parameterized verification of synchronization in constrained reconfigurable broadcast networks --- EMME: a formal tool for the ECMAScript Memory Model Evaluation --- SAT and SMT II --- What a Difference a Variable Makes --- Abstraction Refinement for Emptiness Checking of Alternating Data Automata --- Revisiting Enumerative Instantiation --- An Non-linear Arithmetic Procedure for Control-Command Software Verification --- Security and Reactive Systems --- Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection --- Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts --- RVHyper: A Runtime Verification Tool for Temporal Hyperproperties --- The Refinement Calculus of Reactive Systems Toolset --- Static and Dynamic Program Analysis --- TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation --- Optimal Dynamic Partial Order Reduction with Observers --- Structurally Defined Conditional Data-flow Static Analysis --- Geometric Nontermination Arguments --- Hybrid and Stochastic Systems --- Efficient dynamic error reduction for hybrid systems reachability analysis --- AMT2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic --- Multi-Cost Bounded Reachability in MDPs --- A Statistical Model Checker for Nondeterminism and Rare Events --- Temporal logic and mu-calculus --- Permutation Games for the Weakly Aconjunctive mu-Calculus --- Symmetry Reduction for the Local Mu-Calculus --- Bayesian Statistical Parameter Synthesis for Linear Temporal Properties of Stochastic Models --- 7th Competition on Software Verification (SV-COMP) --- 2LS: Memory Safety and Non-Termination (Competition contribution) --- Yogar-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement (Competition Contribution) --- CPA-BAM-Slicing: Block-Abstraction Memorization and Slicing with Region-Based Dependency Analysis (Competition Contribution) --- InterpChecker: Reducing State Space via Interpolations (Competition Contribution) --- Map2Check using LLVM and KLEE (Competition Contribution) --- Symbiotic 5: Boosted Instrumentation (Competition Contribution) --- Ultimate Automizer and the Search for Perfect Interpolants (Competition Contribution) --- Ultimate Taipan with Dynamic Block Encoding (Competition Contribution) --- VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)
    Pages: Online-Ressource (XX, 465 pages) , 92 illustrations
    ISBN: 9783319899633
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Unknown
    Cham : Springer
    Keywords: Computer science ; Music ; Consciousness ; User Interfaces and Human Computer Interaction ; Music ; Cognitive Psychology
    Description / Table of Contents: Introduction --- Part 1- Haptics in Musical Interaction: Psychophysics and User Experience --- A Brief Overview of the Somatosensory System --- Once More with Feeling: The Dynamics of Performer-Instrument Interaction --- Perception of Vibrotactile Cues in Musical Performance --- The Role of Haptic Cues in Musical Instrument Quality Perception --- A Functional Analysis of Haptic Feedback in Digital Musical Instrument Interactions --- Auditory-Tactile Experience of Music --- Part II - Haptic Musical Interfaces: Design and Applications --- The MSCI Platform: A Framework for the Design and Simulation of Multisensory Virtual Musical Instruments --- Implementation and Characterization of Vibrotactile Interfaces --- Touchscreens and Musical Interaction --- Design of Vibrotactile Feedback --- Haptic Force-Feedback Instruments for the Laptop Orchestra of Louisiana --- Haptics for the Development of Fundamental Rhythm Skills Including Multi-Limb Coordination
    Pages: Online-Ressource (XV, 285 pages) , 107 illustrations, 58 illustrations in color
    ISBN: 9783319583167
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Unknown
    Cham : Springer
    Keywords: Software engineering ; Management information systems ; Information Systems ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: 1 The Leading Role of Software and Systems Architecture in the Age of Digitization --- 2 Formal Methods and Agile Development: Towards a Happy Marriage --- 3 Escaping Method Prison – On the Road to Real Software Engineering --- 4 What is software?: The Role of Empirical Methods in Answering the Question --- 5 Only the Architecture You Need --- 6 Variability in standard software products Introducing software product line engineering to the insurance industry --- 7 Using Design Thinking for Requirements Engineering in the Context of Digitalization and Digital Transformation – a Motivation and an Experience Report --- 8 Towards Deviceless Edge Computing: Challenges, Design Aspects & Models for Serverless paradigm at the Edge --- 9 Data-driven decisions and actions in today’s software development --- 10 Software Architecture: Past, Present, Future --- 11 Software Product Lines --- 12 Enabling Flexible and Robust Business Process Automation for the Agile Enterprise --- 13 Achievements, Failures, and the Future of Model-based Software Engineering
    Pages: Online-Ressource (XV, 236 pages) , 98 illustrations, 51 illustrations in color
    ISBN: 9783319738970
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Keywords: Computer science ; Computer graphics ; Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Introduction --- System Theory --- Image Processing --- Endoscopy --- Microscopy --- Magnetic Resonance Imaging --- X-ray Imaging --- Computed Tomography --- X-ray Phase Contrast: Research on a Future Imaging Modality --- Emission Tomography --- Ultrasound --- Optical Coherence Tomography --- Acronyms.
    Pages: Online-Ressource (X, 259 pages) , 167 illustrations
    ISBN: 9783319965208
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Unknown
    Rijeka : InTech
    Keywords: environmental data mining ; big data
    Description / Table of Contents: 1. Ensemble Methods in Environmental Data Mining / by Goksu Tuysuzoglu, Derya Birant and Aysegul Pala --- 2. Estimating Customer Lifetime Value Using Machine Learning Techniques / by Sien Chen --- 3. Determination and Classification of Crew Productivity with Data Mining Methods / by Abdullah Emre Keleş and Mümine Kaya Keleş --- 4. Mining HCI Data for Theory of Mind Induction / by Oksana Arnold and Klaus P. Jantke --- 5. Performance-Aware High-Performance Computing for Remote Sensing Big Data Analytics / by Mustafa Kemal Pektürk and Muhammet Ünal --- 6. Early Prediction of Patient Mortality Based on Routine Laboratory Tests and Predictive Models in Critically Ill Patients / by Sven Van Poucke, Ana Kovacevic and Milan Vukicevic --- 7. Semantic Infrastructure for Service Environment Supporting Successful Aging / by Vesa Salminen, Päivi Sanerma, Seppo Niittymäki and Patrick Eklund --- 8. Adaptive Neural Network Classifier-Based Analysis of Big Data in Health Care / by Manaswini Pradhan --- 9. Identification of Research Thematic Approaches Based on Keywords Network Analysis in Colombian Social Sciences / by José Hernando Ávila-Toscano, Ivón Catherine Romero-Pérez, Ailed Marenco-Escuderos and Eugenio Saavedra Guajardo --- 10. Data Privacy for Big Data Publishing Using Newly Enhanced PASS Data Mining Mechanism / by Priyank Jain, Manasi Gyanchandani and Nilay Khare
    ISBN: 9781789235975
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Unknown
    Beijing : O'Reilly
    Keywords: Netscape ; Mozilla ; Source code
    Pages: Online-Ressource (454 Seiten)
    ISBN: 0596000529
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 519.5/35 ; LC QA278 ; Approximation theory - Research ; Interpolation - Research ; Multivariate analysis - Research
    Pages: Online-Ressource (ix, 346 pages)
    Edition: 1st ed
    ISBN: 9780444518446
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Keywords: DDC 519.6 ; LC QA402.5 ; Mathematical optimization - Congresses ; Parallel algorithms - Congresses
    Description / Table of Contents: Papers from the Research Workshop on Inherently Parallel Algorithms in Feasibility and Optimization and Their Applications, held in Haifa, Israel, Mar. 13-16, 2000
    Pages: Online-Ressource (x, 504 pages)
    Edition: 1st ed
    ISBN: 9780444505958
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 515/.35 ; LC QA871 ; Matrices ; Perturbation (Mathematics)
    Pages: Online-Ressource (xii, 429 pages)
    Edition: 1st ed
    ISBN: 9780444513151
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 518/.43 ; LC QA218 ; Algebras, Linear ; Equations - Numerical solutions
    Pages: Online-Ressource (330 pages)
    Edition: 1st ed
    ISBN: 9780444514745
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Keywords: Information technology ; Information systems ; Information Systems ; Information Systems Applications (incl. Internet) ; IT in Business ; Computer Appl. in Administrative Data Processing ; Management of Computing and Information Systems
    Description / Table of Contents: Thinking of Business Processes Systematically --- From Language Acquisition to Subject-oriented Modeling --- The Integrated S-BPM Process Model --- Subject-oriented Process Analysis --- Modeling Processes in a Subject-Oriented Way --- Subject-Oriented Modeling by Construction and Restriction --- Subject-oriented Validation of Processes and Process Models --- Subject-oriented Optimization of Processes --- Organization-specific Implementation of Subject-oriented Processes --- IT-Implementation of Subject-Oriented Business Processes --- Subject-oriented Monitoring of Processes --- A Precise Description of the S-BPM Modeling Method --- Tools for S-BPM --- S-BPM Method by Comparison --- Conclusion --- A Subject-Oriented Interpreter Model for S-BPM
    Pages: Online-Ressource (XVI, 376 pages)
    ISBN: 9783642323928
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Unknown
    Freexian SARL
    Keywords: Debian ; Ubuntu ; Debian GNU/Linux ; Linux ; Administrator
    Description / Table of Contents: Accessible to all, this book teaches the essentials to anyone who wants to become an effective and independent Debian GNU/Linux administrator. It covers all the topics that a competent Linux administrator should master, from the installation and the update of the system, up to the creation of packages and the compilation of the kernel, but also monitoring, backup and migration, without forgetting advanced topics like SELinux setup to secure services, automated installations, or virtualization with Xen, KVM or LXC.
    Pages: Online-Ressource (XXIV, 468 Seiten)
    ISBN: 9791091414012
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Keywords: Linked Dataspaces ; Smart Environments ; Distributed Computing Methodologies ; Internet of Things ; Ubiquitous computing
    Description / Table of Contents: Real-time Linked Dataspaces: A Data Platform for Intelligent Systems Within Internet of Things-Based Smart Environments --- Enabling Knowledge Flows in an Intelligent Systems Data Ecosystem --- Dataspaces: Fundamentals, Principles, and Techniques --- Fundamentals of Real-time Linked Dataspaces --- Data Support Services for Real-time Linked Dataspaces --- Catalog and Entity Management Service for Internet of Things-Based Smart Environments --- Querying and Searching Heterogeneous Knowledge Graphs in Real-time Linked Dataspaces --- Enhancing the Discovery of Internet of Things-Based Data Services in Real-time Linked Dataspaces --- Human-in-the-Loop Tasks for Data Management, Citizen Sensing, and Actuation in Smart Environments --- Stream and Event Processing Services for Real-time Linked Dataspaces --- Quality of Service-Aware Complex Event Service Composition in Real-time Linked Dataspaces --- Dissemination of Internet of Things Streams in a Real-time Linked Dataspace --- Approximate Semantic Event Processing in Real-time Linked Dataspaces --- Enabling Intelligent Systems, Applications, and Analytics for Smart Environments Using Real-time Linked Dataspaces --- Autonomic Source Selection for Real-time Predictive Analytics Using the Internet of Things and Open Data --- Building Internet of Things-Enabled Digital Twins and Intelligent Applications Using a Real-time Linked Dataspace --- A Model for Internet of Things Enhanced User Experience in Smart Environments --- Future Research Directions for Dataspaces, Data Ecosystems, and Intelligent Systems
    Pages: Online-Ressource (XXIII, 325 pages) , illustrations, diagrams
    ISBN: 9783030296650
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Unknown
    Rijeka : InTech
    Keywords: Cloud computing ; Internet of Things
    Description / Table of Contents: Chapter 1: State-of-the-Art Antenna Technology for Cloud Radio Access Networks (C-RANs) by Waleed Tariq Sethi, Abdullah Alfakhri, Muhammad Ahmad Ashraf, Amr G. Alasaad and Saleh Alshebeili --- Chapter 2: Cloud Computing for Next-Generation Sequencing Data Analysis by Shanrong Zhao, Kirk Watrous, Chi Zhang and Baohong Zhang --- Chapter 3: Green-Aware Virtual Machine Migration Strategy in Sustainable Cloud Computing Environments by Xiaoying Wang, Guojing Zhang, Mengqin Yang and Lei Zhang --- Chapter 4: M-ary Optical Computing by Jian Wang and Yun Long --- Chapter 5: Networking Solutions for Integrated Heterogeneous Wireless Ecosystem by Roman Florea, Aleksandr Ometov, Adam Surak, Sergey Andreev and Yevgeni Koucheryavy
    Pages: Online-Ressource (138 Seiten)
    ISBN: 9789535132448
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Unknown
    Rijeka : InTech
    Keywords: mobile devices ; wireless devices ; MANET
    Description / Table of Contents: Chapter 1: Data-Gathering and Aggregation Protocol for Networked Carrier Ad Hoc Networks: The Optimal and Heuristic Approach by Chao Gao, Guorong Zhao and Jianhua Lu --- Chapter 2: A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks by Rutvij H. Jhaveri, Narendra M. Patel and Devesh C. Jinwala --- Chapter 3: Performance Analysis of Three Routing Protocols in MANET Using the NS-2 and ANOVA Test with Varying Speed of Nodes by Subhrananda Goswami, Subhankar Joardar, Chandan Bikash Das, Samarajit Kar and Dibyendu Kumar Pal --- Chapter 4: Cooperative Routing in Multi-Radio Multi-Hop Wireless Network by Kun Xie, Shiming He, Xin Wang, Dafang Zhang and Keqin Li --- Chapter 5: MANET Network in Internet of Things System by Rasa Bruzgiene, Lina Narbutaite and Tomas Adomkus --- Chapter 6: Radio Frequency-Based Indoor Localization in Ad-Hoc Networks by Mehdi Golestanian, Joshua Siva and Christian Poellabauer
    Pages: Online-Ressource (146 Seiten)
    ISBN: 9789535131106
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Unknown
    Rijeka : InTech
    Keywords: computer modelling ; computer simulation
    Description / Table of Contents: Chapter 1: Modelling and Simulation of Complex Adaptive System: The Diffusion of Socio-Environmental Innovation in the RENDRUS Network by Aida Huerta Barrientos and Yazmin Dillarza Andrade --- Chapter 2: Rendering Techniques in 3D Computer Graphics Based on Changes in the Brightness of the Object Background by Nika Bratuž, Helena Gabrijelčič Tomc and Dejana Javoršek --- Chapter 3: Modelling and Visualisation of the Optical Properties of Cloth by Tanja Nuša Kočevar and Helena Gabrijelčič Tomc --- Chapter 4: Textile Forms’ Computer Simulation Techniques by Andreja Rudolf, Slavica Bogović, Beti Rogina Car, Andrej Cupar, Zoran Stjepanovič and Simona Jevšnik --- Chapter 5: Computer Simulation of Bioprocess by Jianqun Lin, Ling Gao, Huibin Lin, Yilin Ren, Yutian Lin and Jianqiang Lin --- Chapter 6: Developing a Hybrid Model and a Multi-Scale 3D Concept of Integrated Modelling High-Temperature Processes by Marcin Hojny --- Chapter 7: Computer-Aided Physical Simulation of the Soft-Reduction and Rolling Process by Marcin Hojny --- Chapter 8: Surrogate Modelling with Sequential Design for Expensive Simulation Applications by Joachim van der Herten, Tom Van Steenkiste, Ivo Couckuyt and Tom Dhaene --- Chapter 9: Computer Simulation of High-Frequency Electromagnetic Fields by Andrey D. Grigoriev --- Chapter 10: Modeling and Simulation of Task Allocation with Colored Petri Nets by Mildreth Alcaraz-Mejia, Raul Campos-Rodriguez and Marco Caballero-Gutierrez --- Chapter 11: Multi-Criteria Decision-Making in the Implementation of Renewable Energy Sources by Dejan Jovanovic and Ivan Pribicevic
    Pages: Online-Ressource (264 Seiten)
    ISBN: 9789535132066
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Unknown
    Rijeka : InTech
    Keywords: parallel computing ; distributed computing
    Description / Table of Contents: Chapter 1: Introductory Chapter: The Newest Research in Parallel and Distributed Computing by Wen-Jyi Hwang --- Chapter 2: Social Trust: Evaluating Node Influential Capability in Social Networks by Yap Hock Yeow and Lim Tong-Ming --- Chapter 3: A Distributed Computing Architecture for the Large-Scale Integration of Renewable Energy and Distributed Resources in Smart Grids by Ignacio Aravena, Anthony Papavasiliou and Alex Papalexopoulos --- Chapter 4: GPU Computing Taxonomy by Abdelrahman Ahmed Mohamed Osman --- Chapter 5: Distributed Software Development Tools for Distributed Scientific Applications by Vaidas Giedrimas, Leonidas Sakalauskas and Anatoly Petrenko --- Chapter 6: DANP-Evaluation of AHP-DSS by Wolfgang Ossadnik, Ralf H. Kaspar and Benjamin Föcke
    Pages: Online-Ressource (122 Seiten)
    ISBN: 9789535133162
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Keywords: heuristics
    Description / Table of Contents: Chapter 1: Hyper-Heuristics and Metaheuristics for Selected Bio-Inspired Combinatorial Optimization Problems by Aleksandra Swiercz --- Chapter 2: Multi-Objective Hyper-Heuristics by Mashael Suliaman Maashi --- Chapter 3: Heuristics Techniques for Scheduling Problems with Reducing Waiting Time Variance by Satyasundara Mahapatra, Rati Ranjan Dash and Sateesh K. Pradhan --- Chapter 4: Efficient Heuristics for Scheduling with Release and Delivery Times by Nodari Vakhania --- Chapter 5: Advanced Particle Filter Methods by Roi Yozevitch and Boaz Ben-Moshe --- Chapter 6: On the Use of Hybrid Heuristics for Providing Service to Select the Return Channel in an Interactive Digital TV Environment by Marcos César da Rocha Seruffo, Ádamo Lima de Santana, Carlos Renato Lisboa Francês and Nandamudi Lankalapalli Vijaykumar
    Pages: Online-Ressource (134 Seiten)
    ISBN: 9789535133841
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Common challenges with software --- The map --- A holistic view to change --- The compass --- The journeys --- Co-develop in a community --- Charing is caring --- A thriving Open Source culture behind the wall --- Keeping the doors open.- Building ecosystems --- Pushing the boundaries --- Add supplementary services --- Adding Internet to things --- Boosting product sales by services --- Deliver 24/7 --- Pruning a bush --- Ensuring prima deliveries --- Pump up the volume --- Global R&D goes agile with SAFe --- Multi-site development --- Agile and disciplined --- Scaling Agile in Automotive --- Scaling Agile in Life sciences --- Outside the box --- Efficient communication --- Outsourcing Strategy at Sony Mobile --- Not so shore anymore --- Play it again, Sam, backwards --- First things first --- Robotic growing pains --- Softhouse reflects on architecture changes --- From mobile to Platform --- Your journey
    Pages: Online-Ressource (XXIII, 242 pages)
    ISBN: 9783319531168
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Unknown
    Cham : Springer
    Keywords: Computer science ; Artificial intelligence ; Algorithms ; Robotics ; Automation ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Algorithms ; Robotics and Automation
    Description / Table of Contents: Robots and their Applications --- Sensors --- Reactive Behavior --- Finite State Machines --- Robotic Motion and Odometry --- Control --- Local Navigation: Obstacle Avoidance --- Localization --- Mapping --- Mapping-based Navigation --- Fuzzy Logic Control --- Image Processing --- Neural Networks --- Machine Learning --- Swarm Robotics --- Kinematics of a Robotic Manipulator --- Appenix A:Units of Measurement --- Appendix B:Mathematical Derivations and Tutorials --- Index
    Pages: Online-Ressource (XVI, 308 pages) , 198 illustrations, 76 illustrations in color
    ISBN: 9783319625331
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Keywords: Computer science ; Special purpose computers ; Database management ; User interfaces (Computer systems) ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics) ; User Interfaces and Human Computer Interaction ; Database Management ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Can Machines Design? Optimizing User Interfaces for Human Performance --- Geometrical Shapes Rendering on a Dot-Matrix Display --- Dynamic Hand Gesture Recognition for Mobile Systems Using Deep LSTM --- Adjustable Autonomy for UAV Supervision Applications Through Mental Workload Assessment Techniques --- Classification of Motor Imagery Based EEG Signals Using Sparsity Approach --- Mental Workload Assessment for UAV Traffic Control Using Consumer-Grade BCI Equipment --- Improving Classification Performance by Combining Feature Vectors with A Boosting Approach for Brain Computer Interface (BCI) --- List Navigation Using Edge Menu --- Simplexity and Vicariance. On Human Cognition Principles for Man-Machine Interaction --- Design Considerations for Self-paced Interactive Notes on Video Lectures - A Learner's Perspective and Enhancements of Learning Outcome --- Using Psycholinguistic Features for the Classification of Comprehenders from Summary Speech Transcripts --- Lector: Towards Reengaging Students in the Educational Process Inside Smart Classrooms --- Predicting Driver's Work Performance in Driving Simulator Based on Physiological Indices --- Interpersonal Human-Human and Human-Robot Interactions --- Exploring the Dynamics of Relationships Between Expressed and Experienced Emotions --- Standard Co-training in Multiword Expression Detection --- Comparative Study on Normalization in Emotion Recognition from Speech --- Detecting Vigilance in People Performing Continual Monitoring Task
    Pages: Online-Ressource (XVIII, 216 pages) , 78 illustrations
    ISBN: 9783319720388
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Keywords: Computer science ; Management information systems ; Computer engineering ; Economic policy ; Computer Science ; Privacy ; Computer Engineering ; Management of Computing and Information Systems ; Governance and Government ; R & D/Technology Policy
    Description / Table of Contents: 1 Introduction --- 2 Trust --- 3 What is an ICT-System? --- 4 Development of ICT Systems --- 5 Theoretical Foundation --- 6 Reverse Engineering of Code --- 7 Static Detection of Malware --- 8 Dynamic Detection Methods --- 9 Formal Methods --- 10 Software Quality and Quality Management --- 11 Containment of Untrusted Modules --- 12 Summary and Way Forward
    Pages: Online-Ressource (XIV, 116 pages) , 6 illustrations, 5 illustrations in color
    ISBN: 9783319749501
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Keywords: Computer science ; Logic design ; Computer organization ; Operating systems (Computers) ; Computers ; Computer Science ; Computing Methodologies ; Computer Systems Organization and Communication Networks ; Operating Systems ; Logic Design ; Information Systems and Communication Service
    Description / Table of Contents: HHVSF: A Framework to Accelerate Drug-based High-throughput Virtual Screening on High-Performance Computers --- HBasechainDB --- A Scalable Blockchain Framework on Hadoop Ecosystem --- DETOUR: A Large-Scale Non-Blocking Optical Data Center Fabric --- Querying Large Scientific Data Sets with Adaptable IO System ADIOS --- On the Performance of Spark on HPC Systems: Towards a Complete Picture --- Experiences of Converging Big Data Analytics Frameworks with High Performance Computing Systems --- MACC : An OpenACC Transpiler for Automatic Multi-GPU Use --- Acceleration of Wind Simulation using Locally Mesh-Refined Lattice Boltzmann Method on GPU-Rich supercomputers --- Architecture of an FPGA-Based Heterogeneous System for Code-Search Problems --- TINS: A Task-Based Dynamic Helper Core Strategy for In Situ Analytics --- Machine Learning Predictions for Underestimation of Job Runtime on HPC System --- A Power Management Framework with Simple DSL for Automatic Power-Performance Optimization on Power-Constrained HPC Systems --- Scalable Data Management of the Uintah Simulation Framework for Next-Generation Engineering Problems with Radiation --- High performance LOBPCG method for solving multiple eigenvalues of Hubbard model: Efficiency of communication avoiding Neumann expansion preconditioner --- Application of a preconditioned Chebyshev basis communication-avoiding conjugate gradient method to a multiphase thermal-hydraulic CFD code --- Optimization of Hierarchical matrix computation on GPU
    Pages: Online-Ressource (X, 293 pages) , 121 illustrations
    ISBN: 9783319699530
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Keywords: Computer science ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers ; Computer Science ; Systems and Data Security ; Theory of Computation ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Pages: Online-Ressource (XIV, 347 pages) , 85 illustrations
    ISBN: 9783319897226
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Keywords: Computer science ; Computer hardware ; Computer organization ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Programming Languages, Compilers, Interpreters ; Theory of Computation ; Computer Systems Organization and Communication Networks ; Computer Hardware ; Computing Methodologies ; Computing Milieux
    Description / Table of Contents: Language Design --- Consistent Subtyping for All --- HOBiT: Programming Lenses without using Lens Combinators --- Dualizing Generalized Algebraic Data Types by Matrix Transposition --- Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach --- Probabilistic Programming --- An Assertion-Based Program Logic for Probabilistic Programs --- Fine-grained Semantics for Probabilistic Programs --- How long, O Bayesian network, will I sample thee? --- Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus --- Types and Effects --- Failure is Not an Option: An Exceptional Type Theory --- Let Arguments Go First --- Behavioural equivalence via modalities for algebraic effects --- Explicit Effect Subtyping --- Concurrency --- A separation logic for a promising semantics --- Logical Reasoning for Disjoint Permissions --- Deadlock-Free Monitors --- Fragment Abstraction for Concurrent Shape Analysis --- Security --- Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management --- Modular Product Programs --- Program Verification --- A Fistful of Dollars: Formalizing Asymptotic Complexity Claims via Deductive Program Verification --- Verified Learning Without Regret --- Program Verification by Coinduction --- Velisarios: Byzantine Fault Tolerant Protocols Powered by Coq --- Program Analysis and Automated Verification --- Evaluating Design Tradeoffs in Numeric Static Analysis for Java --- An Abstract Interpretation Framework for Input Data Usage --- Higher-Order Program Verification via HFL Model Checking --- Quantitative Analysis of Smart Contracts --- Session Types and Concurrency --- Session-Typed Concurrent Contracts --- A Typing Discipline for Statically Verified Crash Failure Handling in Distributed Systems --- On Polymorphic Sessions and Functions: A Tale of Two (Fully Abstract) Encodings --- Concurrent Kleene Algebra: Free Model and Completeness --- Concurrency and Distribution --- Correctness of a Concurrent Object Collector for Actor Languages --- Paxos Consensus, Deconstructed and Abstracted --- On Parallel Snapshot Isolation and Release/Acquire Consistency --- Eventual Consistency for CRDTs --- Compiler Verification --- A Verified Compiler from Isabelle/HOL to CakeML --- Compositional Verification of Compiler Optimisations on Relaxed Memory
    Pages: Online-Ressource (XVI, 1058 pages) , 276 illustrations
    ISBN: 9783319898841
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Computer system failures ; Coding theory ; E-commerce ; Computer Science ; Computer Communication Networks ; System Performance and Evaluation ; Special Purpose and Application-Based Systems ; Information Systems Applications (incl. Internet) ; Coding and Information Theory ; e-Commerce/e-business
    Description / Table of Contents: State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services --- Context Monitoring for Improved System Performance and QoE --- QoE Management for Future Networks --- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management --- Lag Compensation for First Person Shooter Games in Cloud Gaming --- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios --- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems --- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments --- Integrating SDN and NFV with QoS-aware Service Composition --- Energy vs. QoX Network- and Cloud Services Management --- Traffic Management for Cloud Federation --- Efficient Simulation of IoT Cloud Use Cases --- Security of Internet of Things for Reliable Internet of Services --- TCP performance over current cellular access: A comprehensive analysis
    Pages: Online-Ressource (XVI, 401 pages) , 120 illustrations
    ISBN: 9783319904153
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XIX, 703 pages) , 146 illustrations
    ISBN: 9783319961453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Keywords: Computer science ; Computer communication systems ; Software engineering ; Mathematical statistics ; Computers ; Artificial intelligence ; Computer graphics ; Computer Science ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Smart algorithms --- Data classification and processing --- Stochastic modelling --- Performance evaluation --- Queuing systems --- Wireless networks and security --- Image processing and computer vision
    Pages: Online-Ressource (XIII, 278 pages) , 75 illustrations
    ISBN: 9783319472171
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Keywords: Computer science ; Software engineering ; Computers ; Law and legislation ; Management information systems ; Computer Science ; Management of Computing and Information Systems ; Software Engineering ; Legal Aspects of Computing ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation
    Pages: Online-Ressource (XIV, 220 pages) , 37 illustrations
    ISBN: 9783319577357
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Keywords: Computer network architectures ; Political theory ; Public policy ; Political science ; Public administration ; Computer Systems Organization and Communication Networks ; Political Theory ; Public Policy ; Science, Humanities and Social Sciences, multidisciplinary ; Political Science ; Public Administration
    Description / Table of Contents: This book is open access under a CC-BY license. Policy-making to address grand challenges faces greater complexity than any previous project of modernization. Future scenarios are haunted by uncertainty and there is real ambivalence as to the values that policy should strive for. In this situation decision-makers look to research and innovation to provide answers and solutions. But neither can the great transitions ahead be planned by science, nor will conventional methods of innovation bring such transitions about. A turn to interactive governance is therefore underway with policy-makers and citizens becoming increasingly involved in processes of deliberating futures. Technology Assessment (TA) is the art of structuring such processes. TA goes beyond traditional expert policy analysis by systematically combining a multi-disciplinary evidence base with participatory approaches to policy deliberation. TA thus seeks to act as a hub for serious and transparent dialogue between policy, industry, science, and society about the challenges ahead and the available options for overcoming them responsibly. This volume offers an up-to-date account of the expansion of technology assessment capacities across new European member states. The contributions of this volume are written by leading European researchers and practitioners in technology assessment (TA) and are based on the PACITA (Parliaments and Civil Society in Technology Assessment) project. Lars Klüver is Director of the Danish Board of Technology, Copenhagen, Denmark. Rasmus Øjvind Nielsen is Researcher at the Danish Board of Technology, Copenhagen, Denmark. Marie Louise Jørgensen is Project Manager at the Danish Board of Technology, Copenhagen, Denmark
    Pages: Online-Ressource (XVI, 171 pages)
    ISBN: 9781137561725
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Unknown
    Cham : Springer
    Keywords: Computer science ; Computer organization ; Computers ; Artificial intelligence ; Computer simulation ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Simulation and Modeling
    Description / Table of Contents: Preface --- Part I: The Concept of Anti-Fragility: 1 Introduction --- 2 Achieving Anti-Fragility --- 3 The Need to Build Trust --- 4 Principles Ensuring Anti-Fragility --- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions --- 6 An Anti-Fragile e-Government System --- 7 Anti-Fragile Cloud-Based Telecom Systems --- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading --- 9 Robustness to Malware Reinfections --- 10 Anti-Fragility to Malware Spreading --- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm --- 12 Detecting Anomalies with the CLA --- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work --- About the Author --- References --- Index
    Pages: Online-Ressource (XVIII, 151 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9783319300702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Computers ; Computers and civilization ; Computer Science ; History of Computing ; User Interfaces and Human Computer Interaction ; Computer Appl. in Arts and Humanities ; Computers and Society
    Description / Table of Contents: Once Neglected, Now Emerging and Absolutely Necessary: On the History of Digital Humanities or An Introduction --- Why Oral History? ---  ‘Individuation is There in all the Different Strata:’ an Oral History Conversation between John Burrows, Hugh Craig and Willard McCarty --- ‘It was a Time When the University was Still Taking Account of the Meaning of universitas scientiarum’: an Oral History Conversation between Wilhelm Ott and Julianne Nyhan --- ‘hic Rhodus, hic salta’: An Oral History Interview Between Tito Orlandi and Julianne Nyhan --- ‘They Took a Chance’: An Oral History Conversation between Susan Hockey and Julianne Nyhan ---  ‘And Here We go Back Again to the Influence of Algorithmic Thinking’: An Oral History conversation between Judy Malloy and Julianne Nyhan --- ‘I Would Think of Myself as Sitting Inside the Computer, Moving Things Around in Order to Accomplish the Goal of my Programming’: An Oral History Conversation Between Mary Dee Harris and Julianne Nyhan --- ‘I Was Absolutely Convinced That There Had to be a Better Way’: An Oral History Conversation Between John Nitti and Julianne Nyhan --- ‘It’s a Little Mind-Boggling Actually’: An Oral History Conversation between Helen Agüera and Julianne Nyhan ---  ‘I Heard About the Arrival of the Computer’: An Oral History Conversation Between Hans Rutimann and Julianne Nyhan ---  ‘Langezeit habe ich der Universitaet nachgetrauert’: An Oral History Conversation between Michael Sperberg-McQueen and Julianne Nyhan.-‘It’s Probably the Only Modestly Widely used System with a Command Language in Latin’: An Oral History Conversation Between Manfred Thaller and Julianne Nyhan ---  ‘I was Keen on Getting Computers into Humanists’ Thinking’: An Oral History Conversation Between John Bradley and Julianne Nyhan ---  ‘Moderate Expectations, Tolerable Disappointments’: An Oral History Conversation between Claus Huitfeldt and Julianne Nyhan --- ‘So, Into the Chopper it Went’: An Oral History Conversation between Gabriel Egan and Julianne Nyhan --- Revolutionaries and Underdogs --- By Way of a Conclusion
    Pages: Online-Ressource (XI, 285 pages)
    ISBN: 9783319201702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Agile requirements --- COSMIC User Story Standard --- Improving Mockup-based Requirement Specification with End-User Annotations --- Agile testing --- Combining STPA and BDD for Safety Analysis and Verification in Agile Development: A Controlled Experiment --- Software tester, we want to hire you! An analysis of the demand for soft skills --- Developers' initial perceptions on TDD practice: A thematic analysis with distinct domains and languages --- Myths and Facts about Static Application Security Testing Tools: An Action Research at Telenor Digital --- Automated Acceptance Tests as Software Requirements: An Experiment to Compare the Applicability of Fit tables and Gherkin Language --- Agile transformation --- Interface Problems of Agile in a Non-Agile Environment --- Enterprise agility: Why is transformation so hard? --- Technical and Organizational Agile Practices: A Latin-American Survey --- Agile Software Development { Adoption & Maturity: An Activity Theory Perspective --- Scaling agile --- Do Agile Methods Work for Large Software Projects? --- Learning in the Large - An Exploratory Study of Retrospectives in Large-Scale Agile Development --- Reporting in Agile Portfolio Management: Routines, Metrics and Artefacts to Maintain an Effective Oversight --- Inter-team Coordination in Large-Scale Agile Development: A Case Study of Three Enabling Mechanisms --- Supporting Large-Scale Agile Development with Domain-driven Design --- Towards Agile Scalability Engineering --- Human-centric agile --- Stress in Agile Software Development: Practices and Outcomes --- Teamwork quality and team performance: Exploring differences between small and large agile projects --- Continuous experimentation --- Challenges and Strategies for Undertaking Continuous Experimentation to Embedded Systems: Industry and Research Perspectives --- ICOs overview: should investors choose an ICO developed with the Lean Startup methodology?
    Pages: Online-Ressource (XV, 309 pages) , 50 illustrations
    ISBN: 9783319916026
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Data encryption (Computer science) ; Computer Science ; Security ; Information Systems Applications (incl. Internet) ; Data Encryption ; Special Purpose and Application-Based Systems ; Computer Communication Networks
    Description / Table of Contents: Security of distributed interconnected systems --- Security of software systems --- Security of the Internet of Things
    Pages: Online-Ressource (XII, 159 pages) , 33 illustrations
    ISBN: 9783319951898
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Unknown
    Beijing : O'Reilly
    Keywords: PHPUnit ; API ; PHP
    Pages: Online-Ressource (84 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897215152
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Keywords: GNU ; GNU Emacs ; Make ; Utilities
    Pages: Online-Ressource (280 Seiten)
    Edition: 3rd ed., completely rev. & updated
    ISBN: 0596006101
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Unknown
    Beijing : O'Reilly
    Keywords: Open Source ; Urheberrecht ; Copyright
    Pages: Online-Ressource (193 Seiten)
    Edition: 1st ed.
    ISBN: 0596005814
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Keywords: Bioinformatics ; Biology ; Data processing ; Biotechnology ; Computer software ; Data structures (Computer science) ; Genetic engineering
    ISBN: 9782287339097
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Unknown
    Amsterdam ; London : Elsevier
    Keywords: DDC 518.26 ; LC QA297.8 ; Iterative methods (Mathematics)
    Pages: Online-Ressource (xv, 487 pages)
    ISBN: 9780444531629
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 577.01/5118 ; LC TD170.2 ; Ecology - Mathematical models ; Environmental protection - Mathematical models ; Pollution - Mathematical models
    Pages: Online-Ressource (xviii, 373 pages)
    Edition: 1st ed
    ISBN: 9780444522092
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Unknown
    Rijeka : InTech
    Keywords: computer science ; web engineering ; semantics ; semantic web
    Description / Table of Contents: Chapter 1: UnBBayes: Modeling Uncertainty for Plausible Reasoning in the Semantic Web by Rommel Carvalho, Kathryn Laskey, Paulo Costa, Marcelo Ladeira, Laecio Santos and Shou Matsumoto --- Chapter 2: Alternative Bootstrapping Design for the PORTAL-DOORS Cyberinfrastructure with Self-Referencing and Self-Describing Features by Carl Taswell --- Chapter 3: Providing Semantic Content for the Next Generation Web by Irina Efimenko, Serge Minor, Anatoli Starostin, Grigory Drobyazko and Vladimir Khoroshevsky --- Chapter 4: Sustainable Advantage for the Investor Relations Team through Semantic Content by Daniel Hladky --- Chapter 5: Semantic Infrastructures by Jiri Dokulil, Jakub Yaghob and Filip Zavoral --- Chapter 6: Prime Number Labeling Scheme for Transitive Closure Computation by Gang Wu and Juanzi Li --- Chapter 7: Towards an Automatic Semantic Data Integration: Multi-agent Framework Approach by Miklos Nagy and Maria Vargas-Vera --- Chapter 8: Using Semantic Technology to Enable Behavioural Coordination of Heterogeneous Systems by Artem Katasonov and Vagan Terziyan --- Chapter 9: Leveraging Semantic Web Computing for Context-Aware Software Engineering Environments by Roy Oberhauser --- Chapter 10: Reasoning and Representing Viewpoints on the Semantic Web by Christiana Panayiotou --- Chapter 11: Semantic Web Technologies for Managing EHR-related Clinical Knowledge by Catalina Martinez-Costa, Marcos Menarguez-Tortosa, Jose Alberto Maldonado and Jesualdo Tomas Fernandez-Breis --- Chapter 12: Use Case Semantics for Business Process Validation by Michael Wolters and German Nemirovskij --- Chapter 13: Semantic-based eService Delivery for eGovernment Domain by Luis Alvarez Sabucedo, Luis Anido Rifon, Flavio Corradini, Alberto Polzonetti and Barbara Re --- Chapter 14: Context-aware Service Composition and Change-over Using BPEL Engine and Semantic Web by Yoji Yamato, Yuusuke Nakano and Hiroshi Sunaga --- Chapter 15: Metaphor and the Semantic Web by Jonathan Biguenet, Bogdan D. Czejdo and John Biguenet --- Chapter 16: Code Clone Detection Using String Based Tree Matching Technique by Ali Selamat and Norfaradilla Wahid
    Pages: Online-Ressource (310 Seiten)
    ISBN: 9789537619541
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Keywords: computer and information science ; artificial intelligence
    Pages: Online-Ressource (254 Seiten)
    ISBN: 9789535109211
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Pages: Online-Ressource (3-827)
    ISBN: 9780444898579
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Unknown
    Amsterdam : Elsevier
    Pages: Online-Ressource (829-1660)
    ISBN: 9780444512536
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Hilbertian Kernels
    Pages: Online-Ressource (xii, 386 pages)
    Edition: 1st ed
    ISBN: 9780444897183
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Extrapolation (Mathematics)
    Pages: Online-Ressource (vi, 464 pages)
    Edition: 1st ed
    ISBN: 9780444888143
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Keywords: (GIS) ; Abfrageoptimierung ; Constraint Databases ; Constraint Datenbanken ; Constraint Processing ; Constraint-Verarbeitung ; Geographic Information Systems ; Geoinformationssysteme ; Indexierungstechniken ; Indexing Techniques ; Query Optimization ; database ; optimization ; programming
    Description / Table of Contents: This book constitutes the refereed proceedings of the ESPRIT Working Group CONTESSA Workshop on Constraint Databases and Applications, held in Friedrichshafen, Germany in September 1995. The 10 full revised papers selected for inclusion in this volume are written by and for practitioners, researchers, and application users of core constraint database technology; they can be classified in three sections on expressiveness of the various constraint database models; implementation and optimization issues in areas like spatial databases, geographic information systems, scheduling and routing. This book is the first to focus on the extension of the important new programming paradigm of constraint processing to database design and management.
    Pages: Online-Ressource (VIII, 192 pages)
    ISBN: 9783540494560
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...