ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (130)
  • Computer Science
Collection
Language
Years
  • 1
    facet.materialart.
    Unknown
    Pluto Books
    Publication Date: 2024-04-14
    Description: @ is For Activism examines the transformation of politics through digital media, including digital television, online social networking and mobile computing. Joss Hands maps out how political relationships have been reconfigured and new modes of cooperation, deliberation and representation have emerged. This analysis is applied to the organisation and practice of alternative politics, showing how they have developed and embraced the new political and technological environment. Hands offers a comprehensive critical survey of existing literature, as well as an original perspective on networks and political change. He includes many case studies including the anti-war and global justice movements, peer production, user created TV and 'Twitter' activism. @ is For Activism is essential for activists and students of politics and media.
    Keywords: Computer Science ; Political Science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPW Political activism / Political engagement
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    facet.materialart.
    Unknown
    Springer Nature | Springer Nature Switzerland
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 29th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2023, which was held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023, during April 22-27, 2023, in Paris, France. The 56 full papers and 6 short tool demonstration papers presented in this volume were carefully reviewed and selected from 169 submissions. The proceedings also contain 1 invited talk in full paper length, 13 tool papers of the affiliated competition SV-Comp and 1 paper consisting of the competition report. TACAS is a forum for researchers, developers, and users interested in rigorously based tools and algorithms for the construction and analysis of systems. The conference aims to bridge the gaps between different communities with this common interest and to support them in their quest to improve the utility, reliability, flexibility, and efficiency of tools and algorithms for building computer-controlled systems.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2024-04-11
    Description: This open access book is compilation of selected papers from 2nd International Conference on Innovative Solutions in Hydropower Engineering and Civil Engineering (HECE 2022). The work focuses on novel techniques for topics in hydropower and sustainable development, maximizing and communicating the multiple benefits of hydro, the food-water-energy nexus approach, synergy among the renewables, making hydro more competitive (managing and mitigating risk), regional development through power trading, hydropower technology, civil engineering, materials for dams and appurtenant works, advances in design and construction techniques, recent developments in dam construction, monitoring and engineering for safe structures and sites. Hydropower offers significant potential for carbon emissions reductions. The installed capacity of hydropower by the end of 2008 contributed 16% of worldwide electricity supply, and hydropower remains the largest source of renewable energy in the electricity sector. The contents make valuable contributions to academic researchers, engineers in the industry, and regulators of hydropower and civil engineering authorities.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THV Alternative and renewable energy sources and technology ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    facet.materialart.
    Unknown
    University of Minnesota Press
    Publication Date: 2024-04-14
    Description: A complete history and theory of internet daemons brings these little-known-but very consequential-programs into the spotlight We're used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net's infrastructure-as well as the devices we use to access it-daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives-including their role in hot-button issues like network neutrality. Going back to Victorian times and the popular thought experiment Maxwell's Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast's efforts to control peer-to-peer networking, and Pirate Bay's attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users. Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight.
    Keywords: Computer Science ; Science & Technology Studies ; History of Science & Technology ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    facet.materialart.
    Unknown
    Springer Nature | Springer Nature Switzerland
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 32nd European Symposium on Programming, ESOP 2023, which was held during April 22-27, 2023, in Paris, France, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023. The 20 regular papers presented in this volume were carefully reviewed and selected from 55 submissions. They deal with fundamental issues in the specification, design, analysis, and implementation of programming languages and systems.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMX Programming and scripting languages: general
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    facet.materialart.
    Unknown
    TU Delft OPEN Publishing
    Publication Date: 2024-04-14
    Description: This project started within the Junior Council (JC) of the TPM AI Lab. The TPM AI Lab was established in 2021 at the Faculty of Technology, Policy and Management (TPM) of TU Delft to consolidate research on AI within and outside TU Delft. At the TPM AI Lab, we believe the noise around AI can be overwhelming. It is for us, and we believe it is for others too. Recent developments in cutting-edge technology have fueled a new wave of interest in AI research and application, spanning multiple sectors and disciplines. Countless AI techniques, approaches, and tools are being employed or developed for various purposes. Everybody wants to see what AI has to offer. It is difficult to keep track of everything happening in the AI world. At the same time, the enthusiasm for AI is met with scepticism and scrutiny by critical scholars and experts.
    Keywords: Artificial Intelligence ; Digitalisation ; Computer Science ; Ethics of Technology ; Societal Impact ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    facet.materialart.
    Unknown
    Springer Nature | Springer Nature Switzerland
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 29th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2023, which was held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023, during April 22-27, 2023, in Paris, France. The 56 full papers and 6 short tool demonstration papers presented in this volume were carefully reviewed and selected from 169 submissions. The proceedings also contain 1 invited talk in full paper length, 13 tool papers of the affiliated competition SV-Comp and 1 paper consisting of the competition report. TACAS is a forum for researchers, developers, and users interested in rigorously based tools and algorithms for the construction and analysis of systems. The conference aims to bridge the gaps between different communities with this common interest and to support them in their quest to improve the utility, reliability, flexibility, and efficiency of tools and algorithms for building computer-controlled systems.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    facet.materialart.
    Unknown
    Springer Nature | Springer Nature Switzerland
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 26th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2023, which was held during April 22-27, 2023, in Paris, France, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023. The 26 regular papers presented in this volume were carefully reviewed and selected from 85 submissions. They deal with research on theories and methods to support the analysis, integration, synthesis, transformation, and verification of programs and software systems.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    facet.materialart.
    Unknown
    Springer Nature | Springer Nature Switzerland
    Publication Date: 2024-04-14
    Description: This open access book constitutes the proceedings of the 26th International Conference on Fundamental Approaches to Software Engineering, FASE 2023, which was held during April 22-27, 2023, in Paris, France, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023. The 12 regular papers presented in this volume were carefully reviewed and selected from 50 submissions. The proceedings also contain 2 tool papers, 2 NIER papers, and 2 competition papers from the Test-Comp Competition. The papers deal with the foundations on which software engineering is built, including topics like software engineering as an engineering discipline, requirements engineering, software architectures, software quality, model-driven development, software processes, software evolution, AI-based software engineering, and the specification, design, and implementation of particular classes of systems, such as (self-)adaptive, collaborative, AI, embedded, distributed, mobile, pervasive, cyber-physical, or service-oriented applications. .
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    facet.materialart.
    Unknown
    Pluto Books
    Publication Date: 2024-04-04
    Description: In recent years, popular media have inundated audiences with sensationalised headlines recounting data breaches, new forms of surveillance and other dangers of our digital age. Despite their regularity, such accounts treat each case as unprecedented and unique. This book proposes a radical rethinking of the history, present and future of our relations with the digital, spatial technologies that increasingly mediate our everyday lives. From smartphones to surveillance cameras, to navigational satellites, these new technologies offer visions of integrated, smooth and efficient societies, even as they directly conflict with the ways users experience them. Recognising the potential for both control and liberation, the authors argue against both acquiescence to and rejection of these technologies. Through intentional use of the very systems that monitor them, activists from Charlottesville to Hong Kong are subverting, resisting and repurposing geographic technologies. Using examples as varied as writings on the first telephones to the experiences of a feminist collective for migrant women in Spain, the authors present a revolution of everyday technologies. In the face of the seemingly inevitable dominance of corporate interests, these technologies allow us to create new spaces of affinity, and a new politics of change.
    Keywords: Science & Technology Studies ; Computer Science ; Population Studies ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDR Impact of science and technology on society ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMB Algorithms and data structures ; thema EDItEUR::U Computing and Information Technology::UR Computer security ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects ; thema EDItEUR::R Earth Sciences, Geography, Environment, Planning::RG Geography::RGC Human geography
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-05
    Description: This open access book is based on the conference organised by Accademia dei Lincei and the US National Academy of Sciences and supported by the Italian Ministero degli Affari Esteri. It was attended by about 60 scientists and researchers from 13 countries, including, besides Europe, Iran, Israel, Iraq, Pakistan, India, Japan, Russian Federation and the USA. In an international scenario shaken by the uncertainties of the pandemic and the war between Russia and Ukraine, dialogue and scientific collaboration are confirmed to be precious tools to enhance nuclear safety, security and non-proliferation. The urgency to open peace discussions in Ukraine was emphasised by all participants, and the belief that science can make an essential contribution to peace construction was reaffirmed. Current challenges (some new, such as autonomous weapons and the use of artificial intelligence for war purposes) are discussed and attempts made to identify possible solutions and future improvements, including in the field of sustainable energy development.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::P Mathematics and Science::PH Physics::PHV Applied physics ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THK Nuclear power and engineering ; thema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relations
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-14
    Description: This is an open access book. Statistical machine learning (ML) has triggered a renaissance of artificial intelligence (AI). While the most successful ML models, including Deep Neural Networks (DNN), have developed better predictivity, they have become increasingly complex, at the expense of human interpretability (correlation vs. causality). The field of explainable AI (xAI) has emerged with the goal of creating tools and models that are both predictive and interpretable and understandable for humans. Explainable AI is receiving huge interest in the machine learning and AI research communities, across academia, industry, and government, and there is now an excellent opportunity to push towards successful explainable AI applications. This volume will help the research community to accelerate this process, to promote a more systematic use of explainable AI to improve models in diverse applications, and ultimately to better understand how current explainable AI methods need to be improved and what kind of theory of explainable AI is needed. After overviews of current methods and challenges, the editors include chapters that describe new developments in explainable AI. The contributions are from leading researchers in the field, drawn from both academia and industry, and many of the chapters take a clear interdisciplinary approach to problem-solving. The concepts discussed include explainability, causability, and AI interfaces with humans, and the applications include image processing, natural language, law, fairness, and climate science.
    Keywords: Computer Science ; Informatics ; Conference Proceedings ; Research ; Applications ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence::UYQM Machine learning
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2024-04-14
    Description: In September 2020, researchers from Armenia, Chile, Germany and Japan met at the American University of Armenia for a virtual conference to discuss technologies with applications in smart cities, data science and information theory approaches for intelligent systems, technical challenges for intelligent environments, smart human centered computing, artificial neural networks, and deep learning. This book presents their contributions to the 2nd CODASSCA workshop on collaborative technologies and data science in artificial intelligence applications, a highly topical issue in today's computer science.
    Keywords: Computers ; Computer Science ; Technology & Engineering ; Telecommunications ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJK Communications engineering / telecommunications
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-11
    Description: "Somewhere, there is always wind blowing or the sun shining." This maxim could lead the global shift from fossil to renewable energy sources, suggesting that there is enough energy available to be turned into electricity. But the already impressive numbers that are available today, along with the European Union's 20-20-20 goal – to power 20% of the EU energy consumption from renewables until 2020 –, might mislead us over the problem that the go-to renewables readily available rely on a primary energy source mankind cannot control: the weather. At the same time, the notion of the smart grid introduces a vast array of new data coming from sensors in the power grid, at wind farms, power plants, transformers, and consumers. The new wealth of information might seem overwhelming, but can help to manage the different actors in the power grid. This book proposes to view the problem of power generation and distribution in the face of increased volatility as a problem of information distribution and processing. It enhances the power grid by turning its nodes into agents that forecast their local power balance from historical data, using artificial neural networks and the multi-part evolutionary training algorithm described in this book. They pro-actively communicate power demand and supply, adhering to a set of behavioral rules this book defines, and finally solve the 0-1 knapsack problem of choosing offers in such a way that not only solves the disequilibrium, but also minimizes line loss, by elegant modeling in the Boolean domain. The book shows that the Divide-et-Impera approach of a distributed grid control can lead to an efficient, reliable integration of volatile renewable energy sources into the power grid.
    Keywords: Technology & Engineering ; Construction ; Computers ; Computer Science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TN Civil engineering, surveying and building::TNK Building construction and materials ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-14
    Description: The Simplex algorithm is one of the most important algorithms in discrete optimization, and is the most used algorithm for solving linear programs in practice. In the last 50 years, several pivot rules for this algorithm have been proposed and studied. For most deterministic pivot rules, exponential lower bounds were found, while a probabilistic pivot rule exists that guarantees termination in expected subexponential time. One deterministic pivot rule that is of special interest is Zadeh's pivot rule since it was the most promising candidate for a polynomial pivot rule for a long time. In 2011, Friedmann proved that this is not true by providing an example forcing the Simplex algorithm to perform at least a subexponential number of iterations in the worst case when using Zadeh's pivot rule. Still, it was not known whether Zadeh's pivot rule might achieve subexponential worst case running time. Next to analyzing Friedmann's construction in detail, we develop the first exponential lower bound for Zadeh's pivot rule. This closes a long-standing open problem by ruling out this pivot rule as a candidate for a deterministic, subexponential pivot rule in several areas of linear optimization and game theory.
    Keywords: Computers ; Computer Science ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-14
    Description: The volume of scientific literature is increasing and researchers have difficulties in estimating their quality and relevance. Library portals, therefore, are getting more relevant by using quality indicators to help researchers during their research process. With the growing presence of social media, altmetrics have been proposed as complementary indicators to traditional measures. Altmetrics can help to identify online attention and can appear much faster than citations. This study explores altmetrics for filtering relevant articles (in library portals) within the discipline of Economic and Business Studies literature. Firstly, it highlights the altmetrics presence from Mendeley and Altmetric.com for the journals in the above-mentioned disciplines. It presents correlations between citation and altmetrics on article and journal level, suggesting Mendeley counts as an alternative indicator to citations. Afterward, it investigates the use of altmetrics data for potential users with interests in new trends, social media platforms, and journal rankings. Lastly, it explores the behavior of economic researchers using a survey by discovering the usefulness of different altmetrics. With the findings of this study, several forms of altmetrics in library portals are discussed, using EconBiz as the proof-of-concept, to assist both researchers and libraries to identify relevant journals or articles and to cope with the information overload.
    Keywords: Computers ; Computer Science ; thema EDItEUR::U Computing and Information Technology::UY Computer science
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-04
    Description: In August 2022, researchers and developers from Armenia, Chile, Germany, and Japan met at the American University of Armenia for the third edition of the CODASSCA Workshop on Collaborative Technologies and Data Science in Smart City Applications, co-organized with a Summer School on Artificial Neural Networks and Deep Learning. This book presents their contributions on intelligent technologies in data science and human-centered computing.
    Keywords: Mathematics ; Computers ; Computer Science ; Technology & Engineering ; thema EDItEUR::P Mathematics and Science::PB Mathematics ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    facet.materialart.
    Unknown
    De Gruyter | Birkhäuser
    Publication Date: 2024-03-23
    Description: How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books.
    Keywords: Architecture ; Code ; Computer Science ; thema EDItEUR::A The Arts::AM Architecture::AMA Theory of architecture
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-04
    Description: Digitalisation, digital networks, and artificial intelligence are fundamentally changing our lives! We must understand the various developments and assess how they interact and how they affect our regular, analogue lives. What are the consequences of such changes for me personally and for our society? Digital networks and artificial intelligence are seminal innovations that are going to permeate all areas of society and trigger a comprehensive, disruptive structural change that will evoke numerous new advances in research and development in the coming years. Even though there are numerous books on this subject matter, most of them cover only specific aspects of the profound and multifaceted effects of the digital transformation. An overarching assessment is missing. In 2016, the Federation of German Scientists (VDW) has founded a study group to assess the technological impacts of digitalisation holistically. Now we present this compendium to you. We address the interrelations and feedbacks of digital innovation on policy, law, economics, science, and society from various scientific perspectives. Please consider this book as an invitation to contemplate with other people and with us, what kind of world we want to live in!
    Keywords: Science ; Computers ; Computer Science ; Philosophy ; thema EDItEUR::P Mathematics and Science::PD Science: general issues ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::Q Philosophy and Religion::QD Philosophy
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-04
    Description: Digitalisierung, Vernetzung und Künstliche Intelligenz verändern unser Leben in grundlegender Weise! Wir müssen die verschiedenen Entwicklungen verstehen und analysieren, wie sie sich gegenseitig verstärken und auf unser "normales", analoges Leben wirken. Welche Konsequenzen haben die Veränderungen für mich und für die Gesellschaft, in der ich lebe? Digitale Vernetzung und Künstliche Intelligenz sind epochale Basisinnovationen, die schubartig alle Bereiche der Gesellschaft durchdringen und Motor eines umfassenden, disruptiv verlaufenden Strukturwandels sind, der in den nächsten Jahren zahlreiche neue Innovationen hervorbringen wird. Trotz zahlreicher Bücher zum Thema werden die tiefgehenden und vielseitigen Wirkungen der Digitalisierung meistens nur ausschnittsweise, also für einzelne Bereiche betrachtet. Was fehlt, ist ein Gesamtbild. Die Vereinigung Deutscher Wissenschaftler (VDW) beschäftigt sich deshalb seit 2016 eingehend mit Technikfolgen der Digitalisierung und hat hierzu eine Studiengruppe eingesetzt, die das vorliegende Kompendium vorlegt. Darin betrachten wir aus verschiedenen Wissenschaftsperspektiven Zusammenhänge und Rückwirkungen digitaler Innovation in unterschiedlichen gesellschaftlichen Bereichen. Sehen Sie das Buch als eine Einladung, mit anderen Menschen und mit uns darüber nachzudenken, wie wir leben wollen!
    Keywords: Science ; Computers ; Computer Science ; Philosophy ; thema EDItEUR::P Mathematics and Science::PD Science: general issues ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::Q Philosophy and Religion::QD Philosophy
    Language: German
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-14
    Description: The exchange of orbit information is becoming more important in view of the increasing population of objects in space as well as the increase in parties involved in space operations. The aim of this thesis was to investigate how orbit information maintained by a space surveillance system can be provided to its users. Services like collision avoidance require very accurate information, while other services might be less stringent. An approach was studied, which allows to derive orbit and covariance information of predetermined accuracy from a reference orbit. Using Chebyshev polynomials, continuous state vector and covariance matrix information can be provided. The major advantage is that no inter- or extrapolation on the user's side is required. A method to reduce the data amount by interpolating the variance envelope functions was also studied. The proposed method in this thesis gives access to highly accurate information from the catalogue, where this information is required. On the other hand it can also provide less accurate information, where requirements are less restrictive, thereby allowing for a significantly reduced amount of data to be transferred and stored.
    Keywords: Computers ; Computer Science ; Technology & Engineering ; Science ; Physics ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues ; thema EDItEUR::P Mathematics and Science::PH Physics
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-14
    Description: This is an open access book that covers the complete set of experiences and results of the FemTech.dk research which we have had conducted between 2016-2021 – from initiate idea to societal communication. Diversity in Computer Science: Design Artefacts for Equity and Inclusion presents and documents the principles, results, and learnings behind the research initiative FemTech.dk, which was created in 2016 and continues today as an important part of the Department of Computer Science at the University of Copenhagen’s strategic development for years to come. FemTech.dk was created in 2016 to engage with research within gender and diversity and to explore the role of gender equity as part of digital technology design and development. FemTech.dk considers how and why computer science as a field and profession in Denmark has such a distinct unbalanced gender representation in the 21st century. This book is also the story of how we (the authors) as computer science researchers embarked on a journey to engage with a new research field – equity and gender in computing – about which we had only sporadic knowledge when we began. We refer here to equity and gender in computing as a research field – but in reality, this research field is a multiplicity of entangled paths, concepts, and directions that forms important and critical insights about society, gender, politics, and infrastructures which are published in different venues and often have very different sets of criteria, values, and assumptions. Thus, part of our journey is also to learn and engage with all these different streams of research, concepts, and theoretical approaches and, through these engagements, to identify and develop our own theoretical platform, which has a foundation in our research backgrounds in Human–Computer Interaction broadly – and Interaction Design & Computer Supported Cooperative Work specifically.
    Keywords: Gender Equity ; Computer Science ; Femtech ; Interactive Dsign ; Inclusion ; Research Through Design ; Makerspace ; Interventionist Interaction Design ; Action Research Confession ; IoT ; Tangle Computing ; Human Centered Computing ; computing ; makerspace methodologies ; tangible interfaces ; history of computing ; Computer supported cooperative work ; human computer interaction ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBJ Digital and information technologies: social and ethical aspects ; thema EDItEUR::J Society and Social Sciences::JB Society and culture: general::JBS Social groups, communities and identities::JBSF Gender studies, gender groups
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    facet.materialart.
    Unknown
    Logos Verlag Berlin | Logos Verlag Berlin
    Publication Date: 2024-04-14
    Description: Orbital debris is becoming an increasing problem for space flight missions. New satellite launches, explosions, collisions and other events cause a steady rise in the number of objects orbiting the Earth. It is therefore important to determine the future development of the object population, as well as the effectiveness of debris mitigation measures, in long-term simulations. Orbital propagation, the calculation of an object's movement in its orbit, poses a challenge for this research due to the high computation times of the complex perturbation models involved. With populations consisting of hundreds of thousands of objects as well as simulation time frames of up to 200 years, these calculations can take up hours of computation time. To speed up this process, the analytical propagator Ikebana is introduced in this work of applied computer science in engineering. The program runs on graphics processing units, hardware designed for massively parallel execution of up to thousands of concurrent threads. This reduces the overall run time for large object populations from hours to minutes. Porting software from a conventional CPU is not a trivial task and involves a number of potential pitfalls and optimization opportunities which are detailed in this work. The propagator is integrated into other applications via a generic, multi-platform interface specifically designed for this task. It allows to develop the propagator separately and integrate it into other tools as a plugin at run time. The interface's architecture serves as a design template for analytical propagation software.
    Keywords: Computers ; Computer Science ; Technology & Engineering ; Science ; Physics ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues ; thema EDItEUR::P Mathematics and Science::PH Physics
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    facet.materialart.
    Unknown
    Taylor & Francis | Routledge
    Publication Date: 2024-04-14
    Description: This book introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together. The modeling techniques are then applied to a range of datasets to show how they can produce results that are useful in understanding real-world social networks.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBW Internet: general works
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    facet.materialart.
    Unknown
    Springer Nature | Springer Vieweg
    Publication Date: 2024-04-11
    Description: This Open Access proceedings present a good overview of the current research landscape of industrial robots. The objective of MHI Colloquium is a successful networking at academic and management level. Thereby the colloquium is focussing on a high level academic exchange to distribute the obtained research results, determine synergetic effects and trends, connect the actors personally and in conclusion strengthen the research field as well as the MHI community. Additionally there is the possibility to become acquainted with the organizing institute. Primary audience are members of the scientific association for assembly, handling and industrial robots (WG MHI).
    Keywords: Robotics and Automation ; Manufacturing, Machines, Tools, Processes ; Engineering Design ; Simulation and Modeling ; Machinery and Machine Elements ; Control, Robotics, Automation ; Machines, Tools, Processes ; Computer Science ; Open Access ; Assembly Processes & Systems ; Handling & Grasping ; Modelling & Simulation ; Human-robot-collaboration ; Industrial Robotics ; Robotics ; Production engineering ; Technical design ; Computer modelling & simulation ; Engines & power transmission ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering::TJFM1 Robotics ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TG Mechanical engineering and materials::TGP Production and industrial engineering ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBD Technical design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TG Mechanical engineering and materials::TGB Mechanical engineering::TGBN Engines and power transmission
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2021-02-10
    Description: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Keywords: Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence ; Simulation and Modeling ; Computer Engineering and Networks ; Database Management System ; Computer Science ; Anomaly detection ; Anti-fragility ; Cloud computing ; Complex adaptive systems ; DevOps (Development and Operation) ; Diversity ; Loose coupling ; Malware ; Malware detection ; Microservices ; Modules ; Monitoring ; Redundancy ; Risk analysis ; Software architecture ; Software design ; System dependencies ; Tight coupling ; Trust ; Weak links ; Computer networking & communications ; Computer modelling & simulation ; bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYM Computer modelling & simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access book summarizes the research done and results obtained in the second funding phase of the Priority Program 1648 "Software for Exascale Computing" (SPPEXA) of the German Research Foundation (DFG) presented at the SPPEXA Symposium in Dresden during October 21-23, 2019. In that respect, it both represents a continuation of Vol. 113 in Springer’s series Lecture Notes in Computational Science and Engineering, the corresponding report of SPPEXA’s first funding phase, and provides an overview of SPPEXA’s contributions towards exascale computing in today's sumpercomputer technology. The individual chapters address one or more of the research directions (1) computational algorithms, (2) system software, (3) application software, (4) data management and exploration, (5) programming, and (6) software tools. The book has an interdisciplinary appeal: scholars from computational sub-fields in computer science, mathematics, physics, or engineering will find it of particular interest.
    Keywords: Simulation and Modeling ; Performance and Reliability ; Computational Science and Engineering ; Input/Output and Data Communications ; Mathematical and Computational Engineering ; Numerical and Computational Physics, Simulation ; Computer Science ; Computer Hardware ; Mathematical and Computational Engineering Applications ; Theoretical, Mathematical and Computational Physics ; open access ; computational algorithms and numerical methods ; data management and exploration ; high-performance computing ; simulation software and applications ; system software and software tools ; Computer modelling & simulation ; Systems analysis & design ; Maintenance & repairs ; Maths for scientists ; Computer networking & communications ; Distributed databases ; Maths for engineers ; Mathematical physics ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDE Maths for scientists ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBJ Maths for engineers ; thema EDItEUR::P Mathematics and Science::PH Physics::PHU Mathematical physics
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    facet.materialart.
    Unknown
    Taylor & Francis
    Publication Date: 2024-04-14
    Description: Drawing on the authors’ more than six years of R&D in location-based information systems as well as their participation in defining the Java ME Location API 2.0, this text describes the technical components needed to create location-based services with an emphasis on nonproprietary, freely available solutions that work across different technologies and platforms. Each chapter presents a general real-time tracking system example that can be easily adapted to target any application domain and that can incorporate other sensor data to make the system "participatory sensing" or "human-centric sensing." A companion website offers many supporting materials.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This book contains the joint proceedings of the Winter School of Hakodate (WSH) 2011 held in Hakodate, Japan, March 15–16, 2011, and the 6th International Workshop on Natural Computing (6th IWNC) held in Tokyo, Japan, March 28–30, 2012, organized by the Special Interest Group of Natural Computing (SIG-NAC), the Japanese Society for Artificial Intelligence (JSAI). This volume compiles refereed contributions to various aspects of natural computing, ranging from computing with slime mold, artificial chemistry, eco-physics, and synthetic biology, to computational aesthetics.
    Keywords: Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities ; Computer Science ; Computational and Systems Biology ; Database Management System ; Computer and Information Systems Applications ; Computational Aesthetics ; Computing with Natural media ; Harness the Nature for Computation ; Synthetic Biology ; Computer modelling & simulation ; Life sciences: general issues ; Information technology: general issues ; Computer science ; Computer applications in the arts & humanities ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::P Mathematics and Science::PS Biology, life sciences::PSA Life sciences: general issues ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::N History and Archaeology::NH History
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    facet.materialart.
    Unknown
    Springer Nature | Apress
    Publication Date: 2024-04-14
    Description: Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business
    Keywords: Security ; Computer Science ; Rational cybersecurity ; Cybersecurity ; Risk management ; Cybersecurity strategy ; DevSecOps ; Security governance ; Security culture ; Cyber-resilience ; Cybersecurity maturity model ; Cybersecurity RACIs ; Shared responsibility ; Security championship ; Modern identity ; Agile security ; Open Access ; Computer security ; thema EDItEUR::U Computing and Information Technology::UR Computer security
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    facet.materialart.
    Unknown
    Springer Nature | Palgrave Macmillan
    Publication Date: 2021-02-10
    Description: This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.
    Keywords: Innovation/Technology Management ; Big Data/Analytics ; Security ; e-Commerce/e-business ; Business and Management ; IT in Business ; Computer Science ; e-Commerce and e-Business ; GDPR ; Data regulation ; accountability ; ethics in computing ; HIPAA ; it ; information management ; internet ; open access ; Research & development management ; Industrial applications of scientific research & technological innovation ; Business mathematics & systems ; Computer security ; Business applications ; E-commerce: business aspects ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJM Management & management techniques::KJMV Management of specific areas::KJMV6 Research & development management ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJQ Business mathematics & systems ; bic Book Industry Communication::U Computing & information technology::UR Computer security ; bic Book Industry Communication::U Computing & information technology::UF Business applications
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book is the first to combine coverage of fuzzy logic and Semantic Web languages. It provides in-depth insight into fuzzy Semantic Web languages for non-fuzzy set theory and fuzzy logic experts. It also helps researchers of non-Semantic Web languages get a better understanding of the theoretical fundamentals of Semantic Web languages. The first part of the book covers all the theoretical and logical aspects of classical (two-valued) Semantic Web languages. The second part explains how to generalize these languages to cope with fuzzy set theory and fuzzy logic.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.
    Keywords: Software Engineering ; Theory of Computation ; Artificial Intelligence ; Computer Systems Organization and Communication Networks ; Computer Hardware ; Simulation and Modeling ; Computer Engineering and Networks ; Computer Science ; architecture verification and validation ; artificial intelligence ; automata theory ; computer systems ; correlation analysis ; distributed computer systems ; embedded systems ; formal languages ; formal logic ; linguistics ; model checking ; programming languages ; semantics ; software architecture ; software design ; software quality ; verification and validation ; Open Access ; Computer science ; Mathematical theory of computation ; Artificial intelligence ; Computer networking & communications ; Computer hardware ; Computer modelling & simulation ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UK Computer hardware ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2024-03-30
    Description: This book summarizes results of longstanding research and scientific contributions from many projects and relevant working groups. It collects and evaluates wind and wave climate projections under changing climate having design needs and marine safety in focus. Potential impact of projected climate change in met-ocean conditions on ships and offshore structures is discussed and illustrated by an example of the expected wave climate change on tanker design.
    Keywords: GE1-350 ; TA1-2040 ; TK1-9971 ; TP248.13-248.65 ; TL1-4050 ; HG1-9999 ; QE1-996.5 ; RS1-441 ; TA401-492 ; Statistics for Engineering ; Computer Science ; Climate Change Management and Policy ; Chemistry and Earth Sciences ; Reliability ; Safety and Risk ; Physics ; Quality Control ; thema EDItEUR::K Economics, Finance, Business and Management::KC Economics::KCV Economics of specific sectors::KCVG Environmental economics
    Language: English
    Format: application/octet-stream
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-04
    Description: The book serves both as a reference for various scaled models with corresponding dimensionless numbers, and as a resource for learning the art of scaling. A special feature of the book is the emphasis on how to create software for scaled models, based on existing software for unscaled models. Scaling (or non-dimensionalization) is a mathematical technique that greatly simplifies the setting of input parameters in numerical simulations. Moreover, scaling enhances the understanding of how different physical processes interact in a differential equation model. Compared to the existing literature, where the topic of scaling is frequently encountered, but very often in only a brief and shallow setting, the present book gives much more thorough explanations of how to reason about finding the right scales. This process is highly problem dependent, and therefore the book features a lot of worked examples, from very simple ODEs to systems of PDEs, especially from fluid mechanics. The text is easily accessible and example-driven. The first part on ODEs fits even a lower undergraduate level, while the most advanced multiphysics fluid mechanics examples target the graduate level. The scientific literature is full of scaled models, but in most of the cases, the scales are just stated without thorough mathematical reasoning. This book explains how the scales are found mathematically. This book will be a valuable read for anyone doing numerical simulations based on ordinary or partial differential equations.
    Keywords: Ordinary Differential Equations ; Partial Differential Equations ; Mathematical Modeling and Industrial Mathematics ; Computational Science and Engineering ; Simulation and Modeling ; Analysis ; Computer Science ; scaling ; non-dimensionalization ; dimensionless numbers ; fluid mechanics ; multiphysics models ; Differential calculus & equations ; Mathematical modelling ; Maths for engineers ; Maths for scientists ; Computer modelling & simulation ; thema EDItEUR::P Mathematics and Science::PB Mathematics::PBK Calculus and mathematical analysis::PBKJ Differential calculus and equations ; thema EDItEUR::P Mathematics and Science::PB Mathematics::PBW Applied mathematics::PBWH Mathematical modelling ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDE Maths for scientists ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    facet.materialart.
    Unknown
    Springer Nature | Springer Singapore
    Publication Date: 2024-04-11
    Description: This open access book is a compilation of selected papers from 2020 DigitalFUTURES—The 2nd International Conference on Computational Design and Robotic Fabrication (CDRF 2020). The book focuses on novel techniques for computational design and robotic fabrication. The contents make valuable contributions to academic researchers, designers, and engineers in the industry. As well, readers will encounter new ideas about understanding intelligence in architecture.
    Keywords: Robotics and Automation ; Computer-Aided Engineering (CAD, CAE) and Design ; Simulation and Modeling ; Robotics ; Control, Robotics, Automation ; Computer Science ; Post-humanist Intelligence ; Computational Design ; Robotic Fabrication ; Human-Machine Collaboration ; AI in Architecture ; Open Access ; Computer-aided design (CAD) ; Computer modelling & simulation ; Artificial intelligence ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering::TJFM1 Robotics ; thema EDItEUR::U Computing and Information Technology::UG Graphical and digital media applications::UGC Computer-aided design (CAD) ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/png
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2024-04-14
    Description: In this concise yet comprehensive Open Access textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. Concepts are introduced in a cross-disciplinary way. Leveraging hybrid (continuous/discrete) systems as a unifying framework and Acumen as a modeling environment, the book bridges the conceptual gap in modeling skills needed for physical systems on the one hand and computational systems on the other. In doing so, the book gives the reader the modeling and design skills they need to build smart, IT-enabled products. Starting with a look at various examples and characteristics of Cyber-Physical Systems, the book progresses to explain how the area brings together several previously distinct ones such as Embedded Systems, Control Theory, and Mechatronics. Featuring a simulation-based project that focuses on a robotics problem (how to design a robot that can play ping-pong) as a useful example of a CPS domain, Cyber-Physical Systems: A Model-Based Approach demonstrates the intimate coupling between cyber and physical components, and how designing robots reveals several non-trivial control problems, significant embedded and real-time computation requirements, and a need to consider issues of communication and preconceptions.
    Keywords: Computer Systems Organization and Communication Networks ; Cyber-physical systems, IoT ; Simulation and Modeling ; Control, Robotics, Mechatronics ; Computer Engineering and Networks ; Cyber-Physical Systems ; Computer Science ; Control, Robotics, Automation ; CPS ; Embedded System ; model-based engineering ; hybrid systems ; Acumen ; coordinate transformations ; modeling computational systems ; modeling physical systems ; control ; sensing and actuation ; game theory ; Open Access ; Computer networking & communications ; Electrical engineering ; Cybernetics & systems theory ; Computer modelling & simulation ; Automatic control engineering ; Electronic devices & materials ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Publication Date: 2023-12-21
    Description: In the spring of 2011, a diverse group of scientists gathered at Cornell University to discuss their research into the nature and origin of biological information. This symposium brought together experts in information theory, computer science, numerical simulation, thermodynamics, evolutionary theory, whole organism biology, developmental biology, molecular biology, genetics, physics, biophysics, mathematics, and linguistics. This volume presents new research by those invited to speak at the conference. The contributors to this volume use their wide-ranging expertise in the area of biological information to bring fresh insights into the many explanatory difficulties associated with biological information. These authors raise major challenges to the conventional scientific wisdom, which attempts to explain all biological information exclusively in terms of the standard mutation/selection paradigm. Several clear themes emerged from these research papers: 1) Information is indispensable to our understanding of what life is; 2) Biological information is more than the material structures that embody it; 3) Conventional chemical and evolutionary mechanisms seem insufficient to fully explain the labyrinth of information that is life. By exploring new perspectives on biological information, this volume seeks to expand, encourage, and enrich research into the nature and origin of biological information. Contents: Session One — Information Theory & Biology: Introductory Comments (Robert J Marks II): Biological Information — What is It? (Werner Gitt, Robert Compton and Jorge Fernandez) A General Theory of Information Cost Incurred by Successful Search (William A Dembski, Winston Ewert and Robert J Marks II) Pragmatic Information (John W Oller, Jr) Limits of Chaos and Progress in Evolutionary Dynamics (William F Basener) Tierra: The Character of Adaptation (Winston Ewert, William A Dembski and Robert J Marks II) Multiple Overlapping Genetic Codes Profoundly Reduce the Probability of Beneficial Mutation (George Montañez, Robert J Marks II, Jorge Fernandez and John C Sanford) Entropy, Evolution and Open Systems (Granville Sewell) Information and Thermodynamics in Living Systems (Andy C McIntosh) Session Two — Biological Information and Genetic Theory: Introductory Comments (John C Sanford): Not Junk After All: Non-Protein-Coding DNA Carries Extensive Biological Information (Jonathan Wells) Can Purifying Natural Selection Preserve Biological Information? (Paul Gibson, John R Baumgardner, Wesley H Brewer and John C Sanford) Selection Threshold Severely Constrains Capture of Beneficial Mutations (John C Sanford, John R Baumgardner and Wesley H Brewer) Using Numerical Simulation to Test the “Mutation-Count” Hypothesis (Wesley H Brewer, John R Baumgardner and John C Sanford) Can Synergistic Epistasis Halt Mutation Accumulation? Results from Numerical Simulation (John R Baumgardner, Wesley H Brewer and John C Sanford) Computational Evolution Experiments Reveal a Net Loss of Genetic Information Despite Selection (Chase W Nelson and John C Sanford) Information Loss: Potential for Accelerating Natural Genetic Attenuation of RNA Viruses (Wesley H Brewer, Franzine D Smith and John C Sanford) DNA.EXE: A Sequence Comparison between the Human Genome and Computer Code (Josiah Seaman) Biocybernetics and Biosemiosis (Donald Johnson) Session Three — Theoretical Molecular Biology: Introductory Comments (Michael J Behe): An Ode to the Code: Evidence for Fine-Tuning in the Standard Codon Table (Jed C Macosko and Amanda M Smelser) A New Model of Intracellular Communication Based on Coherent, High-Frequency Vibrations in Biomolecules (L Dent) Getting There First: An Evolutionary Rate Advantage for Adaptive Loss-of-Function Mutations (Michael J Behe) The Membrane Code: A Carrier of Essential Biological Information That is Not Specified by DNA and is Inherited Apart from It (Jonathan Wells) Explaining Metabolic Innovation: Neo-Darwinism Versus Design (Douglas D Axe and Ann K Gauger) Session Four — Biological Information and Self-Organizational Complexity Theory: Introductory Comments (Bruce L Gordon): Evolution Beyond Entailing Law: The Roles of Embodied Information and Self Organization (Stuart Kauffman) Towards a General Biology: Emergence of Life and Information from the Perspective of Complex Systems Dynamics (Bruce H Weber) Readership: Academics, researchers, postgraduates and advanced undergraduates in bioinformatics. Biologists, mathematicians/statisticians, physicists and computer scientists.
    Keywords: T1-995 ; Molecular Biology ; Mutation/Selection Paradigm ; Numerical Simulation ; Mathematics ; Biophysics ; Physics ; Thermodynamics ; Information Theory ; Evolutionary Theory ; Computer Science ; Linguistics ; Genetics ; Developmental Biology ; Biological Information ; Whole Organism Biology ; bic Book Industry Communication::T Technology, engineering, agriculture::TB Technology: general issues
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    facet.materialart.
    Unknown
    Taylor & Francis
    Publication Date: 2024-04-14
    Description: This timely introduction to spectral feature selection illustrates the potential of this powerful dimensionality reduction technique in high-dimensional data processing. It presents the theoretical foundations of spectral feature selection, its connections to other algorithms, and its use in handling both large-scale data sets and small sample problems. Readers learn how to use spectral feature selection to solve challenging problems in real-life applications and discover how general feature selection and extraction are connected to spectral feature selection. Source code for the algorithms is available online.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book discusses various aspects of agent-based modeling and simulation using FLAME (Flexible Large-scale Agent-Based Modeling Environment) which is a popular agent-based modeling environment that enables automatic parallelization of models. Along with a focus on the software engineering principles in building agent-based models, the book comprehensively discusses how models can be written for various domains including biology, economics and social networks. The book also includes examples to guide readers on how to write their own models.
    Keywords: Computer Science ; FLAME ; large scale complex system ; agent model ; agent-based model ; complex agent function ; simulation experiment ; complex simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios, numerous illustrations, practical examples, and learning aids.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2024-04-05
    Description: This open access book makes quantum computing more accessible than ever before. A fast-growing field at the intersection of physics and computer science, quantum computing promises to have revolutionary capabilities far surpassing “classical” computation. Getting a grip on the science behind the hype can be tough: at its heart lies quantum mechanics, whose enigmatic concepts can be imposing for the novice. This classroom-tested textbook uses simple language, minimal math, and plenty of examples to explain the three key principles behind quantum computers: superposition, quantum measurement, and entanglement. It then goes on to explain how this quantum world opens up a whole new paradigm of computing. The book bridges the gap between popular science articles and advanced textbooks by making key ideas accessible with just high school physics as a prerequisite. Each unit is broken down into sections labelled by difficulty level, allowing the course to be tailored to the student’s experience of math and abstract reasoning. Problem sets and simulation-based labs of various levels reinforce the concepts described in the text and give the reader hands-on experience running quantum programs. This book can thus be used at the high school level after the AP or IB exams, in an extracurricular club, or as an independent project resource to give students a taste of what quantum computing is really about. At the college level, it can be used as a supplementary text to enhance a variety of courses in science and computing, or as a self-study guide for students who want to get ahead. Additionally, readers in business, finance, or industry will find it a quick and useful primer on the science behind computing’s future.
    Keywords: Quantum Physics ; Quantum Computing ; Computer Science, general ; Science Education ; Quantum Information Technology, Spintronics ; Computer Science ; Spintronics ; Open Access ; Introduction to quantum computing ; quantum computing textbook ; quantum computing for high school students ; introduction to quantum cryptography ; quantum gates ; quantum algorithms ; quantum superposition ; what is a qubit? ; quantum key distribution ; Quantum physics (quantum mechanics & quantum field theory) ; Mathematical theory of computation ; Teaching of a specific subject ; Science: general issues ; thema EDItEUR::P Mathematics and Science::PH Physics::PHP Particle and high-energy physics ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::J Society and Social Sciences::JN Education::JNU Teaching of a specific subject
    Language: English
    Format: image/png
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Keywords: Computer science ; Data mining ; Artificial intelligence ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Document Preparation and Text Processing ; Artificial Intelligence (incl. Robotics) ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Reconstruction of Separable Particle Verbs in a Corpus of Spoken German --- Detecting Vocal Irony --- The Devil is in the Details: Parsing Unknown German Words --- Exploring Ensemble Dependency Parsing to Reduce Manual Annotation Workload --- Different German and English Co-reference Resolution Models for Multi-Domain Content Curation Scenarios --- Word and Sentence Segmentation in German: Overcoming Idiosyncrasies in the Use of Punctuation in Private Communication --- Fine-Grained POS Tagging of German Social Media and Web Texts --- Developing a Stemmer for German Based on a Comparative Analysis of Publicly Available Stemmers --- Negation Modeling for German Polarity Classification --- NECKAr: A Named Entity Classifier for Wikidata --- Investigating the Morphological Complexity of German Named Entities: The Case of the GermEval NER Challenge --- Detecting Named Entities and Relations in German Clinical Reports --- In-Memory Distributed Training of Linear-Chain Conditional Random Fields with an Application to Fine-Grained Named Entity Recognition --- What does this imply? Examining the Impact of Implicitness on the Perception of Hate Speech --- Automatic Classification of Abusive Language and Personal Attacks in Various Forms of Online Communication --- Token Level Code-Switching Detection Using Wikipedia as a Lexical Resource --- How Social Media Text Analysis Can Inform Disaster Management --- A Comparative Study of Uncertainty Based Active Learning Strategies for General Purpose Twitter Sentiment Analysis with Deep Neural Networks --- An Infrastructure for Empowering Internet Users to Handle Fake News and Other Online Media Phenomena --- Different Types of Automated and Semi-automated Semantic Storytelling: Curation Technologies for Different Sectors --- Twitter Geolocation Prediction Using Neural Networks --- Diachronic Variation of Temporal Expressions in Scientific Writing Through the Lens of Relative Entropy --- A Case Study on the Relevance of the Competence Assumption for Implicature Calculation in Dialogue Systems --- Supporting Sustainable Process Documentation --- Optimizing Visual Representations in Semantic Multi-Modal Models with Dimensionality Reduction, De-noising and Contextual Information --- Using Argumentative Structure to Grade Persuasive Essays
    Pages: Online-Ressource (XIII, 310 pages) , 54 illustrations
    ISBN: 9783319737065
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Keywords: Computer science ; Logic design ; Computer organization ; Operating systems (Computers) ; Computers ; Computer Science ; Computing Methodologies ; Computer Systems Organization and Communication Networks ; Operating Systems ; Logic Design ; Information Systems and Communication Service
    Description / Table of Contents: HHVSF: A Framework to Accelerate Drug-based High-throughput Virtual Screening on High-Performance Computers --- HBasechainDB --- A Scalable Blockchain Framework on Hadoop Ecosystem --- DETOUR: A Large-Scale Non-Blocking Optical Data Center Fabric --- Querying Large Scientific Data Sets with Adaptable IO System ADIOS --- On the Performance of Spark on HPC Systems: Towards a Complete Picture --- Experiences of Converging Big Data Analytics Frameworks with High Performance Computing Systems --- MACC : An OpenACC Transpiler for Automatic Multi-GPU Use --- Acceleration of Wind Simulation using Locally Mesh-Refined Lattice Boltzmann Method on GPU-Rich supercomputers --- Architecture of an FPGA-Based Heterogeneous System for Code-Search Problems --- TINS: A Task-Based Dynamic Helper Core Strategy for In Situ Analytics --- Machine Learning Predictions for Underestimation of Job Runtime on HPC System --- A Power Management Framework with Simple DSL for Automatic Power-Performance Optimization on Power-Constrained HPC Systems --- Scalable Data Management of the Uintah Simulation Framework for Next-Generation Engineering Problems with Radiation --- High performance LOBPCG method for solving multiple eigenvalues of Hubbard model: Efficiency of communication avoiding Neumann expansion preconditioner --- Application of a preconditioned Chebyshev basis communication-avoiding conjugate gradient method to a multiphase thermal-hydraulic CFD code --- Optimization of Hierarchical matrix computation on GPU
    Pages: Online-Ressource (X, 293 pages) , 121 illustrations
    ISBN: 9783319699530
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Keywords: Computer science ; Computer organization ; Software engineering ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Software Engineering ; Programming Languages, Compilers, Interpreters ; Computer Systems Organization and Communication Networks ; The Computing Profession ; Theory of Computation
    Description / Table of Contents: Model-Based Software Development --- A Formal Framework for Incremental Model Slicing --- Multiple Model Synchronization with Multiary Delta Lenses --- Controlling the Attack Surface of Object-Oriented Refactorings --- Efficient Analysis of Attack Trees: a Model-Driven Approach --- Distributed Program and System Analysis --- ROLA: A New Distributed Transaction Protocol and Its Formal Analysis --- A Process Network Model for Reactive Streaming Software with Deterministic Task Parallelism --- Distributed Graph Queries for Runtime Monitoring of Cyber-Physical Systems --- EventHandler-based Analysis Framework for Web Apps using Dynamically Collected States --- Software Design and Verification --- Hierarchical Specification and Verification of Architectural Design Patterns --- Supporting Verification-Driven Incremental Distributed Design of Components --- Summarizing Software API Usage Examples using Clustering Techniques --- Fast Computation of Arbitrary Control Dependencies --- Specification and Program Testing --- Iterative Generation of Diverse Models for Testing Specifications of SL Tools --- Optimising Spectrum Based Fault Localisation for Single Fault Programs using Specifications --- TCM: Test Case Mutation to Improve Crash Detection in Android --- CRETE: A Versatile Binary-Level Concolic Testing Framework --- Family-Based Software Development --- Abstract Family-based Model Checking using Modal Featured Transition Systems: Preservation of CTL* --- FPH: Efficient Non-Commutativity Analysis of Feature-Based Systems --- Taming Multi-Variability of Software Product Line Transformations
    Pages: Online-Ressource (XII, 357 pages) , 116 illustrations
    ISBN: 9783319893631
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Keywords: Computer science ; Computer system failures ; Software engineering ; Data structures (Computer science) ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Theorem Proving --- Unification with Abstraction and Theory Instantiation in Saturation-based Reasoning --- Efficient verification of imperative programs using auto2 --- Frame Inference for Inductive Entailment Proofs in Separation Logic --- Verified Model Checking of Timed Automata --- SAT and SMT I --- Chain Reduction for Binary and Zero-Suppressed Decision Diagrams --- CDCLSym: Introducing E_ective Symmetry Breaking in SAT Solving --- Automatic Generation of Precise and Useful Commutativity Conditions --- Bit-Vector Model Counting using Statistical Estimation --- Deductive Verification --- Hoare Logics for Time Bounds --- A Verified Implementation of the Bounded List Container --- Automating Deductive Verification for Weak-Memory Programs --- Software Verification and Optimisation --- Property Checking Array Programs Using Loop Shrinking --- Invariant Synthesis for Incomplete Verification Engines --- Accelerating Syntax-Guided Invariant Synthesis --- Daisy - Framework for Analysis and Optimization of Numerical Programs --- Model Checking --- Oink: an Implementation and Evaluation of Modern Parity Game Solvers --- More Scalable LTL Model Checking via Discovering Design-Space Dependencies (D^3) --- Generation of Minimum Tree-like Witnesses for Existential CTL --- From Natural Projection to Partial Model Checking and Back --- Machine Learning --- ICE-based Refinement Type Discovery for Higher-Order Functional Programs --- Strategy Representation by Decision Trees in Reactive Synthesis --- Feature-Guided Black-Box Safety Testing of Deep Neural Networks.
    Pages: Online-Ressource (XX, 429 pages) , 93 illustrations
    ISBN: 9783319899602
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Keywords: Computer science ; Computer hardware ; Computer organization ; Programming languages (Electronic computers) ; Computers ; Computer Science ; Programming Languages, Compilers, Interpreters ; Theory of Computation ; Computer Systems Organization and Communication Networks ; Computer Hardware ; Computing Methodologies ; Computing Milieux
    Description / Table of Contents: Language Design --- Consistent Subtyping for All --- HOBiT: Programming Lenses without using Lens Combinators --- Dualizing Generalized Algebraic Data Types by Matrix Transposition --- Deterministic Concurrency: A Clock-Synchronised Shared Memory Approach --- Probabilistic Programming --- An Assertion-Based Program Logic for Probabilistic Programs --- Fine-grained Semantics for Probabilistic Programs --- How long, O Bayesian network, will I sample thee? --- Relational Reasoning for Markov Chains in a Probabilistic Guarded Lambda Calculus --- Types and Effects --- Failure is Not an Option: An Exceptional Type Theory --- Let Arguments Go First --- Behavioural equivalence via modalities for algebraic effects --- Explicit Effect Subtyping --- Concurrency --- A separation logic for a promising semantics --- Logical Reasoning for Disjoint Permissions --- Deadlock-Free Monitors --- Fragment Abstraction for Concurrent Shape Analysis --- Security --- Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management --- Modular Product Programs --- Program Verification --- A Fistful of Dollars: Formalizing Asymptotic Complexity Claims via Deductive Program Verification --- Verified Learning Without Regret --- Program Verification by Coinduction --- Velisarios: Byzantine Fault Tolerant Protocols Powered by Coq --- Program Analysis and Automated Verification --- Evaluating Design Tradeoffs in Numeric Static Analysis for Java --- An Abstract Interpretation Framework for Input Data Usage --- Higher-Order Program Verification via HFL Model Checking --- Quantitative Analysis of Smart Contracts --- Session Types and Concurrency --- Session-Typed Concurrent Contracts --- A Typing Discipline for Statically Verified Crash Failure Handling in Distributed Systems --- On Polymorphic Sessions and Functions: A Tale of Two (Fully Abstract) Encodings --- Concurrent Kleene Algebra: Free Model and Completeness --- Concurrency and Distribution --- Correctness of a Concurrent Object Collector for Actor Languages --- Paxos Consensus, Deconstructed and Abstracted --- On Parallel Snapshot Isolation and Release/Acquire Consistency --- Eventual Consistency for CRDTs --- Compiler Verification --- A Verified Compiler from Isabelle/HOL to CakeML --- Compositional Verification of Compiler Optimisations on Relaxed Memory
    Pages: Online-Ressource (XVI, 1058 pages) , 276 illustrations
    ISBN: 9783319898841
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Keywords: Computer science ; Computer hardware ; Computer organization ; Software engineering ; Computer logic ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Computer Systems Organization and Communication Networks ; Computing Methodologies ; Computing Milieux ; Computer Hardware
    Description / Table of Contents: Concurrent and Distributed Systems --- Computing the concurrency threshold of sound free-choice workflow nets --- Fine-Grained Complexity of Safety Verification --- Parameterized verification of synchronization in constrained reconfigurable broadcast networks --- EMME: a formal tool for the ECMAScript Memory Model Evaluation --- SAT and SMT II --- What a Difference a Variable Makes --- Abstraction Refinement for Emptiness Checking of Alternating Data Automata --- Revisiting Enumerative Instantiation --- An Non-linear Arithmetic Procedure for Control-Command Software Verification --- Security and Reactive Systems --- Approximate Reduction of Finite Automata for High-Speed Network Intrusion Detection --- Validity-Guided Synthesis of Reactive Systems from Assume-Guarantee Contracts --- RVHyper: A Runtime Verification Tool for Temporal Hyperproperties --- The Refinement Calculus of Reactive Systems Toolset --- Static and Dynamic Program Analysis --- TESTOR: A Modular Tool for On-the-Fly Conformance Test Case Generation --- Optimal Dynamic Partial Order Reduction with Observers --- Structurally Defined Conditional Data-flow Static Analysis --- Geometric Nontermination Arguments --- Hybrid and Stochastic Systems --- Efficient dynamic error reduction for hybrid systems reachability analysis --- AMT2.0: Qualitative and Quantitative Trace Analysis with Extended Signal Temporal Logic --- Multi-Cost Bounded Reachability in MDPs --- A Statistical Model Checker for Nondeterminism and Rare Events --- Temporal logic and mu-calculus --- Permutation Games for the Weakly Aconjunctive mu-Calculus --- Symmetry Reduction for the Local Mu-Calculus --- Bayesian Statistical Parameter Synthesis for Linear Temporal Properties of Stochastic Models --- 7th Competition on Software Verification (SV-COMP) --- 2LS: Memory Safety and Non-Termination (Competition contribution) --- Yogar-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement (Competition Contribution) --- CPA-BAM-Slicing: Block-Abstraction Memorization and Slicing with Region-Based Dependency Analysis (Competition Contribution) --- InterpChecker: Reducing State Space via Interpolations (Competition Contribution) --- Map2Check using LLVM and KLEE (Competition Contribution) --- Symbiotic 5: Boosted Instrumentation (Competition Contribution) --- Ultimate Automizer and the Search for Perfect Interpolants (Competition Contribution) --- Ultimate Taipan with Dynamic Block Encoding (Competition Contribution) --- VeriAbs : Verification by Abstraction and Test Generation (Competition Contribution)
    Pages: Online-Ressource (XX, 465 pages) , 92 illustrations
    ISBN: 9783319899633
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Keywords: Computer science ; Health informatics ; Data mining ; Information storage and retrieval ; Text processing (Computer science) ; Computational linguistics ; Computer Science ; Information Storage and Retrieval ; Health Informatics ; Document Preparation and Text Processing ; Health Informatics ; Language Translation and Linguistics ; Data Mining and Knowledge Discovery
    Description / Table of Contents: Introduction --- The history of the patient record and the paper record --- User needs: clinicians, clinical researchers and hospital management --- Characteristics of patient records and clinical corpora --- Medical classifications and terminologies --- Evaluation metrics and evaluation --- Basic building blocks for clinical text processing --- Computational methods for text analysis and text classification --- Ethics and privacy of patient records for clinical text mining research --- Applications of clinical text mining --- Networks and shared tasks in clinical text mining --- Conclusions and outlook --- References --- Index
    Pages: Online-Ressource (XVII, 181 pages) , 54 illustrations, 28 illustrations in color
    ISBN: 9783319785035
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Keywords: Computer science ; Computer system failures ; Software engineering ; Computer logic ; Computer science ; Mathematics ; Artificial intelligence ; Computers ; Computer Science ; Logics and Meanings of Programs ; Software Engineering/Programming and Operating Systems ; Artificial Intelligence (incl. Robotics) ; System Performance and Evaluation ; The Computing Profession ; Discrete Mathematics in Computer Science
    Description / Table of Contents: Semantics --- Non-angelic Concurrent Game Semantics --- A Trace Semantics for System F Parametric Polymorphism --- Categorical Combinatorics for Non Deterministic Strategies on Simple Games --- A Syntactic View of Computational Adequacy --- Linearity --- A New Linear Logic for Deadlock-Free Session-Typed Processes --- A Double Category Theoretic Analysis of Graded Linear Exponential Comonads --- Depending on Session-Typed Processes --- FabULous Interoperability for ML and a Linear Language --- Concurrency --- Automata for True Concurrency Properties --- A Theory of Encodings and Expressiveness --- A Framework for Parameterized Monitorability --- Logics for Bisimulation and Divergence --- Lambda-Calculi and Types --- Call-by-need, Neededness and All That --- Fitch-Style Modal Lambda Calculi --- Realizability Interpretation and Normalization of Typed Call-by-Need --- Quotient Inductive-Inductive Types --- Category Theory and Quantum Control --- Guarded Traced Categories --- Proper Semirings and Proper Convex Functors --- From Symmetric Pattern-Matching to Quantum Control --- Quantitative Models --- The Complexity of Graph-Based Reductions for Reachability in Markov Decision Processes --- A Hierarchy of Scheduler Classes for Stochastic Automata --- Symbolically Quantifying Response Time in Stochastic Models using Moments and Semirings --- Comparator Automata in Quantitative Verification --- Logics and Equational Theories --- Modular Tableaux Calculi for Separation Theories --- Differential Calculus with Imprecise Input and its Logical Framework --- The Effects of Adding Reachability Predicates in Propositional Separation Logic --- The Equational Theory of the Natural Join and of Inner Union is Decidable --- Graphs and Automata --- Minimization of Graph Weighted Models over Circular Strings --- Games on Graphs with a Public Signal Monitoring --- WQO Dichotomy for 3-Graphs --- Verifying Higher-Order Functions with Tree Automata
    Pages: Online-Ressource (XV, 583 pages) , 75 illustrations
    ISBN: 9783319893662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Agile requirements --- COSMIC User Story Standard --- Improving Mockup-based Requirement Specification with End-User Annotations --- Agile testing --- Combining STPA and BDD for Safety Analysis and Verification in Agile Development: A Controlled Experiment --- Software tester, we want to hire you! An analysis of the demand for soft skills --- Developers' initial perceptions on TDD practice: A thematic analysis with distinct domains and languages --- Myths and Facts about Static Application Security Testing Tools: An Action Research at Telenor Digital --- Automated Acceptance Tests as Software Requirements: An Experiment to Compare the Applicability of Fit tables and Gherkin Language --- Agile transformation --- Interface Problems of Agile in a Non-Agile Environment --- Enterprise agility: Why is transformation so hard? --- Technical and Organizational Agile Practices: A Latin-American Survey --- Agile Software Development { Adoption & Maturity: An Activity Theory Perspective --- Scaling agile --- Do Agile Methods Work for Large Software Projects? --- Learning in the Large - An Exploratory Study of Retrospectives in Large-Scale Agile Development --- Reporting in Agile Portfolio Management: Routines, Metrics and Artefacts to Maintain an Effective Oversight --- Inter-team Coordination in Large-Scale Agile Development: A Case Study of Three Enabling Mechanisms --- Supporting Large-Scale Agile Development with Domain-driven Design --- Towards Agile Scalability Engineering --- Human-centric agile --- Stress in Agile Software Development: Practices and Outcomes --- Teamwork quality and team performance: Exploring differences between small and large agile projects --- Continuous experimentation --- Challenges and Strategies for Undertaking Continuous Experimentation to Embedded Systems: Industry and Research Perspectives --- ICOs overview: should investors choose an ICO developed with the Lean Startup methodology?
    Pages: Online-Ressource (XV, 309 pages) , 50 illustrations
    ISBN: 9783319916026
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XIX, 703 pages) , 146 illustrations
    ISBN: 9783319961453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Keywords: Computer science ; Computer graphics ; Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Introduction --- System Theory --- Image Processing --- Endoscopy --- Microscopy --- Magnetic Resonance Imaging --- X-ray Imaging --- Computed Tomography --- X-ray Phase Contrast: Research on a Future Imaging Modality --- Emission Tomography --- Ultrasound --- Optical Coherence Tomography --- Acronyms.
    Pages: Online-Ressource (X, 259 pages) , 167 illustrations
    ISBN: 9783319965208
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Data encryption (Computer science) ; Computer Science ; Security ; Information Systems Applications (incl. Internet) ; Data Encryption ; Special Purpose and Application-Based Systems ; Computer Communication Networks
    Description / Table of Contents: Security of distributed interconnected systems --- Security of software systems --- Security of the Internet of Things
    Pages: Online-Ressource (XII, 159 pages) , 33 illustrations
    ISBN: 9783319951898
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XX, 545 pages) , 106 illustrations
    ISBN: 9783319961422
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Keywords: Computer science ; Management ; Industrial management ; Information technology ; Business ; Data processing ; Computers ; Computer Science ; Information Systems and Communication Service ; Innovation/Technology Management ; IT in Business
    Description / Table of Contents: Modelle --- Modellierungssprachen --- Vorgehensweise von der Modellbildung zur Digitalisierung --- Vorbereitung der Prozessimplementierung --- Umsetzung --- Praxisbeispiel
    Pages: Online-Ressource (X, 254 Seiten) , 143 Abbildungen, 69 Abbildungen in Farbe
    ISBN: 9783658226480
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Computer system failures ; Coding theory ; E-commerce ; Computer Science ; Computer Communication Networks ; System Performance and Evaluation ; Special Purpose and Application-Based Systems ; Information Systems Applications (incl. Internet) ; Coding and Information Theory ; e-Commerce/e-business
    Description / Table of Contents: State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services --- Context Monitoring for Improved System Performance and QoE --- QoE Management for Future Networks --- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management --- Lag Compensation for First Person Shooter Games in Cloud Gaming --- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios --- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems --- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments --- Integrating SDN and NFV with QoS-aware Service Composition --- Energy vs. QoX Network- and Cloud Services Management --- Traffic Management for Cloud Federation --- Efficient Simulation of IoT Cloud Use Cases --- Security of Internet of Things for Reliable Internet of Services --- TCP performance over current cellular access: A comprehensive analysis
    Pages: Online-Ressource (XVI, 401 pages) , 120 illustrations
    ISBN: 9783319904153
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Keywords: Computer science ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers ; Computer Science ; Systems and Data Security ; Theory of Computation ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Pages: Online-Ressource (XIV, 347 pages) , 85 illustrations
    ISBN: 9783319897226
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Unknown
    Cham : Springer
    Keywords: Computer science ; Artificial intelligence ; Algorithms ; Robotics ; Automation ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Algorithms ; Robotics and Automation
    Description / Table of Contents: Robots and their Applications --- Sensors --- Reactive Behavior --- Finite State Machines --- Robotic Motion and Odometry --- Control --- Local Navigation: Obstacle Avoidance --- Localization --- Mapping --- Mapping-based Navigation --- Fuzzy Logic Control --- Image Processing --- Neural Networks --- Machine Learning --- Swarm Robotics --- Kinematics of a Robotic Manipulator --- Appenix A:Units of Measurement --- Appendix B:Mathematical Derivations and Tutorials --- Index
    Pages: Online-Ressource (XVI, 308 pages) , 198 illustrations, 76 illustrations in color
    ISBN: 9783319625331
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Keywords: Computer science ; Management information systems ; Computer engineering ; Economic policy ; Computer Science ; Privacy ; Computer Engineering ; Management of Computing and Information Systems ; Governance and Government ; R & D/Technology Policy
    Description / Table of Contents: 1 Introduction --- 2 Trust --- 3 What is an ICT-System? --- 4 Development of ICT Systems --- 5 Theoretical Foundation --- 6 Reverse Engineering of Code --- 7 Static Detection of Malware --- 8 Dynamic Detection Methods --- 9 Formal Methods --- 10 Software Quality and Quality Management --- 11 Containment of Untrusted Modules --- 12 Summary and Way Forward
    Pages: Online-Ressource (XIV, 116 pages) , 6 illustrations, 5 illustrations in color
    ISBN: 9783319749501
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: Introduction --- Industrial Challenges. S-BPM's Industrial Capabilities --- Lot-Size One Production. People-Centred Production Design --- Human-Controlled Production --- Learnings --- The Future: Obstacles and Opportunities
    Pages: Online-Ressource (XIV, 232 pages) , 78 illustrations
    ISBN: 9783319484662
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Keywords: Computer science ; Software engineering ; Computers ; Law and legislation ; Management information systems ; Computer Science ; Management of Computing and Information Systems ; Software Engineering ; Legal Aspects of Computing ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation
    Pages: Online-Ressource (XIV, 220 pages) , 37 illustrations
    ISBN: 9783319577357
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Improving Agile Processes --- Reflection in Agile Retrospectives --- What influences the speed of prototyping? An empirical investigation of twenty software startups --- Key Challenges in Agile Requirements Engineering --- A Multiple Case Study on Selecting a Technique for User-Interaction Data Collecting --- Comparing Requirements Decomposition within the Scrum, Scrum with Kanban, XP, and Banana Development Processes --- Effects of Technical Debt Awareness: A classroom study --- Agile in Organizations --- Don’t Forget to Breathe: A Controlled Trial of Mindfulness Practices in Agile Project Teams --- Enhancing Agile Team Collaboration through the use of Large Digital Multi-touch Cardwalls --- Knowledge Sharing in a Large Agile Organisation: A Survey Study --- Teaching Agile Methods to Software Engineering Professionals: 10 Years, 1000 Release Plans --- Are Software Startups Applying Agile? the State of the Practice from a Large Survey --- Adopting Test Automation on Agile Development Projects: A Grounded Theory Study of Indian Software Organizations --- Safety Critical Software --- How is security testing done in agile teams? A cross-case analysis of four software teams --- An assessment of avionics software development practice: justifications for an agile development process --- Short Research Papers --- Inoculating an Agile Company with User-Centred Design: an Empirical Study --- On the Usage and Benefits of Agile Methods & Practices --- Checklists to Support Test Charter Design in Exploratory Testing --- Discovering Software Process Deviations Using Visualizations --- Exploring Workflow Mechanisms and Task Allocation Strategies in Agile Software Teams --- Are daily stand-up meetings valuable? A survey of developers in software teams --- Doctoral Symposium Papers --- Knowledge Management and Reflective Practice in Daily Stand-up and Retrospective Meetings --- Self-Assignment: Task Allocation Practice in Agile Software Development --- Software Development Practices Patterns.
    Pages: Online-Ressource (XIII, 306 pages) , 55 illustrations
    ISBN: 9783319576336
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Keywords: Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Description / Table of Contents: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Pages: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Keywords: Computer science ; Special purpose computers ; Computer security ; User interfaces (Computer systems) ; Artificial intelligence ; Image processing ; Computer Science ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Artificial Intelligence (incl. Robotics) ; Systems and Data Security ; Image Processing and Computer Vision ; Special Purpose and Application-Based Systems
    Description / Table of Contents: This book is published open access under a CC BY license. This book constitutes the proceedings of the 5th International Workshop on Symbiotic Interaction, Symbiotic 2016, held in Padua, Italy, in October 2016. The 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The idea of symbiotic systems put forward in this workshop capitalizes on the computers’ ability to implicitly detect the users goals, preferences or/and psycho-physiological states and thereby enhancing human-computer interaction (HCI). The papers present an overview of the symbiotic relationships between humans and computers with emphasis on user-driven research on symbiotic systems, adaptive systems, implicit input data, physiological computing and BCI, but also on understanding the nature of the interdependence and agency between computers and humans more broadly
    Pages: Online-Ressource (XIV, 182 pages) , 51 illustrations
    ISBN: 9783319577531
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Keywords: Computer science ; Computer communication systems ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers and civilization ; Computer Science ; Computer Communication Networks ; Systems and Data Security ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation ; Computers and Society ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Making Flow-Based Security Detection Parallel --- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts --- Achieving Reproducible Network Environments with INSALATA --- Towards a Software-Defined Security Framework for Supporting Distributed Cloud --- Optimal Service Function Chain Composition in Network Functions Virtualization --- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services --- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications --- Towards Internet Scale Quality-of-Experience Measurement with Twitter --- Hunting SIP Authentication Attacks Efficiently --- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks --- Flow-Based Detection of IPv6-specific Network Layer Attacks --- Towards a Hybrid Cloud Platform Using Apache Mesos --- Visual Analytics for Network Security and Critical Infrastructures --- Preserving Relations in Parallel Flow Data Processing --- SmartDEMAP: A Smart Contract Deployment and Management Platform --- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads --- Situational Awareness: Detecting Critical Dependencies and Devices in a Network --- A Framework for SFC Integrity in NFV Environments --- Multi-domain DDoS Mitigation based on Blockchains
    Pages: Online-Ressource (XX, 192 pages) , 55 illustrations
    ISBN: 9783319607740
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Keywords: Computer science ; Management information systems ; Software engineering ; Computer Science ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Common challenges with software --- The map --- A holistic view to change --- The compass --- The journeys --- Co-develop in a community --- Charing is caring --- A thriving Open Source culture behind the wall --- Keeping the doors open.- Building ecosystems --- Pushing the boundaries --- Add supplementary services --- Adding Internet to things --- Boosting product sales by services --- Deliver 24/7 --- Pruning a bush --- Ensuring prima deliveries --- Pump up the volume --- Global R&D goes agile with SAFe --- Multi-site development --- Agile and disciplined --- Scaling Agile in Automotive --- Scaling Agile in Life sciences --- Outside the box --- Efficient communication --- Outsourcing Strategy at Sony Mobile --- Not so shore anymore --- Play it again, Sam, backwards --- First things first --- Robotic growing pains --- Softhouse reflects on architecture changes --- From mobile to Platform --- Your journey
    Pages: Online-Ressource (XXIII, 242 pages)
    ISBN: 9783319531168
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Keywords: Computer science ; Special purpose computers ; Database management ; User interfaces (Computer systems) ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics) ; User Interfaces and Human Computer Interaction ; Database Management ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Can Machines Design? Optimizing User Interfaces for Human Performance --- Geometrical Shapes Rendering on a Dot-Matrix Display --- Dynamic Hand Gesture Recognition for Mobile Systems Using Deep LSTM --- Adjustable Autonomy for UAV Supervision Applications Through Mental Workload Assessment Techniques --- Classification of Motor Imagery Based EEG Signals Using Sparsity Approach --- Mental Workload Assessment for UAV Traffic Control Using Consumer-Grade BCI Equipment --- Improving Classification Performance by Combining Feature Vectors with A Boosting Approach for Brain Computer Interface (BCI) --- List Navigation Using Edge Menu --- Simplexity and Vicariance. On Human Cognition Principles for Man-Machine Interaction --- Design Considerations for Self-paced Interactive Notes on Video Lectures - A Learner's Perspective and Enhancements of Learning Outcome --- Using Psycholinguistic Features for the Classification of Comprehenders from Summary Speech Transcripts --- Lector: Towards Reengaging Students in the Educational Process Inside Smart Classrooms --- Predicting Driver's Work Performance in Driving Simulator Based on Physiological Indices --- Interpersonal Human-Human and Human-Robot Interactions --- Exploring the Dynamics of Relationships Between Expressed and Experienced Emotions --- Standard Co-training in Multiword Expression Detection --- Comparative Study on Normalization in Emotion Recognition from Speech --- Detecting Vigilance in People Performing Continual Monitoring Task
    Pages: Online-Ressource (XVIII, 216 pages) , 78 illustrations
    ISBN: 9783319720388
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Keywords: Computer science ; Health informatics ; Computer system failures ; Image processing ; Computer Science ; Health Informatics ; Health Informatics ; Image Processing and Computer Vision ; System Performance and Evaluation
    Description / Table of Contents: VISCERAL: Evaluation-as-a-Service for Medical Imaging --- Using the Cloud as a Platform for Evaluation and Data Preparation --- Ethical and Privacy Aspects of Using Medical Image Data --- Annotating Medical Image Data --- Datasets created in VISCERAL --- Evaluation Metrics for Medical Organ Segmentation and Lesion Detection --- VISCERAL Anatomy Benchmarks for Organ Segmentation and Landmark Localisation: Tasks and Results --- Retrieval of Medical Cases for Diagnostic Decisions: VISCERAL Retrieval Benchmark --- Automatic Atlas-Free Multi-Organ Segmentation of Contrast-Enhanced CT Scans --- Multi-organ Segmentation Using Coherent Propagating Level Set Method Guided by Hierarchical Shape Priors and Local Phase Information --- Automatic Multi-organ Segmentation using Hierarchically-Registered Probabilistic Atlases --- Multi-Atlas Segmentation Using Robust Feature-Based Registration --- Combining Radiology Images and Clinical Meta-data for Multimodal Medical Case-based Retrieval --- Text and Content-based Medical Image Retrieval in the VISCERAL Retrieval Benchmark
    Pages: Online-Ressource (XVIII, 254 pages) , 93 illustrations, 39 illustrations in color
    ISBN: 9783319496443
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Keywords: Computer science ; Computer communication systems ; Software engineering ; Mathematical statistics ; Computers ; Artificial intelligence ; Computer graphics ; Computer Science ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Smart algorithms --- Data classification and processing --- Stochastic modelling --- Performance evaluation --- Queuing systems --- Wireless networks and security --- Image processing and computer vision
    Pages: Online-Ressource (XIII, 278 pages) , 75 illustrations
    ISBN: 9783319472171
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Unknown
    Cham : Springer
    Keywords: Computer science ; Computer organization ; Computers ; Artificial intelligence ; Computer simulation ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Simulation and Modeling
    Description / Table of Contents: Preface --- Part I: The Concept of Anti-Fragility: 1 Introduction --- 2 Achieving Anti-Fragility --- 3 The Need to Build Trust --- 4 Principles Ensuring Anti-Fragility --- Part II: Anti-Fragility to Downtime: 5 Anti-Fragile Cloud Solutions --- 6 An Anti-Fragile e-Government System --- 7 Anti-Fragile Cloud-Based Telecom Systems --- Part III: Anti-Fragility to Malware: 8 Robustness to Malware Spreading --- 9 Robustness to Malware Reinfections --- 10 Anti-Fragility to Malware Spreading --- Part IV: Anomaly Detection: 11 The Cortical Learning Algorithm --- 12 Detecting Anomalies with the CLA --- Part V: Future Anti-Fragile Systems: 13 Summary and Future Work --- About the Author --- References --- Index
    Pages: Online-Ressource (XVIII, 151 pages) , 44 illustrations, 22 illustrations in color
    ISBN: 9783319300702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Computers ; Computers and civilization ; Computer Science ; History of Computing ; User Interfaces and Human Computer Interaction ; Computer Appl. in Arts and Humanities ; Computers and Society
    Description / Table of Contents: Once Neglected, Now Emerging and Absolutely Necessary: On the History of Digital Humanities or An Introduction --- Why Oral History? ---  ‘Individuation is There in all the Different Strata:’ an Oral History Conversation between John Burrows, Hugh Craig and Willard McCarty --- ‘It was a Time When the University was Still Taking Account of the Meaning of universitas scientiarum’: an Oral History Conversation between Wilhelm Ott and Julianne Nyhan --- ‘hic Rhodus, hic salta’: An Oral History Interview Between Tito Orlandi and Julianne Nyhan --- ‘They Took a Chance’: An Oral History Conversation between Susan Hockey and Julianne Nyhan ---  ‘And Here We go Back Again to the Influence of Algorithmic Thinking’: An Oral History conversation between Judy Malloy and Julianne Nyhan --- ‘I Would Think of Myself as Sitting Inside the Computer, Moving Things Around in Order to Accomplish the Goal of my Programming’: An Oral History Conversation Between Mary Dee Harris and Julianne Nyhan --- ‘I Was Absolutely Convinced That There Had to be a Better Way’: An Oral History Conversation Between John Nitti and Julianne Nyhan --- ‘It’s a Little Mind-Boggling Actually’: An Oral History Conversation between Helen Agüera and Julianne Nyhan ---  ‘I Heard About the Arrival of the Computer’: An Oral History Conversation Between Hans Rutimann and Julianne Nyhan ---  ‘Langezeit habe ich der Universitaet nachgetrauert’: An Oral History Conversation between Michael Sperberg-McQueen and Julianne Nyhan.-‘It’s Probably the Only Modestly Widely used System with a Command Language in Latin’: An Oral History Conversation Between Manfred Thaller and Julianne Nyhan ---  ‘I was Keen on Getting Computers into Humanists’ Thinking’: An Oral History Conversation Between John Bradley and Julianne Nyhan ---  ‘Moderate Expectations, Tolerable Disappointments’: An Oral History Conversation between Claus Huitfeldt and Julianne Nyhan --- ‘So, Into the Chopper it Went’: An Oral History Conversation between Gabriel Egan and Julianne Nyhan --- Revolutionaries and Underdogs --- By Way of a Conclusion
    Pages: Online-Ressource (XI, 285 pages)
    ISBN: 9783319201702
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Keywords: Computer science ; Computer organization ; Software engineering ; Application software ; System theory ; Computer Science ; Computer Systems Organization and Communication Networks ; Software Engineering ; Complex Systems ; Information Systems Applications (incl. Internet) ; Computer Applications
    Description / Table of Contents: Basic concepts on systems of systems --- interfaces in evolving cyber-physical systems-of-systems --- emergence in cyber-physical systems-of-systems (CPSOSS) --- AMADEOS sysml profile for SoS conceptual modeling --- AMADEOS framework and supporting tools --- time and resilient master clocks in cyber-physical systems --- managing dynamicity in SoS --- case study definition and implementation
    Pages: Online-Ressource (XV, 257 pages) , 124 illustrations
    ISBN: 9783319475905
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Keywords: Computer science ; Management ; Industrial management ; Information storage and retrieval ; Application software ; Computers and civilization ; Computer Science ; Information Storage and Retrieval ; Innovation/Technology Management ; Computer Applications ; Computers and Society
    Description / Table of Contents: Part I: The Big Data Opportunity --- The Big Data Value Opportunity --- Introduction to the BIG Project --- Part II: The Big Data Value Chain: Enabling and Value Creating Technologies --- The Big Data Value Chain: Definitions, Concepts, and Theoretical Approaches --- Big Data Acquisition --- Big Data Analysis --- Big Data Curation --- Big Data Storage --- Big Data Usage --- Part III: Usage and Exploitation of Big Data --- Big Data Driven Innovation in Industrial Sectors --- Big Data in the Health Sector --- Big Data in the Public Sector --- Big Data in the Finance and Insurance Sectors --- Big Data in the Energy and Transport Sectors --- Big Data in the Media and Entertainment Sectors --- Part IV: A Roadmap for Big Data Research --- Cross-Sectorial Requirements Analysis for Big Data Research --- New Horizons for a Data-Driven Economy: Roadmaps and Action Plans for Technology, Businesses, Policy, and Society.                        
    Pages: Online-Ressource (XX, 303 pages) , 34 illustrations
    ISBN: 9783319215693
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Chapter 1 Introduction --- Chapter 2 Misperception of Risk --- Chapter 3 Governance and Internal Partnerships --- Chapter 4 External Partnerships --- Chapter 5 People Are the Perimeter --- Chapter 6 Emerging Capabilities and Usage Models --- Chapter 7 A New Security Architecture to Improve Business Agility --- Chapter 8 Looking to the Future --- Chapter 9 Corporate Social Responsibility --- Chapter 10 The 21st Century CISO --- Chapter 11 Performance Coaching --- Appendix A: References.
    Pages: Online-Ressource (XXVII, 187 pages) , 20 illustrations in color
    Edition: 2nd edition
    ISBN: 9781484214558
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Keywords: Computer science ; Project management ; Software engineering ; Computer Science ; Software Engineering ; Project Management
    Description / Table of Contents: Part I: DevOps: Conflict to Collaboration --- Chapter 1: DevOps in the Ascendency --- Chapter 2: IT Impasse --- Chapter 3: DevOps Foundations --- Part II: Essential DevOps Tooling --- Chapter 4: Build: DevOps Driven APIs --- Chapter 5: Test: Championing Quality - Continuously --- Chapter 6: Deploy --- Chapter 7: Manage: Agile Operations --- Part III: Tuning and Continuous Improvement --- Chapter 8: Practical DevOps --- Chapter 9: DevOps and Real World ROI --- Chapter 10: Ready, Set, DevOps!
    Pages: Online-Ressource (XV, 173 pages) , 24 illustrations in color
    ISBN: 9781484218426
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Keywords: Computer science ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics)
    Description / Table of Contents: Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, classifications, genetic algorithms, neural networking, kernel methods, and biologically-inspired techniques. Mariette Awad and Rahul Khanna’s synthetic approach weaves together the theoretical exposition, design principles, and practical applications of efficient machine learning. Their experiential emphasis, expressed in their close analysis of sample algorithms throughout the book, aims to equip engineers, students of engineering, and system designers to design and create new and more efficient machine learning systems. Readers of Efficient Learning Machines will learn how to recognize and analyze the problems that machine learning technology can solve for them, how to implement and deploy standard solutions to sample problems, and how to design new systems and solutions. Advances in computing performance, storage, memory, unstructured information retrieval, and cloud computing have coevolved with a new generation of machine learning paradigms and big data analytics, which the authors present in the conceptual context of their traditional precursors. Awad and Khanna explore current developments in the deep learning techniques of deep neural networks, hierarchical temporal memory, and cortical algorithms. Nature suggests sophisticated learning techniques that deploy simple rules to generate highly intelligent and organized behaviors with adaptive, evolutionary, and distributed properties. The authors examine the most popular biologically-inspired algorithms, together with a sample application to distributed datacenter management. They also discuss machine learning techniques for addressing problems of multi-objective optimization in which solutions in real-world systems are constrained and evaluated based on how well they perform with respect to multiple objectives in aggregate. Two chapters on support vector machines and their extensions focus on recent improvements to the classification and regression techniques at the core of machine learning
    Pages: Online-Ressource (XIX, 268 pages) , 88 illustrations
    ISBN: 9781430259909
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Keywords: Computer science ; Computer organization ; Computers ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service
    Description / Table of Contents: Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers
    Pages: Online-Ressource (XXI, 360 pages) , 103 illustrations
    ISBN: 9781430266389
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Keywords: Computer science ; Microprogramming ; Computer Science ; Computer Science, general ; Control Structures and Microprogramming
    Description / Table of Contents: Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel’s new firmware direction (including Quark coverage), showing how to integrate Intel® Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization
    Pages: Online-Ressource (XXIII, 224 pages) , 68 illustrations
    ISBN: 9781484200704
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: 1 Introduction --- Part I Business Operation Support --- 2 Subject-Oriented Business Processes Meet Strategic Management: Two Case Studies from the Manufacturing Industry --- 3 Communication- and Value-Based Organizational Development at the University Clinic for Radiotherapy-Radiation Oncology --- 4 Introducing S-BPM at an IT Service Providers --- 5 A Service Hardware Application Case Fiducia --- 6 Designing an Agile Process Layer for Competitive Differentiation --- Part II Consultancy and Education Support --- 7 Model as You Do: Engaging an S-BPM Vendor on Process Modelling in 3D Virtual Worlds --- 8 A Tangible Modeling Interface for Subject-Oriented Business Process Management --- 9 A Reference Model for Maintenance Processes --- 10 Role and Rights Management --- 11 Embodying Business Rules in S-BPM --- 12 Agents Implementing Subject Behaviour: A Manufacturing Scenario --- Part III Technical Execution Support --- 13 An Abstract State Machine Interpreter for S-BPM --- 14 Structured Communication—Approaching S-BPM with Microsoft Technologies --- 15 ERP Integration in S-BPM Processes
    Pages: Online-Ressource (XIV, 283 pages) , 134 illustrations
    ISBN: 9783319175423
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Keywords: Computer science ; Data structures (Computer science) ; User interfaces (Computer systems) ; Application software ; Computers ; Computer Science ; History of Computing ; Computer Appl. in Arts and Humanities ; Data Structures ; User Interfaces and Human Computer Interaction
    Description / Table of Contents: Part I: Artistic Contributions --- The Computer Age --- Odes to Ted Nelson --- Part II: Peer Histories --- The Two-eyed Man --- Ted Nelson’s Xanadu—Caution: Four Letter Words Ahead --- Hanging Out with Ted Nelson --- Riffing on Ted Nelson—Hypermind --- Intertwingled Inspiration --- An Advanced Book for Beginners --- Part III: Hypertext and Ted Nelson-Influenced Research --- The Importance of Ted’s Vision --- Data, Metadata and Ted --- Making Links: Everything Really is Deeply Intertwingled --- Ted Nelson --- History Debugged --- We Can and Must Understand Computers NOW --- The Future of Transclusion --- Ted Nelson: A Critical (and Critically Incomplete) Bibliography --- Part IV: The Last Word --- What Box?
    Pages: Online-Ressource (XVI, 150 pages) , 43 illustrations
    ISBN: 9783319169255
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Text processing (Computer science) ; Image processing ; Computer Science ; Image Processing and Computer Vision ; Document Preparation and Text Processing
    Description / Table of Contents: Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, how they are designed, with observations about tuning the methods for achieving robustness and invariance targets for specific applications. The survey is broader than it is deep, with over 540 references provided to dig deeper. The taxonomy includes search methods, spectra components, descriptor representation, shape, distance functions, accuracy, efficiency, robustness and invariance attributes, and more. Rather than providing ‘how-to’ source code examples and shortcuts, this book provides a counterpoint discussion to the many fine opencv community source code resources available for hands-on practitioners
    Pages: Online-Ressource (XXXI, 508 pages) , 216 illustrations
    ISBN: 9781430259305
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application logic. No prior knowledge of C++ is assumed and the book covers the fundamental aspects of the language for writing BlackBerry 10 apps. Also a particular emphasis is put on how to create a visually enticing user experience with the Cascades framework, which is based on Qt and QML. Starting with the native SDK configuration and an overview of the Momentics IDE, the book is fast-paced and you will rapidly learn many of the best practices and techniques required for developing beautiful BlackBerry 10 apps. Learn BlackBerry 10 App Development is written for developers wishing to learn how to write apps for the new BlackBerry 10 OS and those interested in porting existing iOS and Android apps to BlackBerry 10 as native applications
    Pages: Online-Ressource (XVI, 356 pages) , 104 illustrations
    ISBN: 9781430261582
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Keywords: Computer science ; Computer Science ; Computer Science, general
    Description / Table of Contents: Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel® Galileo and Intel® Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team’s findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. His personal blog about programming is BytesThink (www.bytesthink.com)
    Pages: Online-Ressource (XXII, 680 pages) , 256 illustrations
    ISBN: 9781430268383
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Software engineering ; User interfaces (Computer systems) ; Computer Science ; User Interfaces and Human Computer Interaction ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: GUI Design for Android Apps is the perfect—and concise—introduction for mobile app developers and designers. Through easy-to-follow tutorials, code samples, and case studies, the book shows the must-know principles for user-interface design for Android apps running on the Intel platform, including smartphones, tablets and embedded devices. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University, and is excerpted from Android Application Development for the Intel® Platform
    Pages: Online-Ressource (XI, 156 pages) , 65 illustrations
    ISBN: 9781484203828
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Computer programming ; Computer Science ; Programming Techniques
    Description / Table of Contents: The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices, such as Samsung, Lenovo, and Asus. The increase in Android devices featuring Intel processors has created a demand for Android applications optimized for Intel Architecture: Android Application Development for the Intel® Platform is the perfect introduction for software engineers and mobile app developers. Through well-designed app samples, code samples and case studies, the book teaches Android application development based on the Intel platform—including for smartphones, tablets, and embedded devices—covering performance tuning, debugging and optimization. This book is jointly developed for individual learning by Intel Software College and China Shanghai JiaoTong University
    Pages: Online-Ressource (XX, 520 pages) , 278 illustrations
    ISBN: 9781484201008
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Keywords: Computer science ; Multimedia information systems ; Computer Science ; Computer Science, general ; Multimedia Information Systems
    Description / Table of Contents: Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to choose and tune coding parameters for optimum results that would suit their particular needs for quality, compression, speed and power. The practical aspects are many: Uploading video to the Internet is only the beginning of a trend where a consumer controls video quality and speed by trading off various other factors. Open source and proprietary applications such as video e-mail, private party content generation, editing and archiving, and cloud asset management would give further control to the end-user. Digital video is frequently compressed and coded for easier storage and transmission. This process involves visual quality loss due to typical data compression techniques and requires use of high performance computing systems. A careful balance between the amount of compression, the visual quality loss and the coding speed is necessary to keep the total system cost down, while delivering a good user experience for various video applications. At the same time, power consumption optimizations are also essential to get the job done on inexpensive consumer platforms. Trade-offs can be made among these factors, and relevant considerations are particularly important in resource-constrained low power devices. To better understand the trade-offs this book discusses a comprehensive set of engineering principles, strategies, methods and metrics. It also exposes readers to approaches on how to differentiate and rank video coding solutions
    Pages: Online-Ressource (XVII, 368 pages) , 115 illustrations
    ISBN: 9781430267133
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...