ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (227)
  • Computer Science  (227)
Collection
Source
Language
  • 1
    Keywords: ActionScript 1.0 ; ActionScript 2.0 ; Flash MX 2004
    Pages: Online-Ressource (668 Seiten)
    Edition: 1. Aufl.
    ISBN: 3898422216
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Unknown
    Bonn : Galileo Press
    Keywords: UNIX ; LINUX ; Einführung
    Description / Table of Contents: Vorwort Dieses Buch wurde für den Einsteiger geschrieben. Leicht verständlich sollte es sein. Da ich mich oft darüber ärgerte, dass ich von Einsteigerbüchern immer so bald im Regen stehen gelassen wurde, sollte dieses Buch so lange wie möglich nützlich sein. Also sollten zu möglichst vielen Stichworten, die einem Anfänger begegnen können, ein paar erklärende Worte fallen. Na ja, dann kann man ja gerade noch ein paar Worte dazu sagen, wie man das installiert und konfiguriert. Was sollte in das Buch hinein? Klar, die grundlegenden Befehle zum Umgang mit Dateien und Verzeichnissen sind wichtig. Die Editoren vi und emacs und die Shell sind die Standardwerkzeuge eines jeden UNIX-Anwenders und müssen natürlich erläutert werden. Neben diesen klassischen Themen will man aber auch mit einem CD-Brenner arbeiten. Auch die Administration darf nicht fehlen. Immerhin gibt es immer mehr Einzelplatzbenutzer, insbesondere im Bereich Linux und MacOS X, die letztlich ihr System auch selbst administrieren müssen. Wer es im professionellen Umfeld mit UNIX zu tun bekommt, wird schnell in das Umfeld der Administration geraten. Und dann wird man über kurz oder lang auch mal ein paar kleine Skripten zaubern müssen. Wenn man dann als Administrator Perl kennt, ist das nicht verkehrt. Auf der anderen Seite kann man in der heutigen Zeit das Thema grafische Oberflächen nicht mehr weglassen. Und dass eine Maschine ohne Netzwerk betrieben wird, ist im Internet-Zeitalter einfach unglaubwürdig. So kam dann eins zum anderen. Inzwischen ist dieses Buch fast schon eine UNIX-Enzyklopädie, aber immer noch soll es für den Anfänger leicht verständlich sein. Denn Verständlichkeit schätzt nicht nur der Anfänger, sondern auch der Profi, wenn ihm mal ein neues Thema begegnet...
    Pages: Online-Ressource (654 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898422406
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Open Source ; Lizenzvertrag
    Pages: Online-Ressource (182 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897213893
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Unknown
    Beijing : O'Reilly
    Keywords: Firewall ; SuSE LINUX 9.0 ; LINUX 2.6 ; Kernel ; Debian GNU/LINUX 3.1
    Pages: Online-Ressource (632 Seiten)
    Edition: 2. Aufl.
    ISBN: 3897214466
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: LINUX
    Pages: Online-Ressource (825 Seiten)
    Edition: 3. Aufl.
    ISBN: 3897211335
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: LINUX ; Netzwerkverwaltung
    Pages: Online-Ressource (359 Seiten)
    Edition: 3. Aufl.
    ISBN: 3897214148
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Unknown
    München : Addison-Wesley
    Keywords: XML ; Extensible Markup Language ; Web-Publishing ; XHTML ; XPath ; XSL ; DTD
    Description / Table of Contents: XML - leicht verständlich und praxisnah. XML verändert das Web wie nichts zuvor. Das Buch erklärt Ihnen sowohl die Idee von XML als auch deren Anwendungsmöglichkeiten. Neben der vollständigen Spezifikation enthält es vor allem auch praktische Tipps für den Einsatz von XML im WWW. Jeder Web-Publisher, der die Beschränkungen von HTML ablegen möchte, findet hier eine unentbehrliche Grundlage und Referenz. Erläuterungen und Tipps zu wichtigen Aspekten wie XSL, RDF und Linking runden die Darstellung ab.
    Pages: Online-Ressource (512 Seiten)
    Edition: 2., erw. Aufl.
    ISBN: 9783827316367
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Unknown
    Amsterdam ; London : Elsevier
    Keywords: DDC 518.26 ; LC QA297.8 ; Iterative methods (Mathematics)
    Pages: Online-Ressource (xv, 487 pages)
    ISBN: 9780444531629
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Wavelets (Mathematics)
    Description / Table of Contents: "Beyond Wavelets" presents state-of-the-art theories, methods, algorithms, and applications of mathematical extensions for classical wavelet analysis. Wavelets, introduced 20 years ago by Morlet and Grossmann and developed very rapidly during the 1980's and 1990's, has created a common link between computational mathematics and other disciplines of science and engineering. Classical wavelets have provided effective and efficient mathematical tools for time-frequency analysis which enhances and replaces the Fourier approach. However, with the current advances in science and technology, there is an immediate need to extend wavelet mathematical tools as well. "Beyond Wavelets" presents a list of ideas and mathematical foundations for such extensions, including: continuous and digital ridgelets, brushlets, steerable wavelet packets, contourlets, eno-wavelets, spline-wavelet frames, and quasi-affine wavelets. Wavelet subband algorithms are extended to pyramidal directional and nonuniform filter banks. In addition, this volume includes a method for tomographic reconstruction using a mechanical image model and a statistical study for independent adaptive signal representation. Investigators already familiar with wavelet methods from areas such as engineering, statistics, and mathematics will benefit by owning this volume. *Curvelets, Contourlets, Ridgelets, *Digital Implementation of Ridgelet Packets *Steerable Wavelet Packets *Essentially Non-Oscillatory Wavelets *Medical Imaging *Non-Uniform Filter Banks *Spline-wavelet frames and *Vanishing Moment Recovery Functions
    Pages: Online-Ressource (xiv, 305 pages)
    Edition: 1st ed
    ISBN: 9780127432731
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 518/.43 ; LC QA218 ; Algebras, Linear ; Equations - Numerical solutions
    Pages: Online-Ressource (330 pages)
    Edition: 1st ed
    ISBN: 9780444514745
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Keywords: Bioinformatics ; Biology ; Data processing ; Biotechnology ; Computer software ; Data structures (Computer science) ; Genetic engineering
    ISBN: 9782287339097
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Keywords: VMware ; virtuelle Server
    Description / Table of Contents: Bei steigender Komplexität moderner Server-Landschaften und stetig wachsender Rechenleistung ist Servervirtualisierung nicht mehr als die logische Konsequenz. Die Entwicklung in der Unternehmenspraxis bestätigt das: Die Produkte der Firma VMware, der GSX und der ESX-Server, sind gefragt wie nie. Mittlerweile bietet neben einigen anderen Herstellern auch Microsoft eine eigene Softwarelösung an: den Virtual Server. Dieses Buch bietet von der Konzeption bis zum Einsatz das nötige Wissen für professionelle Virtualisierungsprojekte im Unternehmen. Es klärt nicht nur die Frage, was Virtualisierung bedeutet und welches Produkt sich für welchen Zweck am besten eignet, sondern liefert auch umfassendes Profi-Wissen für den praktischen Einsatz, die Einrichtung und Verwaltung virtueller Server-Welten.
    Pages: Online-Ressource (612 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898427012
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Computer science ; Computer communication systems ; Computers and civilization ; Management information systems ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Communications Engineering, Networks ; Computers and Society ; Management of Computing and Information Systems
    Description / Table of Contents: This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics.   Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed:   - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    Pages: Online-Ressource (IX, 243 pages) , 61 illustrations
    ISBN: 9783642303821
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Electrical engineering ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Information Storage and Retrieval ; Multimedia Information Systems ; Communications Engineering, Networks ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will be a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.  This book is published in full compliance with the Open Access publishing initiative; it is based on the research carried out within the Future Internet Assembly (FIA). It contains a sample of representative results from the recent FIA meetings spanning a broad range of topics, all being of crucial importance for the future Internet.  The book includes 32 contributions and has been structured into the following sections, each of which is preceded by a short introduction: Foundations: architectural issues; socio-economic issues; security and trust; and experiments and experimental design. Future Internet Areas: networks, services, and content; and applications
    Pages: Online-Ressource (XVI, 465 pages)
    ISBN: 9783642208980
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Keywords: Computer science ; Computer communication systems ; Data mining ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Data Mining and Knowledge Discovery ; Computers and Society
    Description / Table of Contents: Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must. The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures
    Pages: Online-Ressource (XXV, 252 pages)
    ISBN: 9783642302411
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Keywords: computer and information science ; artificial intelligence
    Pages: Online-Ressource (254 Seiten)
    ISBN: 9789535109211
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    Keywords: DDC 519.6 ; LC QA402.5 ; Mathematical optimization - Congresses ; Parallel algorithms - Congresses
    Description / Table of Contents: Papers from the Research Workshop on Inherently Parallel Algorithms in Feasibility and Optimization and Their Applications, held in Haifa, Israel, Mar. 13-16, 2000
    Pages: Online-Ressource (x, 504 pages)
    Edition: 1st ed
    ISBN: 9780444505958
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Pages: Online-Ressource (3-827)
    ISBN: 9780444898579
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Unknown
    Bonn : Galileo Press
    Keywords: Visual Basic ; Visual Basic 2012 ; Visual Studio ; Objektorientierte Programmierung ; OOP ; C# ; .NET
    Description / Table of Contents: Wenn Sie ein Buch suchen, dass Ihnen bei allen Fragen der C#-Entwicklung zuverlässig mit Rat und Tat zur Seite steht, dann ist unser bewährtes Kompendium genau das Richtige für Sie. Mittlerweile in der 6. Auflage dient es ambitionierten Ein- und Umsteigern durch seine strukturierte Vorgehensweise und die zahlreichen Anwendungsbeispiele als praxisorientierte Einführung; Fortgeschrittene und Profis unterstützt es als Nachschlagewerk optimal bei ihrer täglichen Arbeit. In den ersten Kapiteln werden zunächst die Grundlagen von C#, .NET und der objektorientierten Programmierung vermittelt. Es folgen Kapitel zur effizienten Entwicklung mit Visual Studio 2012, zur Fehlerbehandlung sowie zu fortgeschrittenen C#-Themen wie LINQ, Multithreading, Serialisierung u. v. m. Den größten Themenblock bildet die Entwicklung von grafischen Benutzeroberflächen. Neben einer fundierten Einführung in die WPF und XAML erfahren Sie hier alles Notwendige, um auch komplexe Anwendungen zu gestalten. Anschließend wird die Datenbankprogrammierung mit ADO.NET ausführlich behandelt und zu guter Letzt die Weitergabe von .NET-Anwendungen thematisiert. So sind Sie für Ihren Arbeitsalltag bestens gerüstet!
    Pages: Online-Ressource (1402 Seiten)
    Edition: 6., akt. und erw. Aufl.
    ISBN: 9783836219976
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Keywords: Visual Basic 2012 ; .NET
    Description / Table of Contents: Sie möchten das Programmieren mit Visual Basic lernen? Dann führt Sie dieses Buch schnell und sicher zum Ziel. Anhand anschaulicher und leicht nachvollziehbarer Beispiele werden alle wichtigen Themen erläutert: Grundlagen zu Variablen, Operatoren, Schleifen und Co., objektorientierte Programmierung, Fehlerbehandlung, Erstellen von Datenbank- und Internetanwendungen. Auch in die Entwicklung von GUIs mit der Windows Presentation Foundation und von Windows Store Apps für Windows 8 werden Sie eingeführt. Ausführliche Schritt-für-Schritt-Anleitungen und regelmäßige Zusammenfassungen sichern Ihren Lernerfolg. Ihr neu gewonnenes Wissen können Sie an einer Vielzahl von Übungsaufgaben unter Beweis stellen und an Musterlösungen überprüfen. So werden Sie schon bald selbstständig eigene Windows-Programme entwickeln.
    Pages: Online-Ressource (579 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836219594
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Hilbertian Kernels
    Pages: Online-Ressource (xii, 386 pages)
    Edition: 1st ed
    ISBN: 9780444897183
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Keywords: Computer science ; Computers ; Database management ; Artificial intelligence ; Computer Science ; Database Management ; Artificial Intelligence (incl. Robotics) ; Information Systems and Communication Service
    Description / Table of Contents: Introduction to LOD2, Sören Auer --- Advances in Large-scale RDF Data --- Knowledge Base Creation, Enrichment and Repair --- Interlinking and Knowledge Fusion --- Facilitating the Exploration and Visualization of Linked Data --- Supporting the Linked Data life cycle using an integrated tool stack --- LOD2 for Media and Publishing --- Building Enterprise Ready Applications Using Linked Open Data --- Lifting Open Data Portals to the Data Web --- Linked Open Data for Public Procurement
    Pages: Online-Ressource (VII, 215 pages) , 73 illustrations
    ISBN: 9783319098463
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Keywords: Computer science ; Computer communication systems ; Information storage and retrieval ; Multimedia information systems ; Computers and civilization ; Management information systems ; Computer Science ; Computer Communication Networks ; Information Systems Applications (incl. Internet) ; Management of Computing and Information Systems ; Multimedia Information Systems ; Information Storage and Retrieval ; Computers and Society
    Description / Table of Contents: Software Driven Networks, Virtualisation, Programmability and Autonomic Management --- Towards a Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet (SmartenIT) --- The NEBULA Future Internet Architecture --- Open the Way to Future Networks – A Viewpoint Framework from ITU-T --- Towards a Minimal Core for Information-Centric Networking --- Managing QoS for Future Internet Applications over Virtual Sensor Networks --- High Availability in the Future Internet --- Integrating OpenFlow in IMS Networks and Enabling for Future Internet Research and Experimentation --- Computing and Networking Clouds Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds --- Cloud–Based Evaluation Framework for Big Data --- Optimizing Service Ecosystems in the Cloud --- Resource Optimisation in IoT Cloud Systems by Using Matchmaking and Self-management Principles --- Towards a Secure Network Virtualization Architecture for the Future Internet --- Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures --- Internet of Things --- IoT6 – Moving to an IPv6-Based Future IoT --- SmartSantander: Internet of Things Research and Innovation through Citizen Participation --- A Cognitive Management Framework for Empowering the Internet of Things --- Building Modular Middlewares for the Internet of Things with OSGi --- Towards an Architecture for Future Internet Applications --- ComVantage: Mobile Enterprise Collaboration Reference Framework and Enablers for Future Internet Information Interoperability --- Test-Enabled Architecture for IoT Service Creation and Provisioning --- Enabling Technologies and Economic Incentives Sustainable Wireless Broadband Access to the Future Internet --- The EARTH Project --- An Internet-Based Architecture Supporting Ubiquitous Application User Interfaces --- Cooperative Strategies for Power Saving in Multi-standard Wireless Devices --- Counting the Cost of FIRE: Overcoming Barriers to Sustainable Experimentation Facilities --- User Involvement in Future Internet Projects --- Design and Implementation of Cooperative Network Connectivity Proxy Using Universal Plug and Play --- Book Sponsoring Projects Overview 3DLife - Bringing the Media Internet to Life --- CONCORD Project Management of the Future Internet --- FLAMINGO NoE Project Management of the Future Internet --- The GEYSERS Concept and Major Outcomes --- iCore: A Cognitive Management Framework for the Internet of Things --- IoT6 Project in a Nutshell --- Mobile Cloud Networking: Mobile Network, Compute, and Storage as One Service On-Demand --- The SmartenIT STREP Project: Socially-Aware Management of New Overlay Application Traffic Combined with Energy Efficiency in the Internet --- The SmartSantander Project --- UniverSelf, Realizing Autonomics for Future Networks
    Pages: Online-Ressource (XLIV, 369 pages) , 131 illustrations
    ISBN: 9783642380822
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    Keywords: (GIS) ; Abfrageoptimierung ; Constraint Databases ; Constraint Datenbanken ; Constraint Processing ; Constraint-Verarbeitung ; Geographic Information Systems ; Geoinformationssysteme ; Indexierungstechniken ; Indexing Techniques ; Query Optimization ; database ; optimization ; programming
    Description / Table of Contents: This book constitutes the refereed proceedings of the ESPRIT Working Group CONTESSA Workshop on Constraint Databases and Applications, held in Friedrichshafen, Germany in September 1995. The 10 full revised papers selected for inclusion in this volume are written by and for practitioners, researchers, and application users of core constraint database technology; they can be classified in three sections on expressiveness of the various constraint database models; implementation and optimization issues in areas like spatial databases, geographic information systems, scheduling and routing. This book is the first to focus on the extension of the important new programming paradigm of constraint processing to database design and management.
    Pages: Online-Ressource (VIII, 192 pages)
    ISBN: 9783540494560
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Unknown
    Berlin ; Heidelberg : Springer
    Keywords: Bewegungsanalyse ; Bildfolgen ; Bildverarbeitung ; Image Sequences ; Motion Analysis ; Processing ; Raum-Zeit Bilder ; Space-Time Images ; computer vision ; image processing ; linear optimization
    Description / Table of Contents: Image sequence processing is becoming a tremendous tool to analyze spatio-temporal data in all areas of natural science. It is the key to studythe dynamics of of complex scientific phenomena. Methods from computer science and the field of application are merged establishing new interdisciplinary research areas. This monograph emerged from scientific applications and thus is an example for such an interdisciplinaryapproach. It is addressed both to computer scientists and to researchers from other fields who are applying methods of computer vision. The results presented are mostly from environmental physics (oceanography) but they will be illuminating and helpful for researchers applying similar methods in other areas.
    Pages: Online-Ressource (XIV, 214 pages)
    ISBN: 9783540481454
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Data Encryption ; Information Systems and Communication Service
    Description / Table of Contents: The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, written in a way that makes it easy for them to understand the detailed content of the book. The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed information relating to security. It helps the reader build a strong foundation of information, allowing them to move forward from the book with a larger knowledge base. Security is a constantly growing concern that everyone must deal with. Whether it’s an average computer user or a highly skilled computer user, they are always confronted with different security risks. These risks range in danger and should always be dealt with accordingly. Unfortunately, not everyone is aware of the dangers or how to prevent them and this is where most of the issues arise in information technology (IT). When computer users do not take security into account many issues can arise from that like system compromises or loss of data and information. This is an obvious issue that is present with all computer users. This book is intended to educate the average and experienced user of what kinds of different security practices and standards exist. It will also cover how to manage security software and updates in order to be as protected as possible from all of the threats that they face
    Pages: Online-Ressource (XXIV, 392 pages) , 303 illustrations
    ISBN: 9781430263838
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Keywords: Dokument-Bildanalyse - Engineering Drawings - Erkennungsalgorithmen - Graphics Recognition - Ingenieurzeichnungen ; Landkarteninterpretation ; Map Interpretation ; Recognition Algorithms ; algorithms ; cognition ; construction ; knowledge ; learning ; model ; verificat
    Description / Table of Contents: This book contains revised refereed papers selected from the presentations at the First International Workshop on Graphics Recognition, held in University Park, PA, USA, in August 1995. The 23 full papers included are divided into sections on low-level processing, vectorization and segmentation of scanned graphics documents; symbol and diagram recognition, map processing, interpretation of engineering drawings. Each section contains both survey articles to assess the state of the art, and research papers presenting novel results. One section is devoted to a contest held to determine the best algorithm for detection of dashed lines in drawings. The final chapter summarizes the conclusions and recommendations of the discussions held during the workshop.
    Pages: Online-Ressource (X, 314 pages)
    ISBN: 9783540683872
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Keywords: Computer science ; Computer security ; Data encryption (Computer science) ; Computer Science ; Systems and Data Security ; Data Encryption
    Description / Table of Contents: For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud, and how trusted clouds, that have their integrity rooted in hardware, can address these challenges. This book provides: Use cases and solution reference architectures to enable infrastructure integrity and the creation of trusted pools leveraging Intel Trusted Execution Technology (TXT). Trusted geo-location management in the cloud, enabling workload and data location compliance and boundary control usages in the cloud. OpenStack-based reference architecture of tenant-controlled virtual machine and workload protection in the cloud. A reference design to enable secure hybrid clouds for a cloud bursting use case, providing infrastructure visibility and control to organizations. "A valuable guide to the next generation of cloud security and hardware based root of trust. More than an explanation of the what and how, is the explanation of why. And why you can’t afford to ignore it!" —Vince Lubsey, Vice President, Product Development, Virtustream Inc. " Raghu provides a valuable reference for the new 'inside out' approach, where trust in hardware, software, and privileged users is never assumed—but instead measured, attested, and limited according to least privilege principles." —John Skinner, Vice President, HyTrust Inc. "Traditional parameter based defenses are in sufficient in the cloud. Raghu's book addresses this problem head-on by highlighting unique usage models to enable trusted infrastructure in this open environment. A must read if you are exposed in cloud." —Nikhil Sharma, Sr. Director of Cloud Solutions, Office of CTO, EMC Corporation
    Pages: Online-Ressource (XXVI, 244 pages) , 95 illustrations
    ISBN: 9781430261469
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Unknown
    Berkeley, CA : Apress
    Keywords: Computer science ; Data encryption (Computer science) ; Computers ; Computer Science ; Information Systems and Communication Service ; Data Encryption
    Description / Table of Contents: Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: "Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman." Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel "As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities." Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) "The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come." Dr. Jeremy Bergsman, Practice Manager, CEB     "The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be. We are attacked by professional adversaries who are better funded than we will ever be. We in the information security profession must change as dramatically as the environment we protect. We need new skills and new strategies to do our jobs effectively. We literally need to change the way we think.   Written by one of the best in the business, Managing Risk and Information Security challenges traditional security theory with clear examples of the need for change. It also provides expert advice on how to dramatically increase the success of your security strategy and methods – from dealing with the misperception of risk to how to become a Z-shaped CISO.   Managing Risk and Information Security is the ultimate treatise on how to deliver effective security to the world we live in for the next 10 years. It is absolute must reading for anyone in our profession – and should be on the desk of every CISO in the world."   Dave Cullinane, CISSP CEO Security Starfish, LLC "In this overview, Malcolm Harkins delivers an insightful survey of the trends, threats, and tactics shaping information risk and security. From regulatory compliance to psychology to the changing threat context, this work provides a compelling introduction to an important topic and trains helpful attention on the effects of changing technology and management practices." Dr. Mariano-Florentino Cuéllar Professor, Stanford Law School Co-Director, Stanford Center for International Security and Cooperation (CISAC), Stanford University     "Malcolm Harkins gets it. In his new book Malcolm outlines the major forces changing the information security risk landscape from a big picture perspective, and then goes on to offer effective methods of managing that risk from a practitioner's viewpoint. The combination makes this book unique and a must read for anyone interested in IT risk." Dennis Devlin AVP, Information Security and Compliance, The George Washington University    "Managing Risk and Information Security is the first-to-read, must-read book on information security for C-Suite executives.  It is accessible, understandable and actionable. No sky-is-falling scare tactics, no techno-babble – just straight talk about a critically important subject. There is no better primer on the economics, ergonomics and psycho-behaviourals of security than this." Thornton May, Futurist, Executive Director & Dean, IT Leadership Academy     "Managing Risk and Information Security is a wake-up call for information security executives and a ray of light for business leaders.  It equips organizations with the knowledge required to transform their security programs from a "culture of no" to one focused on agility, value and competitiveness. Unlike other publications, Malcolm provides clear and immediately applicable solutions to optimally balance the frequently opposing needs of risk reduction and business growth. This book should be required reading for anyone currently serving in, or seeking to achieve, the role of Chief Information Security Officer." Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA     "For too many years, business and security – either real or imagined – were at odds. In Managing Risk and Information Security: Protect to Enable, you get what you expect – real life practical ways to break logjams, have security actually enable business, and marries security architecture and business architecture. Why this book?  It's written by a practitioner, and not just any practitioner, one of the leading minds in Security today." John Stewart, Chief Security Officer, Cisco     "This book is an invaluable guide to help security professionals address risk in new ways in this alarmingly fast changing environment. Packed with examples which makes it a pleasure to read, the book captures practical ways a forward thinking CISO can turn information security into a competitive advantage for their business.    This book provides a new framework for managing risk in an entertaining and thought provoking way. This will change the way security professionals work with their business leaders, and help get products to market faster.   The 6 irrefutable laws of information security should be on a stone plaque on the desk of every security professional." Steven Proctor, VP, Audit & Risk Management, Flextronics
    Pages: Online-Ressource (XVII, 152 pages) , 19 illustrations
    ISBN: 9781430251149
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Unknown
    Rijeka : InTech
    Keywords: mobile devices ; wireless devices ; MANET
    Description / Table of Contents: Chapter 1: Data-Gathering and Aggregation Protocol for Networked Carrier Ad Hoc Networks: The Optimal and Heuristic Approach by Chao Gao, Guorong Zhao and Jianhua Lu --- Chapter 2: A Composite Trust Model for Secure Routing in Mobile Ad-Hoc Networks by Rutvij H. Jhaveri, Narendra M. Patel and Devesh C. Jinwala --- Chapter 3: Performance Analysis of Three Routing Protocols in MANET Using the NS-2 and ANOVA Test with Varying Speed of Nodes by Subhrananda Goswami, Subhankar Joardar, Chandan Bikash Das, Samarajit Kar and Dibyendu Kumar Pal --- Chapter 4: Cooperative Routing in Multi-Radio Multi-Hop Wireless Network by Kun Xie, Shiming He, Xin Wang, Dafang Zhang and Keqin Li --- Chapter 5: MANET Network in Internet of Things System by Rasa Bruzgiene, Lina Narbutaite and Tomas Adomkus --- Chapter 6: Radio Frequency-Based Indoor Localization in Ad-Hoc Networks by Mehdi Golestanian, Joshua Siva and Christian Poellabauer
    Pages: Online-Ressource (146 Seiten)
    ISBN: 9789535131106
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Unknown
    Rijeka : InTech
    Keywords: computer modelling ; computer simulation
    Description / Table of Contents: Chapter 1: Modelling and Simulation of Complex Adaptive System: The Diffusion of Socio-Environmental Innovation in the RENDRUS Network by Aida Huerta Barrientos and Yazmin Dillarza Andrade --- Chapter 2: Rendering Techniques in 3D Computer Graphics Based on Changes in the Brightness of the Object Background by Nika Bratuž, Helena Gabrijelčič Tomc and Dejana Javoršek --- Chapter 3: Modelling and Visualisation of the Optical Properties of Cloth by Tanja Nuša Kočevar and Helena Gabrijelčič Tomc --- Chapter 4: Textile Forms’ Computer Simulation Techniques by Andreja Rudolf, Slavica Bogović, Beti Rogina Car, Andrej Cupar, Zoran Stjepanovič and Simona Jevšnik --- Chapter 5: Computer Simulation of Bioprocess by Jianqun Lin, Ling Gao, Huibin Lin, Yilin Ren, Yutian Lin and Jianqiang Lin --- Chapter 6: Developing a Hybrid Model and a Multi-Scale 3D Concept of Integrated Modelling High-Temperature Processes by Marcin Hojny --- Chapter 7: Computer-Aided Physical Simulation of the Soft-Reduction and Rolling Process by Marcin Hojny --- Chapter 8: Surrogate Modelling with Sequential Design for Expensive Simulation Applications by Joachim van der Herten, Tom Van Steenkiste, Ivo Couckuyt and Tom Dhaene --- Chapter 9: Computer Simulation of High-Frequency Electromagnetic Fields by Andrey D. Grigoriev --- Chapter 10: Modeling and Simulation of Task Allocation with Colored Petri Nets by Mildreth Alcaraz-Mejia, Raul Campos-Rodriguez and Marco Caballero-Gutierrez --- Chapter 11: Multi-Criteria Decision-Making in the Implementation of Renewable Energy Sources by Dejan Jovanovic and Ivan Pribicevic
    Pages: Online-Ressource (264 Seiten)
    ISBN: 9789535132066
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Unknown
    Rijeka : InTech
    Keywords: Cloud computing ; Internet of Things
    Description / Table of Contents: Chapter 1: State-of-the-Art Antenna Technology for Cloud Radio Access Networks (C-RANs) by Waleed Tariq Sethi, Abdullah Alfakhri, Muhammad Ahmad Ashraf, Amr G. Alasaad and Saleh Alshebeili --- Chapter 2: Cloud Computing for Next-Generation Sequencing Data Analysis by Shanrong Zhao, Kirk Watrous, Chi Zhang and Baohong Zhang --- Chapter 3: Green-Aware Virtual Machine Migration Strategy in Sustainable Cloud Computing Environments by Xiaoying Wang, Guojing Zhang, Mengqin Yang and Lei Zhang --- Chapter 4: M-ary Optical Computing by Jian Wang and Yun Long --- Chapter 5: Networking Solutions for Integrated Heterogeneous Wireless Ecosystem by Roman Florea, Aleksandr Ometov, Adam Surak, Sergey Andreev and Yevgeni Koucheryavy
    Pages: Online-Ressource (138 Seiten)
    ISBN: 9789535132448
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Keywords: Computer science ; Computer communication systems ; Software engineering ; Mathematical statistics ; Computers ; Artificial intelligence ; Computer graphics ; Computer Science ; Information Systems and Communication Service ; Artificial Intelligence (incl. Robotics) ; Computer Communication Networks ; Software Engineering/Programming and Operating Systems ; Probability and Statistics in Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Smart algorithms --- Data classification and processing --- Stochastic modelling --- Performance evaluation --- Queuing systems --- Wireless networks and security --- Image processing and computer vision
    Pages: Online-Ressource (XIII, 278 pages) , 75 illustrations
    ISBN: 9783319472171
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    Keywords: Computer science ; Software engineering ; Computers ; Law and legislation ; Management information systems ; Computer Science ; Management of Computing and Information Systems ; Software Engineering ; Legal Aspects of Computing ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: This book is open access under a CC BY license. This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017. The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, and practices; case studies; projects, communication, and participation; tools; and project management, development and evaluation
    Pages: Online-Ressource (XIV, 220 pages) , 37 illustrations
    ISBN: 9783319577357
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Keywords: Computer science ; Production management ; Management information systems ; Special purpose computers ; Software engineering ; Application software ; Computer Science ; Information Systems Applications (incl. Internet) ; Business IT Infrastructure ; Computer Appl. in Administrative Data Processing ; Operations Management ; Software Engineering ; Special Purpose and Application-Based Systems
    Description / Table of Contents: Introduction to the Internet of Things --- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project --- The IoT Architectural Reference Model as Enabler --- IoT in Practice: Examples — IoT in Logistics and Health --- IoT — A Guidance to the ARM --- A Process to Generate Concrete Architectures --- IoT Reference Model --- IoT Reference Architecture --- The IoT ARM Reference Manual --- Interactions --- Toward a Concrete Architecture --- ARM Testimonials --- Summary and Outlook
    Pages: Online-Ressource (X, 349 pages) , 131 illustrations, 116 illustrations in color
    ISBN: 9783642404030
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Keywords: Computer science ; Computers ; Computer simulation ; Application software ; Bioinformatics ; Computer Science ; Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities
    Description / Table of Contents: Natural Computing --- Ethological response to periodic stimulation in Chara and Brepharisma --- Adaptive path-finding and transport network formation by the amoeba-like organism Physarum --- Aggregate "Calculation" in Economic Phenomena: Distributions and Fluctuations --- Towards Co-evolution of Information, Life and Artifcial Life --- Harness the Nature for Computation --- Things Theory of Art Should Learn From Natural Computing --- Study on the use of Evolutionary Techniques for inference in Gene Regulatory Networks --- Reconstruction of Gene Regulatory Networks from Gene Expression Data using Decoupled Recurrent Neural Network Model --- Design and control of synthetic biological systems --- Satellite Symposium on Computational Aesthetics --- Preface–Natural Computing and Computational Aesthetics --- The Significance of Natural Computing for Considering Computational Aesthetics of Nature --- Perceiving the Gap: asynchronous coordination of plural algorithms and disconnected logical types in ambient space --- Aesthetic Aspects of Technology-mediated Self-awareness Experiences
    Pages: Online-Ressource (XII, 155 pages) , 64 illustrations
    ISBN: 9784431543947
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    Unknown
    Rijeka : InTech
    Keywords: wireless ; sensor networks ; mobile wireless ; connectivity
    Description / Table of Contents: Chapter 1: Mobile Wireless Sensor Networks: An Overview by Velmani Ramasamy --- Chapter 2: Routing Protocols for Wireless Sensor Networks (WSNs) by Noman Shabbir and Syed Rizwan Hassan --- Chapter 3: Gradient Descent Localization in Wireless Sensor Networks by Nuha A.S. Alwan and Zahir M. Hussain --- Chapter 4: A Novel Hybrid Methodology Applied Optimization Energy Consumption in Homogeneous Wireless Sensor Networks by Plácido Rogerio Pinheiro, Álvaro Meneses Sobreira Neto, Alexei Barbosa Aguiar and Pedro Gabriel Calíope Dantas Pinheiro --- Chapter 5: WSN in Conservation Management by Akbar Ghobakhlou and Shane Inder --- Chapter 6: Recent Advances on Implantable Wireless Sensor Networks by Hugo Dinis and Paulo M. Mendes --- Chapter 7: Low-Cost Energy-Efficient Air Quality Monitoring System Using Wireless Sensor Network by Kavi Kumar Khedo and Vishwakarma Chikhooreeah --- Chapter 8: Modern Clustering Techniques in Wireless Sensor Networks by I.S. Akila, S.V. Manisekaran and R. Venkatesan --- Chapter 9: Fuzzy Adaptive Setpoint Weighting Controller for WirelessHART Networked Control Systems by Sabo Miya Hassan, Rosdiazli Ibrahim, Nordin Saad, Vijanth Sagayan Asirvadam, Kishore Bingi and Tran Duc Chung --- Chapter 10: A Hybrid Sink Repositioning Technique for Data Gathering in Wireless Sensor Networks by Prerana Shrivastava
    Pages: Online-Ressource (206 Seiten)
    ISBN: 9789535135623
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    Keywords: Computer science ; Research ; Moral and ethical aspects ; Computers ; Computers and civilization ; Computer Science ; Computers and Society ; History of Computing ; Diversity Management/Women in Business ; Research Ethics
    Description / Table of Contents: Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science --- On the Big Impact of “Big Computer Science” --- On Informatics, Diamonds and T --- Leadership and Balance in Research --- Rational ethics --- Ethics for the digital age: where are the moral specs? --- Digital Sovereignty and IT-Security for a Prosperous Society --- Women in Computing and the contingency of informatics cultures --- Ada - poet of computing
    Pages: Online-Ressource (XI, 109 pages) , 22 illustrations in color
    ISBN: 9783319557359
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Keywords: Computer science ; Management ; Industrial management ; Information storage and retrieval ; Application software ; Computers and civilization ; Computer Science ; Information Storage and Retrieval ; Innovation/Technology Management ; Computer Applications ; Computers and Society
    Description / Table of Contents: Part I: The Big Data Opportunity --- The Big Data Value Opportunity --- Introduction to the BIG Project --- Part II: The Big Data Value Chain: Enabling and Value Creating Technologies --- The Big Data Value Chain: Definitions, Concepts, and Theoretical Approaches --- Big Data Acquisition --- Big Data Analysis --- Big Data Curation --- Big Data Storage --- Big Data Usage --- Part III: Usage and Exploitation of Big Data --- Big Data Driven Innovation in Industrial Sectors --- Big Data in the Health Sector --- Big Data in the Public Sector --- Big Data in the Finance and Insurance Sectors --- Big Data in the Energy and Transport Sectors --- Big Data in the Media and Entertainment Sectors --- Part IV: A Roadmap for Big Data Research --- Cross-Sectorial Requirements Analysis for Big Data Research --- New Horizons for a Data-Driven Economy: Roadmaps and Action Plans for Technology, Businesses, Policy, and Society.                        
    Pages: Online-Ressource (XX, 303 pages) , 34 illustrations
    ISBN: 9783319215693
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Unknown
    Cham : Springer
    Keywords: Computer science ; Artificial intelligence ; Algorithms ; Robotics ; Automation ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Algorithms ; Robotics and Automation
    Description / Table of Contents: Robots and their Applications --- Sensors --- Reactive Behavior --- Finite State Machines --- Robotic Motion and Odometry --- Control --- Local Navigation: Obstacle Avoidance --- Localization --- Mapping --- Mapping-based Navigation --- Fuzzy Logic Control --- Image Processing --- Neural Networks --- Machine Learning --- Swarm Robotics --- Kinematics of a Robotic Manipulator --- Appenix A:Units of Measurement --- Appendix B:Mathematical Derivations and Tutorials --- Index
    Pages: Online-Ressource (XVI, 308 pages) , 198 illustrations, 76 illustrations in color
    ISBN: 9783319625331
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Keywords: Computer science ; Management information systems ; Computer engineering ; Economic policy ; Computer Science ; Privacy ; Computer Engineering ; Management of Computing and Information Systems ; Governance and Government ; R & D/Technology Policy
    Description / Table of Contents: 1 Introduction --- 2 Trust --- 3 What is an ICT-System? --- 4 Development of ICT Systems --- 5 Theoretical Foundation --- 6 Reverse Engineering of Code --- 7 Static Detection of Malware --- 8 Dynamic Detection Methods --- 9 Formal Methods --- 10 Software Quality and Quality Management --- 11 Containment of Untrusted Modules --- 12 Summary and Way Forward
    Pages: Online-Ressource (XIV, 116 pages) , 6 illustrations, 5 illustrations in color
    ISBN: 9783319749501
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Keywords: Computer science ; Logic design ; Computer organization ; Operating systems (Computers) ; Computers ; Computer Science ; Computing Methodologies ; Computer Systems Organization and Communication Networks ; Operating Systems ; Logic Design ; Information Systems and Communication Service
    Description / Table of Contents: HHVSF: A Framework to Accelerate Drug-based High-throughput Virtual Screening on High-Performance Computers --- HBasechainDB --- A Scalable Blockchain Framework on Hadoop Ecosystem --- DETOUR: A Large-Scale Non-Blocking Optical Data Center Fabric --- Querying Large Scientific Data Sets with Adaptable IO System ADIOS --- On the Performance of Spark on HPC Systems: Towards a Complete Picture --- Experiences of Converging Big Data Analytics Frameworks with High Performance Computing Systems --- MACC : An OpenACC Transpiler for Automatic Multi-GPU Use --- Acceleration of Wind Simulation using Locally Mesh-Refined Lattice Boltzmann Method on GPU-Rich supercomputers --- Architecture of an FPGA-Based Heterogeneous System for Code-Search Problems --- TINS: A Task-Based Dynamic Helper Core Strategy for In Situ Analytics --- Machine Learning Predictions for Underestimation of Job Runtime on HPC System --- A Power Management Framework with Simple DSL for Automatic Power-Performance Optimization on Power-Constrained HPC Systems --- Scalable Data Management of the Uintah Simulation Framework for Next-Generation Engineering Problems with Radiation --- High performance LOBPCG method for solving multiple eigenvalues of Hubbard model: Efficiency of communication avoiding Neumann expansion preconditioner --- Application of a preconditioned Chebyshev basis communication-avoiding conjugate gradient method to a multiphase thermal-hydraulic CFD code --- Optimization of Hierarchical matrix computation on GPU
    Pages: Online-Ressource (X, 293 pages) , 121 illustrations
    ISBN: 9783319699530
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Data encryption (Computer science) ; Computer Science ; Security ; Information Systems Applications (incl. Internet) ; Data Encryption ; Special Purpose and Application-Based Systems ; Computer Communication Networks
    Description / Table of Contents: Security of distributed interconnected systems --- Security of software systems --- Security of the Internet of Things
    Pages: Online-Ressource (XII, 159 pages) , 33 illustrations
    ISBN: 9783319951898
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    Unknown
    Cham : Springer
    Keywords: Software engineering ; Management information systems ; Information Systems ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: 1 The Leading Role of Software and Systems Architecture in the Age of Digitization --- 2 Formal Methods and Agile Development: Towards a Happy Marriage --- 3 Escaping Method Prison – On the Road to Real Software Engineering --- 4 What is software?: The Role of Empirical Methods in Answering the Question --- 5 Only the Architecture You Need --- 6 Variability in standard software products Introducing software product line engineering to the insurance industry --- 7 Using Design Thinking for Requirements Engineering in the Context of Digitalization and Digital Transformation – a Motivation and an Experience Report --- 8 Towards Deviceless Edge Computing: Challenges, Design Aspects & Models for Serverless paradigm at the Edge --- 9 Data-driven decisions and actions in today’s software development --- 10 Software Architecture: Past, Present, Future --- 11 Software Product Lines --- 12 Enabling Flexible and Robust Business Process Automation for the Agile Enterprise --- 13 Achievements, Failures, and the Future of Model-based Software Engineering
    Pages: Online-Ressource (XV, 236 pages) , 98 illustrations, 51 illustrations in color
    ISBN: 9783319738970
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Keywords: Computer science ; Computer communication systems ; Special purpose computers ; Computer system failures ; Coding theory ; E-commerce ; Computer Science ; Computer Communication Networks ; System Performance and Evaluation ; Special Purpose and Application-Based Systems ; Information Systems Applications (incl. Internet) ; Coding and Information Theory ; e-Commerce/e-business
    Description / Table of Contents: State-of-the-Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services --- Context Monitoring for Improved System Performance and QoE --- QoE Management for Future Networks --- Scalable Traffic Quality and System Efficiency Indicators towards Overall Telecommunication System's QoE Management --- Lag Compensation for First Person Shooter Games in Cloud Gaming --- The Value of Context-awareness in Bandwidth-challenging HTTP Adaptive Streaming Scenarios --- Conceptual and Analytical Models for Predicting the Quality of Service of Overall Telecommunication Systems --- QoS-based Elasticity for Service Chains in Distributed Edge Cloud Environments --- Integrating SDN and NFV with QoS-aware Service Composition --- Energy vs. QoX Network- and Cloud Services Management --- Traffic Management for Cloud Federation --- Efficient Simulation of IoT Cloud Use Cases --- Security of Internet of Things for Reliable Internet of Services --- TCP performance over current cellular access: A comprehensive analysis
    Pages: Online-Ressource (XVI, 401 pages) , 120 illustrations
    ISBN: 9783319904153
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XX, 545 pages) , 106 illustrations
    ISBN: 9783319961422
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Keywords: Computer science ; Computer graphics ; Computer Science ; Computer Imaging, Vision, Pattern Recognition and Graphics
    Description / Table of Contents: Introduction --- System Theory --- Image Processing --- Endoscopy --- Microscopy --- Magnetic Resonance Imaging --- X-ray Imaging --- Computed Tomography --- X-ray Phase Contrast: Research on a Future Imaging Modality --- Emission Tomography --- Ultrasound --- Optical Coherence Tomography --- Acronyms.
    Pages: Online-Ressource (X, 259 pages) , 167 illustrations
    ISBN: 9783319965208
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Keywords: Computer science ; Software engineering ; Algorithms ; Computer logic ; Mathematical logic ; Artificial intelligence ; Computer simulation ; Computer Science ; Logics and Meanings of Programs ; Software Engineering ; Artificial Intelligence (incl. Robotics) ; Mathematical Logic and Formal Languages ; Algorithm Analysis and Problem Complexity ; Simulation and Modeling
    Description / Table of Contents: This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference on Computer Aided Verification, CAV 2018, held in Oxford, UK, in July 2018. The 52 full and 13 tool papers presented together with 3 invited papers and 2 tutorials were carefully reviewed and selected from 215 submissions. The papers cover a wide range of topics and techniques, from algorithmic and logical foundations of verication to practical applications in distributed, networked, cyber-physical, and autonomous systems. They are organized in topical sections on model checking, program analysis using polyhedra, synthesis, learning, runtime verification, hybrid and timed systems, tools, probabilistic systems, static analysis, theory and security, SAT, SMT and decisions procedures, concurrency, and CPS, hardware, industrial applications
    Pages: Online-Ressource (XIX, 703 pages) , 146 illustrations
    ISBN: 9783319961453
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Robotics ; Automation ; Industrial engineering ; Production engineering ; Engineering economics ; Engineering economy ; Manufacturing industries ; Machines ; Tools ; Engineering ; Industrial and Production Engineering ; Robotics and Automation ; Engineering Economics, Organization, Logistics, Marketing ; Manufacturing, Machines, Tools ; Information Systems Applications (incl. Internet)
    Description / Table of Contents: Einordnung und Hintergründe --- Positionen der Sozialpartner --- Erfahrungen und Herausforderungen in der Industrie --- Forschungsfragen und Entwicklungsstrategien --- Ausblick
    Pages: Online-Ressource (VIII, 167 Seiten) , 38 Abbildungen
    ISBN: 9783662459157
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Computers ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Information Systems and Communication Service ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Seit Jahren wird unser Alltag geprägt von zunehmender Automation und Vernetzung, die Digitalisierung genannt wird. Sensoren erfassen immer mehr unterschiedliche Daten und werden von intelligenten Algorithmen zunehmend präzisier analysiert. Dies führt nicht nur zu einem anderen Verhältnis im Umgang und bei der Nutzung von Daten durch Menschen und Maschinen, sondern wird auch dramatisch Aufgaben und Prozesse verändern. Die damit verbundenen Arbeitsanforderungen werden zum massiven Wandel von Berufsbildern führen, in dem einfache Tätigkeiten automatisiert und komplexe Tätigkeiten vereinfacht werden. Nicht nur das Arbeiten sondern auch das Lernen, Lehren und Forschen verändert sich durch die Digitalisierung. Die technischen Möglichkeiten wandeln die Lebenswelten mit ihren urbanen Versorgungs- und Infrastrukturen und eröffnen den Wirtschaftsräumen neue Geschäftsmodelle. Diese parallel einsetzenden Entwicklungen führen zu radikalen Umbrüchen, die in den kommenden Jahren sämtliche Aspekte der Gesellschaft verändern werden
    Pages: Online-Ressource (IX, 199 Seiten)
    ISBN: 9783662528549
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    Keywords: Engineering ; Commercial law ; Automotive engineering ; Robotics ; Automation ; Community psychology ; Environmental psychology ; Engineering ; Automotive Engineering ; Robotics and Automation ; Community and Environmental Psychology ; Commercial Law
    Description / Table of Contents: Teil I Human and Machine --- Teil II Mobilität --- Teil III Verkehr --- Teil IV Sicherheit --- Teil V Recht und Haftung --- Teil VI Akzeptanz
    Pages: Online-Ressource (XIV, 732 Seiten)
    ISBN: 9783662458549
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Humanities ; Digital libraries ; Educational technology ; Electrical engineering ; Engineering ; Communications Engineering, Networks ; Digital Humanities ; Technology and Digital Education
    Description / Table of Contents: Vorwort --- Einleitung --- Bürger --- Wenn Bots sich unter Leute mischen: Social Bots in den Sozialen Medien --- Digitale Partizipation in Wissenschaft und Wirtschaft --- Entwicklung einer soziodigitalen Souveränität --- Unternehmen --- Digitale Souveränität – ein mehrdimensionales Handlungskonzept für die deutsche Wirtschaft --- Privatheit und digitale Souveränität in der Arbeitswelt 4.0 --- Staat --- Mehr Daten, weniger Vertrauen in Statistik – freie Fahrt für ‚alternative Fakten‘? --- Internationale Perspektiven auf digitale Souveränität --- Digitalisierung der Bildung als staatliche Aufgabe --- Ausblick
    Pages: Online-Ressource (IX, 187 Seiten) , 40 Abbildungen in Farbe
    ISBN: 9783662557969
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    Keywords: Engineering ; Project management ; Engineering design ; Automotive Engineering ; Project Management ; Engineering Design
    Description / Table of Contents: A - Die Entwicklung: Drei Erfolgsstories --- Die StreetScooter-Gründer-Story --- Die StreetScooter-Meilensteine 2008-2017 --- Die StreetScooter-Entwicklungsstory --- Die StreetScooter-Protagonisten-Story --- B - Die Lösung: Return on Engineering: Die StreetScooter-Lösungsbausteine. C - Die Perspektive: Die StreetScooter-Netzwerk-Story --- Die StreetScooter-Produktions-Story --- Die StreetScooter-Post-Story --- Die StreetScooter-Mobilitätslösung --- Die StreetScooter-Vision. A - The Development: Three Stories of Success --- The StreetScooter Founder Story --- The StreetScooter Milestones 2008-2017 --- The StreetScooter Development Story --- The StreetScooter Protagonists Story --- B - The Solution: Return on Engineering: The StreetScooter Building Blocks --- C - The Perspective: The StreetScooter Network Story --- The StreetScooter Production Story --- The StreetScooter Post Story --- The StreetScooter Mobility Solution --- The StreetScooter Vision
    Pages: Online-Ressource (VII, 213 Seiten)
    ISBN: 9783662549971
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Keywords: Computer science ; Management ; Industrial management ; Information technology ; Business ; Data processing ; Computers ; Computer Science ; Information Systems and Communication Service ; Innovation/Technology Management ; IT in Business
    Description / Table of Contents: Modelle --- Modellierungssprachen --- Vorgehensweise von der Modellbildung zur Digitalisierung --- Vorbereitung der Prozessimplementierung --- Umsetzung --- Praxisbeispiel
    Pages: Online-Ressource (X, 254 Seiten) , 143 Abbildungen, 69 Abbildungen in Farbe
    ISBN: 9783658226480
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Unknown
    Berlin, Heidelberg : Springer Vieweg
    Keywords: Engineering ; Robotics ; Automation ; Industrial engineering ; Production engineering ; Economic sociology ; Engineering ; Industrial and Production Engineering ; Organizational Studies, Economic Sociology ; Robotics and Automation
    Description / Table of Contents: Einleitung --- Prognostizierte Veränderungen der gestaltbaren Arbeitssystemdimensionen --- Systeme zur Assistenz und Effizienzsteigerung in manuellen Produktionsprozessen der Industrie auf Basis von Projektion und Tiefendatenerkennung --- Betriebliche Auswirkungen industrieller Servicerobotik am Beispiel der Kleinteilemontage --- Erweiterte Horizonte – Ein technischer Blick in die Zukunft der Arbeit --- Soziotechnische Assistenzsysteme für die Produktionsarbeit in der Textilbranche --- Lernförderliche Arbeitssysteme für die Arbeitswelt von morgen --- Assistenz und Wissensvermittlung am Beispiel von Montage- und Instandhaltungstätigkeiten --- Der Mensch in Interaktion mit autonomen Planungs- und Steuerungssystemen für Cyber-Physische Produktionssysteme --- ReApp – Wiederverwendbare Roboterapplikationen für flexible Roboteranlagen - Auswirkungen der Ergebnisse aus ReApp auf betriebliche Funktionen am Beispiel eines Anwendungsfalls in der Elektroindustrie --- Modellierungsansatz für ein arbeitsplatznahes Beschreibungsmodell der »Arbeitswelt Industrie 4.0 --- Die Zukunft der Arbeit im demografischen Wandel --- “Social Manufacturing and Logistics“ – Arbeit in der digitalisierten Produktion --- Lernförderliche Arbeitsorganisation in der Industrie 4.0 --- Decision Support Pipelines – Durchgängige Datenverarbeitungsinfrastrukturen für die Entscheidungen von morgen --- Gerechtigkeit in flexiblen Arbeits- und Managementprozessen --- Technologie, Organisation, Qualifikation
    Pages: Online-Ressource (XI, 246 Seiten) , 62 Abbildungen, 56 Abbildungen in Farbe
    ISBN: 9783662492666
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    Unknown
    Global Text Project
    Keywords: Introduction to Data Mining and CRISP-DM 3 ; Organizational Understanding and Data Understanding ; Data Preparation ; Correlation ; Association Rules ; k-Means Clustering ; Discriminant Analysis ; Linear Regression ; Logistic Regression ; Decision Trees ; Neural Networks ; Text Mining ; Evaluation and Deployment ; Data Mining Ethics
    Description / Table of Contents: Data mining as a discipline is largely invisible; we rarely notice that it’s happening. But when we sign up for a credit card, make an online purchase, or use the internet, we are generating data stored in massive data warehouses. Inside this data lies indicators of our interests, our habits, and our behaviors. Data mining allows people to find and understand those patterns to make informed decisions and better serve their customers. But there are also worries about the practice of data mining. Privacy groups are vocal about companies who hoard vast quantities of data, some of which can be personal. The intent of this book is to introduce you to concepts and practices common in data mining.
    Pages: Online-Ressource (XII, 252 pages) , illustrations, diagrams
    ISBN: 9780615684376
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Unknown
    San Rafael, California : Morgan & Claypool
    Keywords: web technology ; databases ; linked data ; web of data ; semantic web ; world wide web ; dataspaces ; data integration ; data management ; web engineering ; resource description framework
    Description / Table of Contents: Preface --- Chapter 1 Introduction --- 1.1 The Data Deluge --- 1.2 The Rationale for Linked Data --- 1.2.1 Structure Enables Sophisticated Processing --- 1.2.2 Hyperlinks Connect Distributed Data --- 1.3 From Data Islands to a Global Data Space --- 1.4 Introducing Big Lynx Productions --- Chapter 2 Principles of Linked Data --- 2.1 The Principles in a Nutshell --- 2.2 Naming Things with URIs --- 2.3 Making URIs Defererenceable --- 2.3.1 303 URIs --- 2.3.2 Hash URIs --- 2.3.3 Hash versus 303 --- 2.4 Providing Useful RDF Information --- 2.4.1 The RDF Data Model --- 2.4.2 RDF Serialization Formats --- 2.5 Including Links to other Things --- 2.5.1 Relationship Links --- 2.5.2 Identity Links --- 2.5.3 Vocabulary Links --- 2.6 Conclusions --- Chapter 3 The Web of Data --- 3.1 Bootstrapping the Web of Data --- 3.2 Topology of the Web of Data --- 3.2.1 Cross-Domain Data --- 3.2.2 Geographic Data --- 3.2.3 Media Data --- 3.2.4 Government Data --- 3.2.5 Libraries and Education --- 3.2.6 Life Sciences Data --- 3.2.7 Retail and Commerce --- 3.2.8 User Generated Content and Social Media --- 3.3 Conclusions --- Chapter 4 Linked Data Design Considerations --- 4.1 Using URIs as Names for Things --- 4.1.1 Minting HTTP URIs --- 4.1.2 Guidelines for Creating Cool URIs --- 4.1.3 Example URIs --- 4.2 Describing Things with RDF --- 4.2.1 Literal Triples and Outgoing Links --- 4.2.2 Incoming Links --- 4.2.3 Triples that Describe Related Resources --- 4.2.4 Triples that Describe the Description --- 4.3 Publishing Data about Data --- 4.3.1 Describing a Data Set --- 4.3.2 Provenance Metadata --- 4.3.3 Licenses, Waivers and Norms for Data --- 4.4 Choosing and Using Vocabularies --- 4.4.1 SKOS, RDFS and OWL --- 4.4.2 RDFS Basics --- 4.4.3 A Little OWL --- 4.4.4 Reusing Existing Terms --- 4.4.5 Selecting Vocabularies --- 4.4.6 Defining Terms --- 4.5 Making Links with RDF --- 4.5.1 Making Links within a Data Set --- 4.5.2 Making Links with External Data Sources --- 4.5.3 Setting RDF Links Manually --- 4.5.4 Auto-generating RDF Links --- Chapter 5 Recipes for Publishing Linked Data --- 5.1 Linked Data Publishing Patterns --- 5.1.1 Patterns in a Nutshell --- 5.1.2 Additional Considerations --- 5.2 The Recipes --- 5.2.1 Serving Linked Data as Static RDF/XML Files --- 5.2.2 Serving Linked Data as RDF Embedded in HTML Files --- 5.2.3 Serving RDF and HTML with Custom Server-Side Scripts --- 5.2.4 Serving Linked Data from Relational Databases --- 5.2.5 Serving Linked Data from RDF Triple Stores --- 5.2.6 Serving Linked Data by Wrapping Existing Application or Web APIs --- 5.3 Additional Approaches to Publishing Linked Data --- 5.4 Testing and Debugging Linked Data --- 5.5 Linked Data Publishing Checklist --- Chapter 6 Consuming Linked Data --- 6.1 Deployed Linked Data Applications --- 6.1.1 Generic Applications --- 6.1.2 Domain-specific Applications --- 6.2 Developing a Linked Data Mashup --- 6.2.1 Software Requirements --- 6.2.2 Accessing Linked Data URIs --- 6.2.3 Representing Data Locally using Named Graphs --- 6.2.4 Querying Local Data with SPARQL --- 6.3 Architecture of Linked Data Applications --- 6.3.1 Accessing the Web of Data --- 6.3.2 Vocabulary Mapping --- 6.3.3 Identity Resolution --- 6.3.4 Provenance Tracking --- 6.3.5 Data Quality Assessment --- 6.3.6 Caching Web Data Locally --- 6.3.7 Using Web Data in the Application Context --- 6.4 Effort Distribution between Publishers, Consumers and Third Parties --- Chapter 7 Summary and Outlook --- Footnotes --- References --- Authors' Biographies
    Pages: Online-Ressource (XI, 122 pages) , illustrations
    ISBN: 9781608454310
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Unknown
    Bonn : Galileo Press
    Keywords: Shell ; Shellscript
    Description / Table of Contents: In den ersten zehn Kapiteln des Buches erfahren Sie alles, was Sie zur Shell-Programmierung wissen müssen. Weitere Kapitel gehen auf die unverzichtbaren Tools grep, sed und awk ein, die in Kombination (oder auch allein) mit der Shellscript-Programmierung zu wertvollen Helfern werden können.
    Pages: Online-Ressource (782 Seiten)
    Edition: 1. Aufl.
    ISBN: 3898426831
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Unknown
    Bonn : Galileo Press
    Keywords: LINUX ; UNIX ; SHELL ; Systemprogrammierung
    Description / Table of Contents: Dieses umfassende Handbuch bietet Ihnen nahezu vollständiges Linux-Wissen. Es erklärt, wie man Linux als leistungsstarke Workstation nutzen kann und widmet sich ausführlich professionelleren Themen wie Administration des Systems, Shell, Netzwerkkonfiguration und Sicherheit. Das Buch ist geeignet für Nutzer aller gängigen Linux-Distributionen. Die beiliegenden Multiboot-DVDs enthalten eine große Auswahl an Linux-Systemen. Das Buch ist konsequent praxisnah geschrieben, immer verständlich und sehr gründlich in der Behandlung aller Themen. Diese 5. Auflage wurde umfassend aktualisiert und verbessert. Sowohl Einsteiger als auch Profis werden von diesem kompetenten Handbuch profitieren.
    Pages: Online-Ressource (1282 Seiten)
    Edition: 5., akt. Aufl.
    ISBN: 9783836218221
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Unknown
    Bonn : Galileo Press
    Keywords: Visual C sharp 2008 ; .NET
    Description / Table of Contents: Dieses Buch bietet Ihnen einen gründlichen und umfassenden Einstieg in die C#-Programmierung. Der erste Teil enthält eine Einführung in .NET, Visual Studio 2008, C# und die objektorientierte Programmierung. Hier werden besonders Einsteiger angesprochen, die noch nicht objektorientiert unter .NET programmiert haben. Im zweiten Teil werden elementare Klassen und Programmiertechniken vorgestellt. Daran schließt sich die Windows-Programmierung an. Großen Raum nimmt die Entwicklung von grafischen Benutzerschnittstellen mit der neuen Windows Presentation Foundation, kurz WPF, ein. Auch ADO.NET und LINQ sind wichtige Themen des Buches.
    Pages: Online-Ressource (1365 Seiten)
    Edition: 4., akt. und erw. Aufl.
    ISBN: 9783836211727
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Unknown
    Beijing : O'Reilly
    Keywords: Mason ; Perl ; HTML
    Pages: Online-Ressource (297 Seiten)
    Edition: 1st ed.
    ISBN: 0596002254
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Keywords: GNU ; GNU Emacs ; Make ; Utilities
    Pages: Online-Ressource (280 Seiten)
    Edition: 3rd ed., completely rev. & updated
    ISBN: 0596006101
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Keywords: LINUX ; Operating systems
    Pages: Online-Ressource (474 Seiten)
    Edition: 2nd ed.
    ISBN: 1565924002
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Unknown
    Beijing : O'Reilly
    Keywords: Open Source ; Urheberrecht ; Copyright
    Pages: Online-Ressource (193 Seiten)
    Edition: 1st ed.
    ISBN: 0596005814
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Unknown
    Bonn : Galileo Press
    Keywords: Adobe Photoshop CS2
    Description / Table of Contents: Sie kennen sich mit Photoshop gut aus, suchen aber noch Tipps und Tricks für einen produktiveren Einsatz? Dieses Buch bietet reines Profiwissen! Im Fokus stehen hier Techniken für Fortgeschrittene, Hilfestellungen für einen effektiven Workflow und Tipps zur Automatisierung und Optimierung. So finden Sie Profiwissen z.B. zu den Themen Auswahlen, Effekte, Dritthersteller-Tools, Druckausgabe, Farbmanagement, Workflow, Bridge, Skripte, CameraRAW, Probleme mit Digitalfotos und vieles mehr. Grundlagenwissen wird hier nicht mehr erläutert! Ein Buch, das zum Schmökern einlädt und viele erhellende Zusammenhänge aufzeigt, Ihnen aber besonders hilft, Zeit zu sparen!
    Pages: Online-Ressource (508 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783898427005
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Unknown
    Beijing : O'Reilly
    Keywords: DocBook
    Pages: Online-Ressource (635 Seiten)
    Edition: 1st ed.
    ISBN: 1565925807
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Unknown
    Köln : O'Reilly
    Keywords: Open Source
    Pages: Online-Ressource (59 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897212226
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Unknown
    Beijing : O'Reilly
    Keywords: Ruby on Rails
    Pages: Online-Ressource (346 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783897214767
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Keywords: LINUX
    Pages: Online-Ressource (430 Seiten)
    Edition: 1. Aufl.
    ISBN: 3897214164
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Keywords: Spam-Mail ; Computervirus ; Mail-Filter ; Open Source
    Pages: Online-Ressource (351 Seiten)
    Edition: 1. Aufl.
    ISBN: 389721377X
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Unknown
    Beijing : O'Reilly
    Keywords: MySQL 5.0 ; MySQL 5.1 ; PHP 5.2
    Pages: Online-Ressource (349 Seiten)
    Edition: 2. Aufl.
    ISBN: 9783897217171
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    Unknown
    Beijing : O'Reilly
    Keywords: Internet ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Firewall ; Electronic Banking ; Passwort ; Zugriffskontrolle
    Pages: Online-Ressource (349 Seiten)
    Edition: 3. Aufl.
    ISBN: 9783897217157
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Keywords: Kultur ; Internet ; digitale Netze
    Description / Table of Contents: Noch nie war es einfacher, Menschen und ihr Wissen in Form von Texten, Bildern oder Tönen zusammenzubringen und zu vernetzen. Freie Netze sind der Versuch, dieses Potential von Internet und PC auszuschöpfen und möglichst alle Menschen daran teilhaben zu lassen. FREIES WISSEN. Der Zugang zu digitalen Netzen bedeutet noch nicht den Zugang zu Inhalten. Ein freier Zugang zu Wissen ist aber die Basis für Innovation und Emanzipation. Den neuen Möglichkeiten für freien Zugang zu Wissen stehen neue und alte, soziale und rechtliche Barrieren gegenüber. Von siebzehn Autorinnen und Autoren werden die verschiedenen Anwendungsbereiche von Freien Netzen und Freiem Wissen dargestellt. In jedem der neun Kapitel kommen in Interviews Menschen wie Lawrence Lessig oder Richard Stallman zu Wort, die mit dem Thema als ExpertInnen, PionierInnen oder unmittelbar Betroffene zu tun hatten oder haben. Am Ende jedes Kapitels finden sich konkrete Projektvorschläge zur Umsetzung auf lokaler Ebene als Beitrag für das Linzer Kulturhauptstadtjahr 2009.
    Pages: Online-Ressource (328 Seiten)
    ISBN: 3901761640
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Unknown
    Bonn : Galileo Press
    Keywords: Windows Server 2008 R2 ; Hyper-V ; Active Directory ; Remotedesktopdienste ; Webserver IIS ; Netzwerkprotokolle ; Kerberos-Authentifizierung
    Description / Table of Contents: Das lösungsorientierte und praktische Handbuch zum Windows Server 2008 R2 mit zahlreichen fundierten Hintergrundinformationen! Der Autor Ulrich B. Boddenberg greift bei der Beschreibung des Servers auf seine praktischen Erfahrungen in zahlreichen Projekten bei mittleren und großen Kunden zurück. Denn ein modernes Betriebssystem wie Windows Server 2008 R2 bietet weit mehr als nur die Möglichkeit, Programme auszuführen. Er beschreibt alle zentralen Technologien, wie die Virtualisierung mit Hyper-V, Active Directory, Terminaldienste und den Webserver IIS. Neben diesen konkreten Technologien geht es auch um Grundlagen wie Netzwerkprotokolle, Kerberos-Authentifizierung oder die eingesetzte Hardware. Zentrale Aspekte wie Performance, Verfügbarkeit und Sicherheit ziehen sich durch das gesamte Buch.
    Pages: Online-Ressource (1410 Seiten)
    Edition: 3., akt. und erw. Aufl.
    ISBN: 9783836215282
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    Unknown
    München : Open Source Press
    Keywords: Linux ; Betriebssysteme ; Intrusion Detection System ; IDS ; Snort
    Description / Table of Contents: VORWORT Dieses Buch möchte Ihnen helfen, ein eigenes Intrusion Detection System (IDS) auf der Basis von Snort aufzubauen. Wir werden auf ca. 250 Seiten nicht sämtliche Aspekte und Möglichkeiten der Einbruchserkennung er örtern können – aber das soll das Buch auch nicht leisten. Vielmehr möchten wir Ihnen eine kompakte, von Fachleuten entworfene und geprüfte Anleitung geben, wie Sie mit möglichst wenig Aufwand möglichst schnell zu einem grundsätzlich ausreichenden IDS kommen. Dieses Buch wendet sich, bildlich gesprochen, an den gestressten Administrator, der partout genug Arbeit auf dem Schreibtisch und keine Zeit hat, sich in Hunderte Seiten dicke Grundlagenwerke einzuarbeiten, daraus das für ihn Wichtige abzuleiten und anschließend mühsam nach dem Trial-and-Error-Verfahren ein eigenes SnortIDS aufzubauen. Wir präsentieren Ihnen eine fertige Lösung, die Sie in kürzester Zeit nachbauen und später weiter verfeinern und anpassen können. Dennoch widmen wir uns selbstverständlich auch den Grundlagen der Intrusion Detection – sozusagen am lebenden Beispiel, am gerade gemeinsam aufgebauten IDSNetzwerk. Eine solche Schritt-für-Schritt-Bauanleitung bringt natürlich Kompromisse und Probleme mit sich: Was in einer SoftwareVersion reibungslos funktionierte, kann sich in einer anderen Version wieder anders verhalten. Parameter und Pfade werden umbenannt, Pakete und Bibliotheken kommen zu einer Distribution hinzu oder werden ersetzt – und nicht zuletzt unterscheiden sich auch SUSE und Debian oft genug grundlegend voneinander. Wir haben die hier geschilderten Bauanleitungen basierend auf Debian Woody und SUSE Version 9.1 entworfen. Es steht Ihnen frei, abweichend davon eine andere (ältere oder neuere) Version oder vielleicht eine ganz andere Distribution einzusetzen, doch müssen Sie damit rechnen, dass dann einiges von unserer Lösung abweichen, anders heißen oder funktionieren kann. Insoweit bitten wir um Verständnis, dass wir weder alle alten Versionen beachten, noch alle zukünftigen änderungen in unserer Kristallkugel vorhersehen können. Am zugrunde liegenden Prinzip dürfte sich jedoch nicht allzu viel ändern, so dass es für Administratoren mit etwas Erfahrung ein Leichtes sein sollte, die hier geschilderten Wege an andere Gegebenheiten anzupassen. Ob Sie SUSE oder Debian einsetzen, spielt prinzipiell keine Rolle – wir gehen jeweils auf beide Varianten ein, sofern Unterschiede bestehen. Bezüglich SUSE Linux möchten wir Ihnen aber empfehlen, mindestens Version 9.1 zu nutzen, da erst diese ein aktuelles Snort 2.1 enthält; SUSE 9.0 würde bereits das eigene Kompilieren von Snort erfordern. Das können Sie tun, das können Sie sich aber auch ersparen...
    Pages: Online-Ressource (258 Seiten)
    ISBN: 9783937514031
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 515/.35 ; LC QA871 ; Matrices ; Perturbation (Mathematics)
    Pages: Online-Ressource (xii, 429 pages)
    Edition: 1st ed
    ISBN: 9780444513151
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    Unknown
    Amsterdam ; Boston : Elsevier
    Keywords: DDC 577.01/5118 ; LC TD170.2 ; Ecology - Mathematical models ; Environmental protection - Mathematical models ; Pollution - Mathematical models
    Pages: Online-Ressource (xviii, 373 pages)
    Edition: 1st ed
    ISBN: 9780444522092
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Unknown
    Amsterdam ; New York : North-Holland
    Keywords: DDC 519.4 ; LC QA297 ; Numerical analysis
    Pages: Online-Ressource (278 pages)
    ISBN: 9780444701893
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    Unknown
    Amsterdam ; New York : Elsevier Science
    Keywords: DDC 512.9/42 ; LC QA214 ; Equations, Simultaneous - Numerical solutions ; Iterative methods (Mathematics)
    Pages: Online-Ressource (vii, 400 pages)
    ISBN: 9780444827777
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Unknown
    Bonn : Galileo Press
    Keywords: Visual Basic ; Visual Basic 2010 ; Visual Studio ; Objektorientierte Programmierung ; OOP ; C# ; .NET
    Description / Table of Contents: Wenn Sie ein Buch suchen, dass Ihnen bei allen Fragen der C#-Entwicklung zuverlässig mit Rat und Tat zur Seite steht, dann ist unser bewährtes Kompendium genau das Richtige für Sie. Mittlerweile in der 5. Auflage erschienen, dient es ambitionierten Ein- und Umsteigern durch seine strukturierte Vorgehensweise und die zahlreichen Anwendungsbeispiele als praxisorientierte Einführung; Fortgeschrittene und Profis unterstützt es als Nachschlagewerk optimal bei ihrer täglichen Arbeit. In den ersten Kapiteln werden zunächst die Grundlagen von C#, .NET und der objektorientierten Programmierung vermittelt. Es folgen Kapitel zur effizienten Entwicklung mit Visual Studio 2010, zur Fehlerbehandlung sowie zu fortgeschrittenen C#-Themen wie LINQ, Multithreading, Serialisierung u.v.m. Den größten Themenblock bildet die Entwicklung von grafischen Benutzeroberflächen. Neben einer fundierten Einführung in die WPF und XAML erfahren Sie hier alles Notwendige, um auch komplexe Anwendungen zu gestalten. Anschließend wird die Datenbankprogrammierung mit ADO.NET ausführlich behandelt und zu guter Letzt die Weitergabe von .NET-Anwendungen thematisiert. So sind Sie für Ihren Arbeitsalltag bestens gerüstet!
    Pages: Online-Ressource (1295 Seiten)
    Edition: 5., akt. und erw. Aufl.
    ISBN: 9783836215527
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Keywords: Ubuntu
    Description / Table of Contents: Umfassender geht es nicht! Hier erfahren Sie alles, was man mit Ubuntu anstellen kann, aktuell zur Version 10.04 LTS 'Lucid Lynx'. Von der Installation, der Paketverwaltung über Optimierung, Programmierung, Migration und Kernelkompilierung bis hin zur Virtualisierung und Netzwerktechnik finden Sie alle wichtigen Fragen zu Ubuntu Linux in diesem Buch beantwortet. Darüber hinaus profitieren Sie von mehr als 250 eigens gekennzeichneten Tipps und Tricks sowie von zahlreichen Praxisworkshops. Dieses Buch macht Sie zum Ubuntu-Profi!
    Pages: Online-Ressource (1104 Seiten)
    Edition: 5., akt. und erw. Aufl.
    ISBN: 9783836216548
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Unknown
    Beijing : O'Reilly
    Keywords: Ruby
    Description / Table of Contents: Ruby ist die modernste und am klügsten konzipierte Programmiersprache. Sie ist objektorientiert und wird auch als "Multiparadigmen-Sprache" bezeichnet, weil sie dem Programmierer kein bestimmtes Programmierparadigma aufdrängt. Der Leser wird umfassend und praxisnah in diese moderne Programmiersprache eingeführt. Er wird mit allen Sprachgrundlagen vertraut gemacht, die zur Beherrschung dieser Sprache notwendig sind. Objektorientiertheit, Datenbankanbindung und Web-Anwendung mit Ruby stellen daneben die besonderen Schwerpunkte dieser Einführung dar. Die Arbeit mit dem Webframework Ruby on Rails runden das Buch ab. Wer bisher zögerte, eine Programmiersprache zu erlernen, hat mit dem Erscheinen dieses Buches keine Ausrede mehr. Niemals war es so leicht, sich eine komplexe Programmiersprache anzueignen.
    Pages: Online-Ressource (408 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783897214781
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Keywords: Computer science ; Computer communication systems ; Data mining ; User interfaces (Computer systems) ; Artificial intelligence ; Pattern recognition ; Computer Science ; Artificial Intelligence (incl. Robotics) ; Data Mining and Knowledge Discovery ; Information Systems Applications (incl. Internet) ; User Interfaces and Human Computer Interaction ; Pattern Recognition ; Computer Communication Networks
    Description / Table of Contents: Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied originates from one domain.   The focus of this book, and the BISON project from which the contributions originate, is a network-based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of seeking well-defined global or local patterns, the aim was to find domain-bridging associations. These are particularly interesting if they are sparse and have not been encountered before.   The 32 contributions presented in this state-of-the-art survey, together with a detailed introduction to the book, are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.  
    Pages: Online-Ressource (X, 486 pages) , 146 illustrations
    ISBN: 9783642318306
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Unknown
    San Diego, Calif : Academic Press
    Keywords: DDC 515/.2433 ; LC QA403.3 ; Extrapolation (Mathematics)
    Pages: Online-Ressource (vi, 464 pages)
    Edition: 1st ed
    ISBN: 9780444888143
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Unknown
    Bonn : Galileo Press
    Keywords: iPad ; iPhone ; XCode ; Apps
    Description / Table of Contents: Unsere Autoren zeigen Ihnen, wie Sie schnell zur eigenen App kommen. Dabei werden alle wichtigen Themen in der gebotenen Tiefe mit viel Hintergrundwissen beschrieben. Praktische und direkt nachvollziehbare Beispiele helfen beim Verständnis. Natürlich kommt in diesem Buch auch die Programmierung nicht zu kurz. Grundkenntnisse sollten jedoch vorhanden sein. Eine kurze Einführung in Objective-C und Cocoa vermittelt Ihnen alles, was Sie wissen müssen. Inkl. Schnittstellen zum Datenaustausch, Events, Alerts, Datenverwaltung mit Core Data, Sicherheit und die verschiedenen Möglichkeiten der Netzwerkprogrammierung.
    Pages: Online-Ressource (1172 Seiten)
    Edition: 1. Aufl.
    ISBN: 9783836227346
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Keywords: 3D Surface Reconstruction - Bildanalyse - Bildverarbeitung - Bildverarbeitungsanwenungen - Closing - Computer Vision ; Mustererkennung ; Triangulation ; digital elevation model ; genetic algorithms ; hidden Markov Model ; image analysis ; model ; rendering ; robot
    Description / Table of Contents: This book presents the proceedings of the Sixth International Conference on Computer Analysis of Images and Patterns, CAIP '95, held in Prague, Czech Republic in September 1995. The volume presents 61 full papers and 75 posters selected from a total of 262 submissions and thus gives a comprehensive view on the state-of-the-art in computer analysis of images and patterns, research, design, and advanced applications. The papers are organized in sections on invariants, segmentation and grouping, optical flow, model recovery and parameter estimation, low level vision, motion detection, structure and matching, active vision and shading, human face recognition, calibration, contour, and sessions on applications in diverse areas.
    Pages: Online-Ressource (XVIII, 962 pages)
    ISBN: 9783540447818
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Keywords: Media ; Computer ; Database ; Search Engine ; Big Data ; Internet ; Digital Media ; Media Theory ; Media History ; Media Studies ; Medien ; Computer ; Datenbank ; Suchmaschine ; Big Data ; Internet ; Digitale Medien ; Medientheorie ; Mediengeschichte ; Medienwissenschaft
    Description / Table of Contents: We have long moved on from a mere information age to the era of big data. Here, databases represent both the enormous potential for gaining knowledge of data collection and the alarming information excesses of digital culture. Furthermore, the term refers to concrete technologies and processes of gathering and accessing digital information. Media theory has to locate databases in between these very different conceptions. Marcus Burkhardt retraces the history of databases and asks how technical procedures of processing digital information determine what can be found how in databases and what knowledge can be gained through them. | Wir leben längst nicht mehr nur im Informationszeitalter, sondern in der Ära von Big Data. In dieser steht die Datenbank gleichzeitig für die riesigen Erkenntnispotenziale von Informationssammlungen wie für die bedrohlichen Informationsexzesse der digitalen Medienkultur. Zudem bezeichnet der Begriff konkrete Technologien und Verfahren der Sammlung und Bereitstellung von digitalen Informationen. Zwischen diesen sehr unterschiedlichen Auffassungen gilt es, Datenbanken medientheoretisch zu verorten. Marcus Burkhardt zeichnet die Geschichte der Datenbanken nach und fragt, wie technische Verfahren der Verwaltung digitaler Informationen bedingen, was auf welche Weise in Datenbanken gefunden und durch sie gewusst werden kann.
    Pages: Online-Ressource (388 Seiten)
    ISBN: 9783839430286
    Language: German
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Keywords: GIS ; Geoinformationssysteme ; database ; databases ; geographic data ; information system ; knowledge engineering ; modeling ; topology
    Description / Table of Contents: The Third International Symposium on Large Spatial Databases (SSD '93) was held at the National University of Singapore in June 1993. The previous meetings of the series were at Sanata Barbara (1989) and Zurich (1991). The meetings are planned as a forum for researchers and practitioners specializing in database theory for and advanced applications of Spatial Information Systems. This volume constitutes the proceedings of the symposium. It contains 25 selected papersand three keynotes papers: "Spatial data management in database systems: research directions" (W. Kim), "From extensible databases to interoperability between multiple databases and GIS applications" (H.-J. Schek), and "The SEQUOIA 2000 project" (M. Stonebraker). The selectedpapers are collected into sections on: data modeling, spatial indexing, indexing mechanisms, handling of raster and vector data, spatial database systems, topology, storage management, query retrieval,knowledge engineering in SDS, and 3-dimensional data handling.
    Pages: Online-Ressource (XV, 537 pages)
    ISBN: 9783540477655
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Unknown
    London : Ubiquity Press
    Keywords: Open Data ; Open Science ; Open Access ; Text Mining ; Data Mining
    Description / Table of Contents: In 2010 the Panton Principles for Open Data in Science were published. These principles were founded upon the idea that "Science is based on building on, reusing and openly criticising the published body of scientific knowledge" (http://pantonprinciples.org) and they provide a succinct list of the fundamentals to observe when making your data open. Intended for a broad audience of academics, publishers and librarians, Issues in Research Data explores the implications of the Panton Principles through a number of perspectives on open research data in the sciences and beyond. The book features chapters by open data experts in a range of academic disciplines, covering practical information on licensing, ethics, and advice for data curators, alongside more theoretical issues surrounding the adoption of open data. As the book is open access, each chapter can stand alone from the main volume so that communities can host, distribute, build upon and remix the content that is relevant to them. Readers can access the online version via the QR code or DOI link at the front of the book.
    Pages: Online-Ressource (VI, 164 Seiten)
    ISBN: 9781909188327
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Keywords: FEM ; Finite Element Method ; simulation
    Description / Table of Contents: Chapter 1: FEM Analysis of Mechanical and Structural Properties of Long Fiber-Reinforced Composites by Michal Petrů and Ondřej Novák --- Chapter 2: Finite Element Dynamic Analysis on Residual Stress Distribution of Titanium Alloy and Titanium Matrix Composite after Shot Peening Treatment by Lechun Xie, Zhou Wang, Chengxi Wang, Yan Wen, Liqiang Wang, Chuanhai Jiang, Weijie Lu, Lai-Chang Zhang and Lin Hua --- Chapter 3: Multiscale Wavelet Finite Element Analysis in Structural Dynamics by Mutinda Musuva and Cristinel Mares --- Chapter 4: Numerical Analysis of Hot Polymer-Coated Steel Pipeline Joints in Bending by Finian McCann, Guido Ridolfi, Erwan Karjadi, Harm Demmink and Helen Boyd --- Chapter 5: Application of Finite Element Analysis in Multiscale Metal Forming Process by Zhengyi Jiang and Haibo Xie --- Chapter 6: Finite Element Thermal Analysis of Metal Parts Additively Manufactured via Selective Laser Melting by Dario Pitassi, Enrico Savoia, Vigilio Fontanari, Alberto Molinari, Valerio Luchin, Gianluca Zappini and Matteo Benedetti --- Chapter 7: Adaptive Modeling and Simulation of Elastic, Dielectric and Piezoelectric Problems by Grzegorz Zboiński --- Chapter 8: Vibration Simulation of Electric Machines by Marcel Janda and Kristyna Jandova --- Chapter 9: Numerically and Analytically Forecasting the Coal Burst Using Energy Based Approach Methods by Faham Tahmasebinia, Chengguo Zhang, Ismet Canbulat, Onur Vardar and Serkan Saydam --- Chapter 10: Linear Thermo-Poroelasticity and Geomechanics by Horacio Florez --- Chapter 11: Numerical Analysis of the Incompressible Fluid Flow and Heat Transfer by Toshio Tagawa --- Chapter 12: Numerical Simulation of Wave (Shock Profile) Propagation of the Kuramoto-Sivashinsky Equation Using an Adaptive Mesh Method by Denson Muzadziwa, Stephen T. Sikwila and Stanford Shateyi --- Chapter 13: Numerical Analysis on the Simulated Heavy Rainfall Event of Tropical Cyclone Fung-Wong by Lei-Ming Ma and Xu-Wei Bao --- Chapter 14: Weighted Finite-Element Method for Elasticity Problems with Singularity by Viktor Anatolievich Rukavishnikov and Elena Ivanovna Rukavishnikova
    Pages: Online-Ressource (322 Seiten)
    ISBN: 9789535138501
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Unknown
    Rijeka : InTech
    Keywords: image processing
    Description / Table of Contents: Chapter 1: Colorimetry and Dichromatic Vision by Humberto Moreira, Leticia Álvaro, Anna Melnikova and Julio Lillo --- Chapter 2: Image Segmentation Based on Mathematical Morphological Operator by Jianjun Chen, Haijian Shao and Chunlong Hu --- Chapter 3: Color Reconstruction and Resolution Enhancement Using Super-Resolution by Eduardo Quevedo Gutiérrez and Gustavo Marrero Callicó --- Chapter 4: Color Analysis and Image Processing Applied in Agriculture by Jesús Raúl Martínez Sandoval, Miguel Enrique Martínez Rosas, Ernesto Martínez Sandoval, Manuel Moisés Miranda Velasco and Humberto Cervantes De Ávila --- Chapter 5: A Proposal of Color Image Processing Applications for Education by Hiroshi Kamada, Tomohisa Ishikawa and Keitaro Yoshikawa --- Chapter 6: Real-Time Video Analysis in Agriculture by Using LabVIEW Software by Abdullah Beyaz --- Chapter 7: Diffusion-Steered Super-Resolution Image Reconstruction by Baraka J. Maiseli --- Chapter 8: A New Pansharpening Approach for Hyperspectral Images by Chiman Kwan, Jin Zhou and Bence Budavari --- Chapter 9: Thresholding Algorithm Optimization for Change Detection to Satellite Imagery by René Vázquez-Jiménez, Rocío N. Ramos-Bernal, Raúl Romero- Calcerrada, Patricia Arrogante-Funes, Sulpicio Sanchez Tizapa and Carlos J. Novillo --- Chapter 10: Clouds Motion Estimation from Ground-Based Sky Camera and Satellite Images by Ali Youssef Zaher and Afraa Ghanem
    Pages: Online-Ressource (206 Seiten)
    ISBN: 9789535137450
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Unknown
    Rijeka : InTech
    Keywords: time series analysis ; TSA ; data science ; forecasting
    Description / Table of Contents: Chapter 1: Introductory Chapter: Time Series Analysis (TSA) for Anomaly Detection in IoT by Nawaz Mohamudally --- Chapter 2: Anxiety, Worry and Fear: Quantifying the Mind Using EKG Time Series Analysis by Toru Yazawa --- Chapter 3: Agricultural Monitoring in Regional Scale Using Clustering on Satellite Image Time Series by Renata Ribeiro do Valle Gonçalves, Jurandir Zullo Junior, Bruno Ferraz do Amaral, Elaine Parros Machado Sousa and Luciana Alvim Santos Romani --- Chapter 4: Volatility Parameters Estimation and Forecasting of GARCH(1,1) Models with Johnson’s SU Distributed Errors by Mohammed Elamin Hassan, Henry Mwambi and Ali Babikir --- Chapter 5: Generation of Earth’s Surface Three-Dimensional (3-D) Displacement Time-Series by Multiple-Platform SAR Data by Antonio Pepe --- Chapter 6: Time Series and Renewable Energy Forecasting by Mahmoud Ghofrani and Musaad Alolayan --- Chapter 7: Modeling Nonlinear Vector Time Series Data by Jiancheng Jiang and Sha Yu --- Chapter 8: Symbolic Time Series Analysis and Its Application in Social Sciences by Wiston Adrián Risso --- Chapter 9: State-Space Models for Binomial Time Series with Excess Zeros by Fan Tang and Joseph E. Cavanaugh --- Chapter 10: Ensemble Prediction of Stream Flows Enhanced by Harmony Search Optimization by Milan Cisty and Veronika Soldanova
    Pages: Online-Ressource (178 Seiten)
    ISBN: 9789535137436
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Keywords: Computer science ; Data structures (Computer science) ; Pattern recognition ; Computer Science ; Pattern Recognition ; Data Structures
    Description / Table of Contents: Approaches to Unsupervised Machine Learning --- Methods of Visualization of High-Dimensional Data --- Quality Assessments of Visualizations --- Behavior-Based Systems in Data Science --- Databionic Swarm (DBS)
    Pages: Online-Ressource (XX, 201 pages) , 90 illustrations, 29 illustrations in color
    ISBN: 9783658205409
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Keywords: computational fluid dynamics
    Description / Table of Contents: Chapter 1: High-Performance Computing: Dos and Don’ts by Guillaume Houzeaux, Ricard Borrell, Yvan Fournier, Marta Garcia- Gasulla, Jens Henrik Göbbert, Elie Hachem, Vishal Mehta, Youssef Mesri, Herbert Owen and Mariano Vázquez --- Chapter 2: Multilevel Variable-Block Schur-Complement-Based Preconditioning for the Implicit Solution of the Reynolds- Averaged Navier-Stokes Equations Using Unstructured Grids by Bruno Carpentieri and Aldo Bonfiglioli --- Chapter 3: Free-Surface Flow Simulations with Smoothed Particle Hydrodynamics Method using High-Performance Computing by Corrado Altomare, Giacomo Viccione, Bonaventura Tagliafierro, Vittorio Bovolin, José Manuel Domínguez and Alejandro Jacobo Cabrera Crespo --- Chapter 4: Highly Deforming Computational Meshes for CFD Analysis of Twin-Screw Positive Displacement Machines by Sham Rane, Ahmed Kovačević, Nikola Stošić and Ian Smith --- Chapter 5: Optimization Design by Coupling Computational Fluid Dynamics and Genetic Algorithm by Jong-Taek Oh and Nguyen Ba Chien --- Chapter 6: Applications of CFD for Process Safety by Luis G. Zárate, Sebastián Uribe and Mario E. Cordero --- Chapter 7: Adaptation to Climate Change at Local Scale: A CFD Study in Porto Urban Area by Vera Rodrigues, Sandra Rafael, Sandra Sorte, Sílvia Coelho, Hélder Relvas, Bruno Vicente, Joana Leitão, Myriam Lopes, Ana Isabel Miranda and Carlos Borrego --- Chapter 8: Computational Fluid Dynamics (CFD) Applied to a Glass Vaporization Chamber for Introduction of Micro- or Nano-Size Samples into Lab-Based ICPs and to a CFD-Derived (and Rapidly Prototyped Via 3D Printing) Smaller-Size Chamber for Portable Microplasmas by Hamid R. Badiei, Gordon Stubley, Ryan Fitzgerald, Melanie Saddler and Vassili Karanassios --- Chapter 9: Analysis of Biomass Waste Cofiring into Existing Coal-Fired Power Plant Using Computational Fluid Dynamics by Arif Darmawan, Dwika Budianto, Koji Tokimatsu and Muhammad Aziz --- Chapter 10: CFD Modelling of Coupled Multiphysics-Multiscale Engineering Cases by Mario E. Cordero, Sebastián Uribe, Luis G. Zárate, Reyna Natividad Rangel, Alejandro Regalado-Méndez and Ever Peralta Reyes --- Chapter 11: CFD Analysis of Turbulence Models to Achieve the Digester Mixing Process by Jorge Flores-Velazquez, Abraham Jesus Arzeta-Rios, Waldo Ojeda Bustamante and Teodoro Espinosa-Solares --- Chapter 12: CFD for the Design and Optimization of Slurry Bubble Column Reactors by Omar M. Basha and Badie I. Morsi --- Chapter 13: Two Different Formulations for Solving the Navier-Stokes Equations with Moderate and High Reynolds Numbers by Blanca Bermúdez, Alejandro Rangel-Huerta, Wuiyevaldo Fermín Guerrero-Sánchez and José David Alanís --- Chapter 14: Vibration Characteristics of Fluid-Filled Functionally Graded Cylindrical Material with Ring Supports by Muzamal Hussain, Aamir Shahzad, Muhammad Nawaz Naeem and Maogang He --- Chapter 15: CFD Simulations of Crude Oil Fouling on Heat Transfer Surfaces by Ramasamy Marappa Gounder and Sampath Emani --- Chapter 16: Surrogate Model Applied for Analysis of Uncertain Parameters in Turbulent Mixing Flows by Boštjan Končar, Andrej Prošek and Matjaž Leskovar
    Pages: Online-Ressource (410 Seiten)
    ISBN: 9789535137917
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Unknown
    Rijeka : InTech
    Keywords: environmental data mining ; big data
    Description / Table of Contents: 1. Ensemble Methods in Environmental Data Mining / by Goksu Tuysuzoglu, Derya Birant and Aysegul Pala --- 2. Estimating Customer Lifetime Value Using Machine Learning Techniques / by Sien Chen --- 3. Determination and Classification of Crew Productivity with Data Mining Methods / by Abdullah Emre Keleş and Mümine Kaya Keleş --- 4. Mining HCI Data for Theory of Mind Induction / by Oksana Arnold and Klaus P. Jantke --- 5. Performance-Aware High-Performance Computing for Remote Sensing Big Data Analytics / by Mustafa Kemal Pektürk and Muhammet Ünal --- 6. Early Prediction of Patient Mortality Based on Routine Laboratory Tests and Predictive Models in Critically Ill Patients / by Sven Van Poucke, Ana Kovacevic and Milan Vukicevic --- 7. Semantic Infrastructure for Service Environment Supporting Successful Aging / by Vesa Salminen, Päivi Sanerma, Seppo Niittymäki and Patrick Eklund --- 8. Adaptive Neural Network Classifier-Based Analysis of Big Data in Health Care / by Manaswini Pradhan --- 9. Identification of Research Thematic Approaches Based on Keywords Network Analysis in Colombian Social Sciences / by José Hernando Ávila-Toscano, Ivón Catherine Romero-Pérez, Ailed Marenco-Escuderos and Eugenio Saavedra Guajardo --- 10. Data Privacy for Big Data Publishing Using Newly Enhanced PASS Data Mining Mechanism / by Priyank Jain, Manasi Gyanchandani and Nilay Khare
    ISBN: 9781789235975
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Keywords: Business ; Management information systems ; Software engineering ; Computer science ; Business and Management ; Business Information Systems ; Software Engineering ; Software Management ; Management of Computing and Information Systems
    Description / Table of Contents: Full Research Papers --- Experience Reports --- Empirical Studies Papers --- Doctoral Symposium Papers
    Pages: Online-Ressource (XIII, 334 pages) , 37 illustrations
    ISBN: 9783319335155
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Keywords: Computer science ; Computer system failures ; Computer security ; Data structures (Computer science) ; Computers ; Computer Science ; Systems and Data Security ; Theory of Computation ; Computing Milieux ; Data Structures, Cryptology and Information Theory ; System Performance and Evaluation
    Description / Table of Contents: Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
    Pages: Online-Ressource (XIV, 347 pages) , 85 illustrations
    ISBN: 9783319897226
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...