Bøger i SpringerBriefs in Computer Science serien
-
572,95 kr. This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.
- Bog
- 572,95 kr.
-
- Principles and Applications
620,95 kr. This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.
- Bog
- 620,95 kr.
-
- Principles, Challenges, and a Survey of Solutions
572,95 kr. - Bog
- 572,95 kr.
-
- The uber eXtensible Micro-Hypervisor Framework
556,95 kr. This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence.
- Bog
- 556,95 kr.
-
- Algorithms, Techniques, and Datasets
553,95 kr. This Springerbrief presents an overview of problems and technologies behind segmentation and separation of overlapped latent fingerprints, which are two fundamental steps in the context of fingerprint matching systems.
- Bog
- 553,95 kr.
-
- Related Technologies, Challenges and Future Prospects
652,95 kr. This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.
- Bog
- 652,95 kr.
-
- Bog
- 609,95 kr.
-
651,95 kr. This book covers a wide range of local image descriptors, from the classical ones to the state of the art, as well as the burgeoning research topics on this area.
- Bog
- 651,95 kr.
-
651,95 kr. This book comprehensively illustrates quality-ware scheduling in key-value stores. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.
- Bog
- 651,95 kr.
-
- Trends in Technology and Policy
627,95 kr. Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation information is generated and used in the future.
- Bog
- 627,95 kr.
-
716,95 kr. This book investigates key security issues in connection with the physical layer for random wireless cellular networks. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks.
- Bog
- 716,95 kr.
-
- Role of Power Law Distribution
624,95 kr. In the context of link prediction indense networks, the text proposes similarity measures based on Markov inequalitydegree thresholding (MIDTs), which only consider nodes whose degree is above a thresholdfor a possible link.
- Bog
- 624,95 kr.
-
484,95 kr. This book summarizes various approaches for theautomatic detection of health threats to older patients at home living alone. The book then summarizes possible scenarios for monitoring anolder patient at home, deriving the common functional requirements formonitoring technology.
- Bog
- 484,95 kr.
-
552,95 kr. This brief will explore topics in computer science through the lens of Two Bit Circus, an engineering entertainment company based out of downtown Los Angeles.
- Bog
- 552,95 kr.
-
554,95 kr. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field.
- Bog
- 554,95 kr.
-
484,95 kr. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models).
- Bog
- 484,95 kr.
-
631,95 kr. This book focuses on a special group of auditory interfaces using spatial sound for the representation of information.
- Bog
- 631,95 kr.
-
- Semantic and Aesthetic Modeling
621,95 kr. These experiments illustrate how aesthetics can be computed in terms of semantic and information measures, highlighting commonalities and uncovering differences in aesthetic preferences across cultures and individuals.
- Bog
- 621,95 kr.
-
634,95 kr. The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques.
- Bog
- 634,95 kr.
-
624,95 kr. This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but current game engines do not support pervasive games.
- Bog
- 624,95 kr.
-
644,95 kr. This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS).
- Bog
- 644,95 kr.
-
560,95 kr. However, many valuable approaches have been proposed over the past decade, including the motion history image (MHI) method. This work presents a comprehensive review of these state-of-the-art approaches and their applications, with a particular focus on the MHI method and its variants.
- Bog
- 560,95 kr.
-
552,95 kr. In response to the need to improve road traffic operation, researchers implement advanced technologies and integration of systems and data, and develop state-of-the-art applications to assist traffic engineers.
- Bog
- 552,95 kr.
-
- Domain Decomposition-Based Algorithms
555,95 kr. Image compression is concerned with minimization of the number of information carrying units used to represent an image. new domain decomposition based algorithms using image quality measures and study of various quality measures for gray scale image compression;
- Bog
- 555,95 kr.
-
571,95 kr. This text provides a comprehensive overview of the application of Markov models in the field of handwriting recognition, covering both hidden Markov models and Markov-chain or n-gram models.
- Bog
- 571,95 kr.
-
558,95 kr. The ultimate goal of machines is to help humans to solve problems. Such problems range between two extremes: structured problems for which the solution is totally defined (and thus are easily programmed by humans), and random problems for which the solution is completely undefined (and thus cannot be programmed).
- Bog
- 558,95 kr.
-
- Bog
- 763,95 kr.
-
- The Amazon Rainforest study case
632,95 kr. The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Networks.
- Bog
- 632,95 kr.
-
- with an Illustration from the Railway Safety Domain
572,95 kr. This book focuses on the clarification of what actually a handbook is, the systematic identification of what ought to be considered as ¿settled knowledge¿ (extracted from historic repositories) for inclusion into such a handbook, and the ¿assembly¿ of such identified knowledge into a form which is fit for the purpose and conforms to the formal characteristics of handbooks as a ¿literary genre¿. For many newly emerging domains or disciplines, for which no handbook with normative authority has yet been defined, the question arises of how to do this systematically and in a non-arbitrary manner. This book is the first to reflect upon the question of how to construct a desktop handbook. It is demonstrated how concept analysis can be used for identifying settled knowledge as the key ingredient by utilizing the assembled data for classification; a presentation scheme for handbook articles is developed and demonstrated to be suitable. The sketched approachis then illustrated by an example from the railway safety domain. Finally, the limitations of the presented methods are discussed. The key contribution of this book is the (example illustrated) construction method itself, not the handbook, which would result from a highly detailed and thoroughly comprehensive application of the method.
- Bog
- 572,95 kr.
-
- Sensing, Communication and Computation
572,95 kr. This book introduces the software defined system concept, architecture, and its enabling technologies such as software defined sensor networks (SDSN), software defined radio, cloud/fog radio access networks (C/F-RAN), software defined networking (SDN), network function virtualization (NFV), software defined storage, virtualization and docker.
- Bog
- 572,95 kr.