De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger i SpringerBriefs in Computer Science serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af Arindam Chaudhuri
    572,95 kr.

    This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.

  • - Principles and Applications
    af Zhi Jin & Lili Mou
    620,95 kr.

    This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.

  • - Principles, Challenges, and a Survey of Solutions
    af Arthur Francisco Lorenzon
    572,95 kr.

  • - The uber eXtensible Micro-Hypervisor Framework
    af Amit Vasudevan
    556,95 kr.

    This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence.

  • - Algorithms, Techniques, and Datasets
    af Oge Marques, Branka Stojanovic & Aleksandar Neskovic
    553,95 kr.

    This Springerbrief presents an overview of problems and technologies behind segmentation and separation of overlapped latent fingerprints, which are two fundamental steps in the context of fingerprint matching systems.

  • - Related Technologies, Challenges and Future Prospects
    af Min Chen, Shiwen Mao, Yin Zhang & mfl.
    652,95 kr.

    This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.

  • - A Concise and Practical Introduction
    af Joakim Kavrestad
    609,95 kr.

  • af Bin Fan, Zhenhua Wang & Fuchao Wu
    651,95 kr.

    This book covers a wide range of local image descriptors, from the classical ones to the state of the art, as well as the burgeoning research topics on this area.

  • af Chen Xu & Aoying Zhou
    651,95 kr.

    This book comprehensively illustrates quality-ware scheduling in key-value stores. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.

  • - Trends in Technology and Policy
    af Piyushimita (Vonu) Thakuriah & D. Glenn Geers
    627,95 kr.

    Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation information is generated and used in the future.

  • af Hui-Ming Wang & Tong-Xing Zheng
    716,95 kr.

    This book investigates key security issues in connection with the physical layer for random wireless cellular networks. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks.

  • - Role of Power Law Distribution
    af Pabitra Mitra & Srinivas Virinchi
    624,95 kr.

    In the context of link prediction indense networks, the text proposes similarity measures based on Markov inequalitydegree thresholding (MIDTs), which only consider nodes whose degree is above a thresholdfor a possible link.

  • af Karen Andersen-Ranberg, Juris Klonovs, Kamal Nasrollahi, mfl.
    484,95 kr.

    This book summarizes various approaches for theautomatic detection of health threats to older patients at home living alone. The book then summarizes possible scenarios for monitoring anolder patient at home, deriving the common functional requirements formonitoring technology.

  • af Elise Lemle, Katherine Bomkamp, Marcella Klein Williams & mfl.
    552,95 kr.

    This brief will explore topics in computer science through the lens of Two Bit Circus, an engineering entertainment company based out of downtown Los Angeles.

  • af Lucas Davi & Ahmad-Reza Sadeghi
    554,95 kr.

    Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field.

  • af Paulo Shakarian, Ashkan Aleali, Elham Shaabani, mfl.
    484,95 kr.

    It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models).

  • af Jaka Sodnik & Saso Tomazic
    631,95 kr.

    This book focuses on a special group of auditory interfaces using spatial sound for the representation of information.

  • - Semantic and Aesthetic Modeling
    af Kevin Burns, Shlomo Dubnov & Yasushi Kiyoki
    621,95 kr.

    These experiments illustrate how aesthetics can be computed in terms of semantic and information measures, highlighting commonalities and uncovering differences in aesthetic preferences across cultures and individuals.

  • af Janos Abonyi & Tamas Kenesei
    634,95 kr.

    The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques.

  • af Kim J.L. Nevelsteen
    624,95 kr.

    This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but current game engines do not support pervasive games.

  • af Feng Xia & Azizur Rahim
    644,95 kr.

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS).

  • af Md. Atiqur Rahman Ahad
    560,95 kr.

    However, many valuable approaches have been proposed over the past decade, including the motion history image (MHI) method. This work presents a comprehensive review of these state-of-the-art approaches and their applications, with a particular focus on the MHI method and its variants.

  • af Borko Furht, Natasha Petrovska & Aleksandar Stevanovic
    552,95 kr.

    In response to the need to improve road traffic operation, researchers implement advanced technologies and integration of systems and data, and develop state-of-the-art applications to assist traffic engineers.

  • - Domain Decomposition-Based Algorithms
    af M.V. Prasad & K K Shukla
    555,95 kr.

    Image compression is concerned with minimization of the number of information carrying units used to represent an image. new domain decomposition based algorithms using image quality measures and study of various quality measures for gray scale image compression;

  • af Gernot A. Fink & Thomas Ploetz
    571,95 kr.

    This text provides a comprehensive overview of the application of Markov models in the field of handwriting recognition, covering both hidden Markov models and Markov-chain or n-gram models.

  • af Adriano Veloso & Wagner Meira Jr.
    558,95 kr.

    The ultimate goal of machines is to help humans to solve problems. Such problems range between two extremes: structured problems for which the solution is totally defined (and thus are easily programmed by humans), and random problems for which the solution is completely undefined (and thus cannot be programmed).

  • af Rodrigo C. Barros, Alex A. Freitas & Andre C.P.L.F de Carvalho
    763,95 kr.

  • - The Amazon Rainforest study case
    af Viviane Todt, Thiago Nunes Kehl, Mauricio Roberto Veronez & mfl.
    632,95 kr.

    The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Networks.

  • - with an Illustration from the Railway Safety Domain
    af Stefan Gruner
    572,95 kr.

    This book focuses on the clarification of what actually a handbook is, the systematic identification of what ought to be considered as ¿settled knowledge¿ (extracted from historic repositories) for inclusion into such a handbook, and the ¿assembly¿ of such identified knowledge into a form which is fit for the purpose and conforms to the formal characteristics of handbooks as a ¿literary genre¿. For many newly emerging domains or disciplines, for which no handbook with normative authority has yet been defined, the question arises of how to do this systematically and in a non-arbitrary manner. This book is the first to reflect upon the question of how to construct a desktop handbook. It is demonstrated how concept analysis can be used for identifying settled knowledge as the key ingredient by utilizing the assembled data for classification; a presentation scheme for handbook articles is developed and demonstrated to be suitable. The sketched approachis then illustrated by an example from the railway safety domain. Finally, the limitations of the presented methods are discussed. The key contribution of this book is the (example illustrated) construction method itself, not the handbook, which would result from a highly detailed and thoroughly comprehensive application of the method.

  • - Sensing, Communication and Computation
    af Deze Zeng
    572,95 kr.

    This book introduces the software defined system concept, architecture, and its enabling technologies such as software defined sensor networks (SDSN), software defined radio, cloud/fog radio access networks (C/F-RAN), software defined networking (SDN), network function virtualization (NFV), software defined storage, virtualization and docker.