Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Bücher der Reihe SpringerBriefs in Computer Science

Filter
Filter
Ordnen nachSortieren Reihenfolge der Serie
  • von Arindam Chaudhuri
    49,00 €

    This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.

  • - Principles and Applications
    von Zhi Jin & Lili Mou
    53,00 €

    This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.

  • - Principles, Challenges, and a Survey of Solutions
    von Arthur Francisco Lorenzon
    49,00 €

  • - The uber eXtensible Micro-Hypervisor Framework
    von Amit Vasudevan
    49,00 €

    This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence.

  • - Algorithms, Techniques, and Datasets
    von Oge Marques, Branka Stojanovic & Aleksandar Neskovic
    49,00 €

    This Springerbrief presents an overview of problems and technologies behind segmentation and separation of overlapped latent fingerprints, which are two fundamental steps in the context of fingerprint matching systems.

  • - Related Technologies, Challenges and Future Prospects
    von Min Chen, Shiwen Mao, Yin Zhang & usw.
    58,00 €

    This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.

  • - A Concise and Practical Introduction
    von Joakim Kavrestad
    52,00 €

  • von Bin Fan, Zhenhua Wang & Fuchao Wu
    50,00 €

    This book covers a wide range of local image descriptors, from the classical ones to the state of the art, as well as the burgeoning research topics on this area.

  • von Chen Xu & Aoying Zhou
    50,00 €

    This book comprehensively illustrates quality-ware scheduling in key-value stores. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.

  • von Jaka Sodnik & Saso Tomazic
    50,00 €

    This book focuses on a special group of auditory interfaces using spatial sound for the representation of information.

  • von Angel P. del Pobil & Ester Martinez-Martin
    49,00 €

    This distinction lies on developing a surveillance mechanism without the constraint of observing a scene free of foreground elements for several seconds when a reliable initial background model is obtained, as that situation cannot be guaranteed when a robotic system works in an unknown environment.

  • - Design Principles and Case Studies
    von Clarissa Cassales Marquezan & Lisandro Zambenedetti Granville
    39,00 €

    The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention.

  • von Ricardo Couto Antunes da Rocha & Markus Endler
    49,00 €

    Research in context-aware computing has produced a number of middleware systems for context management. This book proposes a novel architecture for context management based on the concept of context domains, allowing applications to keep context interests across distributed context management systems.

  • von Hessam S. Sarjoughian & Bernard Phillip Zeigler
    49,00 - 57,00 €

    Systems of systems are at the root of this century's global economic, climate, and energy challenges. This volume provides an approach that integrates both energy and information processing requirements into system design.

  • - Concepts, Designs and Optimized Practices
    von Tatiana Galibus, Viktor V. Krasnoproshin, Robson de Oliveira Albuquerque & usw.
    49,00 €

    This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud.

  • - Role of Power Law Distribution
    von Pabitra Mitra & Srinivas Virinchi
    50,00 €

    In the context of link prediction indense networks, the text proposes similarity measures based on Markov inequalitydegree thresholding (MIDTs), which only consider nodes whose degree is above a thresholdfor a possible link.

  • von Karen Andersen-Ranberg, Juris Klonovs, Kamal Nasrollahi, usw.
    50,00 €

    This book summarizes various approaches for theautomatic detection of health threats to older patients at home living alone. The book then summarizes possible scenarios for monitoring anolder patient at home, deriving the common functional requirements formonitoring technology.

  • von Elise Lemle, Katherine Bomkamp, Marcella Klein Williams & usw.
    47,00 €

    This brief will explore topics in computer science through the lens of Two Bit Circus, an engineering entertainment company based out of downtown Los Angeles.

  • von Lucas Davi & Ahmad-Reza Sadeghi
    49,00 €

    Several improved and sophisticated return-oriented programming attack techniques such as just-in-time return-oriented programming are presented. Building Secure Defenses against Code-Reuse Attacks is an excellent reference tool for researchers, programmers and professionals working in the security field.

  • von Paulo Shakarian, Ashkan Aleali, Elham Shaabani, usw.
    50,00 €

    It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models).

  • von Feng Xia & Azizur Rahim
    50,00 €

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS).

  • von Janos Abonyi & Tamas Kenesei
    50,00 €

    The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques.

  • von Kim J.L. Nevelsteen
    50,00 €

    This book scrutinizes pervasive games from a technological perspective, focusing on the sub-domain of games that satisfy the criteria that they make use of virtual game elements. In the computer game industry, the use of a game engine to build games is common, but current game engines do not support pervasive games.

  • - Trends in Technology and Policy
    von Piyushimita (Vonu) Thakuriah & D. Glenn Geers
    46,00 €

    Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation information is generated and used in the future.

  • von Md. Atiqur Rahman Ahad
    49,00 €

    However, many valuable approaches have been proposed over the past decade, including the motion history image (MHI) method. This work presents a comprehensive review of these state-of-the-art approaches and their applications, with a particular focus on the MHI method and its variants.

  • von Borko Furht, Natasha Petrovska & Aleksandar Stevanovic
    49,00 €

    In response to the need to improve road traffic operation, researchers implement advanced technologies and integration of systems and data, and develop state-of-the-art applications to assist traffic engineers.

  • - Domain Decomposition-Based Algorithms
    von M.V. Prasad & K K Shukla
    49,00 €

    Image compression is concerned with minimization of the number of information carrying units used to represent an image. new domain decomposition based algorithms using image quality measures and study of various quality measures for gray scale image compression;

  • von Gernot A. Fink & Thomas Ploetz
    49,00 €

    This text provides a comprehensive overview of the application of Markov models in the field of handwriting recognition, covering both hidden Markov models and Markov-chain or n-gram models.

  • von Adriano Veloso & Wagner Meira Jr.
    49,00 €

    The ultimate goal of machines is to help humans to solve problems. Such problems range between two extremes: structured problems for which the solution is totally defined (and thus are easily programmed by humans), and random problems for which the solution is completely undefined (and thus cannot be programmed).

  • von Rodrigo C. Barros, Alex A. Freitas & Andre C.P.L.F de Carvalho
    55,00 €

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.