|
|
Books > Computing & IT
Theory and Computation of Tensors: Multi-Dimensional Arrays
investigates theories and computations of tensors to broaden
perspectives on matrices. Data in the Big Data Era is not only
growing larger but also becoming much more complicated. Tensors
(multi-dimensional arrays) arise naturally from many engineering or
scientific disciplines because they can represent multi-relational
data or nonlinear relationships.
Parallel Programming with OpenACC is a modern, practical guide to
implementing dependable computing systems. The book explains how
anyone can use OpenACC to quickly ramp-up application performance
using high-level code directives called pragmas. The OpenACC
directive-based programming model is designed to provide a simple,
yet powerful, approach to accelerators without significant
programming effort. Author Rob Farber, working with a team of
expert contributors, demonstrates how to turn existing applications
into portable GPU accelerated programs that demonstrate immediate
speedups. The book also helps users get the most from the latest
NVIDIA and AMD GPU plus multicore CPU architectures (and soon for
Intel (R) Xeon Phi (TM) as well). Downloadable example codes
provide hands-on OpenACC experience for common problems in
scientific, commercial, big-data, and real-time systems. Topics
include writing reusable code, asynchronous capabilities, using
libraries, multicore clusters, and much more. Each chapter explains
how a specific aspect of OpenACC technology fits, how it works, and
the pitfalls to avoid. Throughout, the book demonstrates how the
use of simple working examples that can be adapted to solve
application needs.
Diversity in user queries makes it challenging for search engines
to effectively return a set of relevant results. Both user
intentions to search the web and types of queries are vastly
varied; consequently, horizontal and vertical search engines are
developed to answer user queries more efficiently. However, these
search engines present a variety of problems in web searching.
Result Page Generation for Web Searching: Emerging Research and
Opportunities is an essential reference publication that focuses on
taking advantages from text and web mining in order to address the
issues of recommendation and visualization in web searching.
Highlighting a wide range of topics such as navigational searching,
resource identification, and ambiguous queries, this book is
ideally designed for computer engineers, web designers,
programmers, academicians, researchers, and students.
Digital libraries have been established worldwide to make
information more readily available, and this innovation has changed
the way information seekers interact with the data they are
collecting. Faced with decentralized, heterogeneous sources, these
users must be familiarized with high-level search activities in
order to sift through large amounts of data. Information Seeking
Behavior and Challenges in Digital Libraries addresses the problems
of usability and search optimization in digital libraries. With
topics addressing all aspects of information seeking activity, the
research found in this book provides insight into library user
experiences and human-computer interaction when searching online
databases of all types. This book addresses the challenges faced by
professionals in information management, librarians, developers,
students of library science, and policy makers.
The Internet serves as an essential tool in promoting health
awareness through the circulation of important research among the
medical professional community. While digital tools and
technologies have greatly improved healthcare, challenges are still
prevalent among diverse populations worldwide. The Handbook of
Research on Advancing Health Education through Technology presents
a comprehensive discussion of health knowledge equity and the
importance of the digital age in providing life-saving data for
diagnosis and treatment of diverse populations with limited
resources. Featuring timely, research-based chapters across a broad
spectrum of topic areas including, but not limited to, online
health information resources, data management and analysis, and
knowledge accessibility, this publication is an essential reference
source for researchers, academicians, medical professionals, and
upper level students interested in the advancement and
dissemination of medical knowledge.
As big data becomes increasingly pervasive and cloud computing
utilization becomes the norm, the security and privacy of our
systems and data becomes more critical with emerging security and
privacy threats and challenges. This book presents a comprehensive
view on how to advance security and privacy in big data, cloud
computing, and their applications. Topics include cryptographic
tools, SDN security, big data security in IoT, privacy preserving
in big data, security architecture based on cyber kill chain,
privacy-aware digital forensics, trustworthy computing, privacy
verification based on machine learning, and chaos-based
communication systems. This book is an essential reading for
networking, computing, and communications professionals,
researchers, students and engineers, working with big data and
cloud computing.
In recent decades, the industrial revolution has increased economic
growth despite its immersion in global environmental issues such as
climate change. Researchers emphasize the adoption of circular
economy practices in global supply chains and businesses for better
socio-environmental sustainability without compromising economic
growth. Integrating blockchain technology into business practices
could promote the circular economy as well as global environmental
sustainability. Integrating Blockchain Technology Into the Circular
Economy discusses the technological advancements in circular
economy practices, which provide better results for both economic
growth and environmental sustainability. It provides relevant
theoretical frameworks and the latest empirical research findings
in the applications of blockchain technology. Covering topics such
as big data analytics, financial market infrastructure, and
sustainable performance, this book is an essential resource for
managers, operations managers, executives, manufacturers,
environmentalists, researchers, industry practitioners, students
and educators of higher education, and academicians.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
The development of software has expanded substantially in recent
years. As these technologies continue to advance, well-known
organizations have begun implementing these programs into the ways
they conduct business. These large companies play a vital role in
the economic environment, so understanding the software that they
utilize is pertinent in many aspects. Researching and analyzing the
tools that these corporations use will assist in the practice of
software engineering and give other organizations an outline of how
to successfully implement their own computational methods. Tools
and Techniques for Software Development in Large Organizations:
Emerging Research and Opportunities is an essential reference
source that discusses advanced software methods that prominent
companies have adopted to develop high quality products. This book
will examine the various devices that organizations such as Google,
Cisco, and Facebook have implemented into their production and
development processes. Featuring research on topics such as
database management, quality assurance, and machine learning, this
book is ideally designed for software engineers, data scientists,
developers, programmers, professors, researchers, and students
seeking coverage on the advancement of software devices in today's
major corporations.
|
|