![]() |
![]() |
Your cart is empty |
||
Advances in Imaging and Electron Physics, Volume 208, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Dark Silicon and the Future of On-chip Systems, Volume 110, the latest release in the Advances in Computers series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications, with this release focusing on an Introduction to dark silicon and future processors, a Revisiting of processor allocation and application mapping in future CMPs in the dark silicon era, Multi-objectivism in the dark silicon age, Dark silicon aware resource management for many-core systems, Dynamic power management for dark silicon multi-core processors, Topology specialization for networks-on-chip in the dark silicon era, and Emerging SRAM-based FPGA architectures.
Advances in Imaging and Electron Physics, Volume 207, merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, digital image processing, electromagnetic wave propagation, electron microscopy and the computing methods used in all these domains.
Advances in Imaging and Electron Physics, Volume 205 is the latest release in this series that merges two long-running serials, Advances in Electronics and Electron Physics and Advances in Optical and Electron Microscopy. The series features extended articles on the physics of electron devices (especially semiconductor devices), particle optics at high and low energies, microlithography, image science, and digital image processing, electromagnetic wave propagation, electron microscopy, and the computing methods used in all these domains.
Safety of Web Applications: Risks, Encryption and Handling Vulnerabilities with PHP explores many areas that can help computer science students and developers integrate security into their applications. The Internet is not secure, but it's very friendly as a tool for storing and manipulating data. Customer confidence in Internet software is based on it's ability to prevent damage and attacks, but secure software is complicated, depending on several factors, including good risk estimation, good code architecture, cyphering, web server configuration, coding to prevent the most common attacks, and identification and rights allocation.
Distributed Systems: Concurrency and Consistency explores the gray area of distributed systems and draws a map of weak consistency criteria, identifying several families and demonstrating how these may be implemented into a programming language. Unlike their sequential counterparts, distributed systems are much more difficult to design, and are therefore prone to problems. On a large scale, usability reminiscent of sequential consistency, which would provide the same global view to all users, is very expensive or impossible to achieve. This book investigates the best ways to specify the objects that are still possible to implement in these systems.
Big Data and Smart Service Systems presents the theories and applications regarding Big Data and smart service systems, data acquisition, smart cities, business decision-making support, and smart service design. The rapid development of computer and Internet technologies has led the world to the era of Big Data. Big Data technologies are widely used, which has brought unprecedented impacts on traditional industries and lifestyle. More and more governments, business sectors, and institutions begin to realize data is becoming the most valuable asset and its analysis is becoming the core competitiveness.
Temporal Data Mining via Unsupervised Ensemble Learning provides the principle knowledge of temporal data mining in association with unsupervised ensemble learning and the fundamental problems of temporal data clustering from different perspectives. By providing three proposed ensemble approaches of temporal data clustering, this book presents a practical focus of fundamental knowledge and techniques, along with a rich blend of theory and practice. Furthermore, the book includes illustrations of the proposed approaches based on data and simulation experiments to demonstrate all methodologies, and is a guide to the proper usage of these methods. As there is nothing universal that can solve all problems, it is important to understand the characteristics of both clustering algorithms and the target temporal data so the correct approach can be selected for a given clustering problem. Scientists, researchers, and data analysts working with machine learning and data mining will benefit from this innovative book, as will undergraduate and graduate students following courses in computer science, engineering, and statistics.
In RIOT Control, security experts from McAfee discuss how the Internet of Things (IoT) flips the current internet with de-centralized, uncontrolled elements driving massive data from the ends into central servers and the cloud, rather than the other way around. Some estimates suggest that every human being will soon be surrounded by 1,000 to 5,000 connected objects eventually, 100 trillion static or moving objects which makes for a complex system, prone to unexpected behaviors. As various industry domains rush to adopt IoT technologies, they need guidance on IoT-ready security and risk management practices to ensure system availability and security. This book explains IoT risk in terms of project requirements,
business needs, and system designs that include endpoints, network
connectivity, and cloud-based data centers. Understand the threats
and vulnerabilities of the IoT, as well as performance metrics at
the enterprise level. In recommending emerging techniques, the
authors provide insight to help judge which are best according to
specific risks and organizational needs under consideration.
Multiple case studies span several chapters to better illustrate
the business, operational, and technical risks inherent in IoT
deployments.
Video games open portals into fantastical worlds where imaginative play prevails. The virtual medium seemingly provides us with ample opportunities to behave and act out with relative safety and impunity. Or does it? Sound Play explores the aesthetic, ethical, and sociopolitical stakes of our engagements with gaming's audio phenomena-from sonic violence to synthesized operas, from democratic music-making to vocal sexual harassment. Author William Cheng shows how the simulated environments of games empower designers, composers, players, and scholars to test and tinker with music, noise, speech, and silence in ways that might not be prudent or possible in the real world. In negotiating utopian and alarmist stereotypes of video games, Sound Play synthesizes insights from across musicology, sociology, anthropology, communications, literary theory, and philosophy. With case studies that span Final Fantasy VI, Silent Hill, Fallout 3, The Lord of the Rings Online, and Team Fortress 2, this book insists that what we do in there-in the safe, sound spaces of games-can ultimately teach us a great deal about who we are and what we value (musically, culturally, humanly) out here.
Conducting research and technology design for domestic life is by no means easy. Methods commonly used in the field of Human-Computer Interaction in settings like the workplace may not easily translate to the richness and complexity of domestic life. This book documents new ways in which researchers are studying domestic life, as well as designing and evaluating technology in the home. Each chapter is a candid discussion about methods that were successfully used for research studies with a focus on the challenges that the researchers faced and the best practices they learned.
The third edition of "Security Careers" is the authoritative reference for current job descriptions and pay practices of security, compliance, and ethicsoccupations. The job descriptions and compensation ranges in this report are drawn from research from the Foushee Group, which has been conducting this research since 1980. "Security Careers" includes more than 75 job descriptions for security-related positions, which range from the entry-level security guard to the top global corporate executive. It also provides four years of compensation trend data to give a thorough understanding of competitive pay practices across the industry. This book can be used by anyone who manages security personnel or by security professionals who want to develop their careers. "Security Careers" is a part of Elsevier s Security Executive
Council Risk Management Portfolio, a collection of real world
solutions and "how-to" guidelines that equip executives,
practitioners, and educators with proven information for successful
security and risk management programs.
Contemporary developments in the book publishing industry are
changing the system as we know it. Changes in established
understandings of authorship and readership are leading to new
business models in line with the postulates of Web 2.0. Socially
networked authorship, book production and reading are among the
social and discursive practices starting to define this emerging
system. Websites offering socially networked, collaborative and
shared reading are increasingly important. Social Reading maps
socially networked reading within the larger framework of a
changing conception of books and reading. This book is structured
into chapters covering topics in: social reading and a new
conception of the book; an evaluation of social reading platforms;
an analysis of social reading applications; the personalization of
system contents; reading in the Cloud and the development of new
business models; and Open Access e-books.
The cloud can be a powerful tool for conducting and managing
research. The Librarian s Guide to Academic Research in the Cloud
is a practical guide to using cloud services from a librarian s
point of view. As well as discussing how to use various cloud-based
services, the title considers the various privacy and data
portability issues associated with web-based services. This book
helps readers make the most of cloud computing, including how to
fold mobile devices into the cloud-based research management
equation. The book is divided into several chapters, each
considering a key aspect of academic research in the cloud,
including: defining the cloud; capturing information; capturing and
managing scholarly information; storing files; staying organized,
communicating; and sharing. The book ends by considering the future
of the cloud, examining what readers can expect from cloud services
in the next few years, and how research might be changed as a
result.
Indexing consists of both novel and more traditional techniques.
Cutting-edge indexing techniques, such as automatic indexing,
ontologies, and topic maps, were developed independently of older
techniques such as thesauri, but it is now recognized that these
older methods also hold expertise.
Web 2.0 technology is a hot topic at the moment, and public
librarians in particular are beginning to feel the pressure to
apply these tools. Indeed, Web 2.0 has the potential to transform
library services, but only if the policy and strategy for those
services are ready to be transformed. The author not only reviews
these tools and provides practical advice and case studies on how
they can be applied in the public library setting, but also
recommends the policies and business cases that begin to create a
new strategy for public libraries.
This book addresses the question of how knowledge is currently
documented, and may soon be documented in the context of what it
calls semantic publishing . This takes two forms: a more narrowly
and technically defined semantic web; as well as a broader notion
of semantic publishing. This book examines the ways in which
knowledge is represented in journal articles and books. By
contrast, it goes on to explore the potential impacts of semantic
publishing on academic research and authorship. It sets this in the
context of changing knowledge ecologies: the way research is done;
the way knowledge is represented and; the modes of knowledge access
used by researchers, students and the general public.
The originality of this book, which deals with such a new subject
matter, lies in the application of methods and concepts never used
before - such as ontologies and taxonomies, as well as thesauri -
to the ordering of knowledge based on primary information. Chapters
in the book also examine the study of ontologies, taxonomies and
thesauri from the perspective of systematics and general systems
theory. Ontologies, Taxonomies and Thesauri in Systems Science and
Systematics will be extremely useful to those operating within the
network of related fields, which includes documentation and
information science.
Electronic music instruments weren't called synthesizers until the
1950s, but their lineage began in 1919 with Russian inventor Lev
Sergeyevich Termen's development of the Etherphone, now known as
the Theremin. From that point, synthesizers have undergone a
remarkable evolution from prohibitively large mid-century models
confined to university laboratories to the development of musical
synthesis software that runs on tablet computers and portable media
devices.
This book is about news search and monitoring. Aimed at
professionals with a strategic need of monitoring the surrounding
world, users with a need to find the best news sources, monitoring
services and news search strategies and techniques will benefit
from reading this book. The main purpose is to present a practical
handbook with an analysis of readily available tools, blending with
passages of a theoretical nature. It is also useful for students at
LIS programmes and related information programmes and for
librarians and information professionals. The authors aim to aid
the reader in reaching a greater understanding of the core in news
search and monitoring.
This book tackles online social networks by navigating these
systems from the birth to the death of their digital presence.
Navigating the social within the digital can be a contentious
undertaking, as social networks confuse the boundary between
offline and online relationships. These systems work to bring
people together in an online environment, yet participation can
dislocate users from other relationships and deviant online
behaviour can create offline issues. The author begins by examining
the creation of a digital presence in online networks popularized
by websites such as Facebook and MySpace. The book explores how the
digital presence influences how social, cultural and professional
relationships are discovered, forged, maintained and broken, and
journeys through the popular criticisms of social networking such
as employee time-wasting, bullying, stalking, the alleged links
between social networks and suicide and the decline of a user s
public image. Social networks are often treated as morally
ambiguous spaces, which highlights a dissonance between digital and
social literacies. This discord is approached through an
exploration of the everyday undercurrents present in social
networks. The discussion of the digital presence ends by addressing
the intricacies of becoming digitally dead, which explores how a
user removes their identity, with finality, from social networks
and the entire web.
In a world where computing power, ubiquity and connectivity create
powerful new ways to facilitate learning, this book examines how
librarians and information professionals can utilize emerging
technologies to expand service and resource delivery. With
contributions from leading professionals, including lecturers,
librarians and e-learning technologists, this bookl explores
strategic approaches for effectively implementing, living with, and
managing revolutionary technological change in libraries.
A straightforward overview with minimum technical descriptions of
the underlying networking principles, standards, applications and
uses of the Internet. Understanding the Internet explains the
underlying networking concepts, the protocols and standards which
comprise the Internet, Internet trends and applications, the mobile
Internet, security and the hidden Web. The Internet and World Wide
Web are dramatically changing the world we live in and this book
provides a holistic view of the Internet so that practitioners and
users can more fully understand the concepts involved.
The quest to achieve high website rankings in search engine results
is a prominent subject for both academics and website
owners/coders. Website Visibility marries academic research results
to the world of the information practitioner and contains a focused
look at the elements which contribute to website visibility,
providing support for the application of each element with relevant
research. A series of real-world case studies with tested examples
of research on website visibility elements and their effect on
rankings are reviewed. |
![]() ![]() You may like...
Intellectual Property and General Legal…
Graeme B. Dinwoodie
Hardcover
R3,478
Discovery Miles 34 780
|