0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (70)
  • R250 - R500 (373)
  • R500+ (14,475)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Document Computing - Technologies for Managing Electronic Document Collections (Hardcover, 1998 ed.): Ross Wilkinson, Timothy... Document Computing - Technologies for Managing Electronic Document Collections (Hardcover, 1998 ed.)
Ross Wilkinson, Timothy Arnold-Moore, Michael Fuller, Ron Sacks-Davis, James Thom, …
R2,764 Discovery Miles 27 640 Ships in 18 - 22 working days

Document Computing: Technologies for Managing Electronic Document Collections discusses the important aspects of document computing and recommends technologies and techniques for document management, with an emphasis on the processes that are appropriate when computers are used to create, access, and publish documents. This book includes descriptions of the nature of documents, their components and structure, and how they can be represented; examines how documents are used and controlled; explores the issues and factors affecting design and implementation of a document management strategy; and gives a detailed case study. The analysis and recommendations are grounded in the findings of the latest research. Document Computing: Technologies for Managing Electronic Document Collections brings together concepts, research, and practice from diverse areas including document computing, information retrieval, librarianship, records management, and business process re-engineering. It will be of value to anyone working in these areas, whether as a researcher, a developer, or a user. Document Computing: Technologies for Managing Electronic Document Collections can be used for graduate classes in document computing and related fields, by developers and integrators of document management systems and document management applications, and by anyone wishing to understand the processes of document management.

Relational Database Technology (Paperback, Softcover reprint of the original 1st ed. 1986): Suad Alagi c Relational Database Technology (Paperback, Softcover reprint of the original 1st ed. 1986)
Suad Alagi c
R2,797 Discovery Miles 27 970 Ships in 18 - 22 working days

This book presents a unified collection of concepts, tools, and techniques that constitute the most important technology available today for the design and implementation of information systems. The framework adopted for this integration goal is the one offered by the relational model of data, its applica tions, and implementations in multiuser and distributed environments. The topics presented in the book include conceptual modeling of application environments using the relational model, formal properties of that model, and tools such as relational languages which go with it, techniques for the logical and physical design of relational database systems and their imple mentations. The book attempts to develop an integrated methodology for addressing all these issues on the basis of the relational approach and various research and practical developments related to that approach. This book is the only one available today that presents such an inte gration. The diversity of approaches to data models, to logical and physical database design, to database application programming, and to use and imple mentation of database systems calls for a common framework for all of them. It has become difficult to study modern database technology with out such a unified approach to a diversity of results developed during the vigorous growth of the database area in recent years, let alone to teach a course on the subject."

Research Anthology on Big Data Analytics, Architectures, and Applications, VOL 2 (Hardcover): Information R Management... Research Anthology on Big Data Analytics, Architectures, and Applications, VOL 2 (Hardcover)
Information R Management Association
R15,738 Discovery Miles 157 380 Ships in 18 - 22 working days
Matrix Information Geometry (Hardcover, 2013 ed.): Frank Nielsen, Rajendra Bhatia Matrix Information Geometry (Hardcover, 2013 ed.)
Frank Nielsen, Rajendra Bhatia
R4,085 Discovery Miles 40 850 Ships in 18 - 22 working days

This book presents advances in matrix and tensor data processing in the domain of signal, image and information processing. The theoretical mathematical approaches are discusses in the context of potential applications in sensor and cognitive systems engineering.
The topics and application include Information Geometry, Differential Geometry of structured Matrix, Positive Definite Matrix, Covariance Matrix, Sensors (Electromagnetic Fields, Acoustic sensors) and Applications in Cognitive systems, in particular Data Mining."

Information Organization and Databases - Foundations of Data Organization (Hardcover, 2000 ed.): Katsumi Tanaka, Shahram... Information Organization and Databases - Foundations of Data Organization (Hardcover, 2000 ed.)
Katsumi Tanaka, Shahram Ghandeharizadeh, Yahiko Kambayashi
R4,226 Discovery Miles 42 260 Ships in 18 - 22 working days

Information Organization and Databases: Foundations of Data Organization provides recent developments of information organization technologies that have become crucial not only for data mining applications and information visualization, but also for treatment of semistructured data, spatio-temporal data and multimedia data that are not necessarily stored in conventional DBMSs. Information Organization and Databases: Foundations of Data Organization presents: semistructured data addressing XML, query languages and integrity constraints, focusing on advanced technologies for organizing web data for effective retrieval; multimedia database organization emphasizing video data organization and data structures for similarity retrieval; technologies for data mining and data warehousing; index organization and efficient query processing issues; spatial data access and indexing; organizing and retrieval of WWW and hypermedia. Information Organization and Databases: Foundations of Data Organization is a resource for database practitioners, database researchers, designers and administrators of multimedia information systems, and graduate-level students in the area of information retrieval and/or databases wishing to keep abreast of advances in the information organization technologies.

Cases on Health Outcomes and Clinical Data Mining - Studies and Frameworks (Hardcover): Cases on Health Outcomes and Clinical Data Mining - Studies and Frameworks (Hardcover)
R6,181 Discovery Miles 61 810 Ships in 18 - 22 working days

With the healthcare industry becoming increasingly more competitive, there exists a need for medical institutions to improve both the efficiency and the quality of their services. In order to do so, it is important to investigate how statistical models can be used to study health outcomes. Cases on Health Outcomes and Clinical Data Mining: Studies and Frameworks provides several case studies developed by faculty and graduates of the University of Louisville's PhD program in Applied and Industrial Mathematics. The studies in this book use non-traditional, exploratory data analysis and data mining tools to examine health outcomes, finding patterns and trends in observational data. This book is ideal for the next generation of data mining practitioners.

Knowledge Management in Fuzzy Databases (Hardcover, 2000 ed.): Olga Pons, Maria A. Vila Knowledge Management in Fuzzy Databases (Hardcover, 2000 ed.)
Olga Pons, Maria A. Vila
R4,226 Discovery Miles 42 260 Ships in 18 - 22 working days

1. When I was asked by the editors of this book to write a foreword, I was seized by panic. Obviously, neither I am an expert in Knowledge Representation in Fuzzy Databases nor I could have been beforehand unaware that the book's contributors would be some of the most outstanding researchers in the field. However, Amparo Vila's gentle insistence gradually broke down my initial resistance, and panic then gave way to worry. Which paving stones did I have at my disposal for making an entrance to the book? After thinking about it for some time, I concluded that it would be pretentious on my part to focus on the subjects which are dealt with directly in the contributions presented, and that it would instead be better to confine myself to making some general reflections on knowledge representation given by imprecise information using fuzzy sets; reflections which have been suggested to me by some words in the following articles such as: graded notions, fuzzy objects, uncertainty, fuzzy implications, fuzzy inference, empty intersection, etc.

Domain Driven Data Mining (Hardcover, 2010 ed.): Longbing Cao, Philip S. Yu, Chengqi Zhang, Yanchang Zhao Domain Driven Data Mining (Hardcover, 2010 ed.)
Longbing Cao, Philip S. Yu, Chengqi Zhang, Yanchang Zhao
R2,792 Discovery Miles 27 920 Ships in 18 - 22 working days

Data mining has emerged as one of the most active areas in information and c- munication technologies(ICT). With the boomingof the global economy, and ub- uitouscomputingandnetworkingacrosseverysectorand business, data andits deep analysis becomes a particularly important issue for enhancing the soft power of an organization, its production systems, decision-making and performance. The last ten years have seen ever-increasingapplications of data mining in business, gove- ment, social networks and the like. However, a crucial problem that prevents data mining from playing a strategic decision-support role in ICT is its usually limited decision-support power in the real world. Typical concerns include its actionability, workability, transferability, and the trustworthy, dependable, repeatable, operable and explainable capabilities of data mining algorithms, tools and outputs. This monograph, Domain Driven Data Mining, is motivated by the real-world challenges to and complexities of the current KDD methodologies and techniques, which are critical issues faced by data mining, as well as the ?ndings, thoughts and lessons learned in conducting several large-scale real-world data mining bu- ness applications. The aim and objective of domain driven data mining is to study effective and ef?cient methodologies, techniques, tools, and applications that can discover and deliver actionable knowledge that can be passed on to business people for direct decision-making and action-takin

Optimization and Data Analysis in Biomedical Informatics (Hardcover, 2012 ed.): Panos M. Pardalos, Thomas F. Coleman, Petros... Optimization and Data Analysis in Biomedical Informatics (Hardcover, 2012 ed.)
Panos M. Pardalos, Thomas F. Coleman, Petros Xanthopoulos
R1,413 Discovery Miles 14 130 Ships in 18 - 22 working days

This volume covers some of the topics that are related to the rapidly growing field of biomedical informatics. In June 11-12, 2010 a workshop entitled 'Optimization and Data Analysis in Biomedical Informatics' was organized at The Fields Institute. Following this event invited contributions were gathered based on the talks presented at the workshop, and additional invited chapters were chosen from world's leading experts. In this publication, the authors share their expertise in the form of state-of-the-art research and review chapters, bringing together researchers from different disciplines and emphasizing the value of mathematical methods in the areas of clinical sciences. This work is targeted to applied mathematicians, computer scientists, industrial engineers, and clinical scientists who are interested in exploring emerging and fascinating interdisciplinary topics of research. It is designed to further stimulate and enhance fruitful collaborations between scientists from different disciplines.

Advanced IT Tools - IFIP World Conference on IT Tools 2-6 September 1996, Canberra, Australia (Hardcover, 1996 ed.): Nobuyoshi... Advanced IT Tools - IFIP World Conference on IT Tools 2-6 September 1996, Canberra, Australia (Hardcover, 1996 ed.)
Nobuyoshi Terashima, Edward Altman
R5,461 Discovery Miles 54 610 Ships in 18 - 22 working days

TRACK 1: Innovative Applications in the Public Sector The integration of multimedia based applications and the information superhighway fundamentally concerns the creation of a communication technology to support the ac tivities of people. Communication is a profoundly social activity involving interactions among groups or individuals, common standards of exchange, and national infrastruc tures to support telecommunications activities. The contributions of the invited speakers and others in this track begin to explore the social dimension of communication within the context of integrated, information systems for the public sector. Interactions among businesses and households are described by Ralf Strauss through the development within a real community of a "wired city" with information and electronic services provided by the latest telecommunications technologies. A more specific type of interaction between teacher and student forms the basis of education. John Tiffin demonstrates how virtual classrooms can be used to augment the educational process. Carl Loeffler presents yet another perspective on interaction through the integration of A-life and agent technologies to investigate the dynamics of complex behaviors within networked simulation environments. Common standards for communication in the form of electronic documents or CSCW (Computer Supported Cooperative Work), according to Roland Traunmiiller, provide en abling technologies for a paradigm shift in the management of organizations. As pointed out by William Olle, the impact of standardization work on the future of information technology depends critically upon the interoperability of software systems."

Introduction to Data Mining, Global Edition (Paperback, 2nd edition): Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Anuj... Introduction to Data Mining, Global Edition (Paperback, 2nd edition)
Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Anuj Karpatne
R2,035 R1,643 Discovery Miles 16 430 Save R392 (19%) Ships in 5 - 10 working days

"Introduction to Data Mining" presents fundamental concepts and algorithms for those learning data mining for the first time. Each concept is explored thoroughly and supported with numerous examples. The text requires only a modest background in mathematics. Each major topic is organized into two chapters, beginning with basic concepts that provide necessary background for understanding each data mining technique, followed by more advanced concepts and algorithms.

Alice and Bob Learn Application Security (Paperback): T Janca Alice and Bob Learn Application Security (Paperback)
T Janca
R1,116 R918 Discovery Miles 9 180 Save R198 (18%) Ships in 9 - 17 working days

Learn application security from the very start, with this comprehensive and approachable guide! Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs. Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.

Aspect-Oriented Database Systems (Hardcover, 2004 ed.): Awais Rashid Aspect-Oriented Database Systems (Hardcover, 2004 ed.)
Awais Rashid
R1,507 Discovery Miles 15 070 Ships in 18 - 22 working days

Recently, a new set of software development techniques has become available, collectively termed Aspect-Oriented Software Development (AOSD). This aims to support the modularization of systemic properties (also referred to as crosscutting concerns) and their subsequent composition with the other parts of a system.

Rashid focuses on the use of Aspect-Oriented Programming (AOP) techniques to modularize otherwise broadly scoped features in database systems, such as the evolution or the versioning model, to improve their customizability, extensibility and maintainability. He shows how the use of AOP can transform the way we develop, use and maintain database systems. He also discusses how database systems can support AOP by providing a means for the storage and retrieval of aspects.

"Aspect-Oriented Database Systems" shows the possible synergy between AOP and database systems, and is of particular interest to researchers, graduate students and software developers in database systems and applications.

Foundations of Real-Time Computing: Formal Specifications and Methods (Hardcover, 1991 ed.): Andre M.Van Tilborg, Gary M. Koob Foundations of Real-Time Computing: Formal Specifications and Methods (Hardcover, 1991 ed.)
Andre M.Van Tilborg, Gary M. Koob
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

This volume contains a selection of papers that focus on the state-of the-art in formal specification and verification of real-time computing systems. Preliminary versions of these papers were presented at a workshop on the foundations of real-time computing sponsored by the Office of Naval Research in October, 1990 in Washington, D. C. A companion volume by the title Foundations of Real-Time Computing: Scheduling and Resource Management complements this hook by addressing many of the recently devised techniques and approaches for scheduling tasks and managing resources in real-time systems. Together, these two texts provide a comprehensive snapshot of current insights into the process of designing and building real time computing systems on a scientific basis. The notion of real-time system has alternative interpretations, not all of which are intended usages in this collection of papers. Different communities of researchers variously use the term real-time to refer to either very fast computing, or immediate on-line data acquisition, or deadline-driven computing. This text is concerned with the formal specification and verification of computer software and systems whose correct performance is dependent on carefully orchestrated interactions with time, e. g., meeting deadlines and synchronizing with clocks. Such systems have been enabled for a rapidly increasing set of diverse end-uses by the unremitting advances in computing power per constant-dollar cost and per constant-unit-volume of space. End use applications of real-time computers span a spectrum that includes transportation systems, robotics and manufacturing, aerospace and defense, industrial process control, and telecommunications."

Logical and Relational Learning (Hardcover, 2008 ed.): Luc de Raedt Logical and Relational Learning (Hardcover, 2008 ed.)
Luc de Raedt
R1,465 Discovery Miles 14 650 Ships in 18 - 22 working days

The first textbook ever to cover multi-relational data mining and inductive logic programming, this book fully explores logical and relational learning. Ideal for graduate students and researchers, it also looks at statistical relational learning.

Data Modeling Master Class Training Manual - Steve Hobermans Best Practices Approach to Developing a Competency in Data... Data Modeling Master Class Training Manual - Steve Hobermans Best Practices Approach to Developing a Competency in Data Modeling (Paperback)
Steve Hoberman
R5,096 R4,161 Discovery Miles 41 610 Save R935 (18%) Ships in 10 - 15 working days
ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012,... ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings (Hardcover, 2012 ed.)
Magda David Hercheui, Diane Whitehouse, William McIver Jr, Jackie Phahlamohlaka
R2,712 Discovery Miles 27 120 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.

Foundations of Real-Time Computing: Scheduling and Resource Management (Hardcover, 1991 ed.): Andre M.Van Tilborg, Gary M. Koob Foundations of Real-Time Computing: Scheduling and Resource Management (Hardcover, 1991 ed.)
Andre M.Van Tilborg, Gary M. Koob
R4,190 Discovery Miles 41 900 Ships in 18 - 22 working days

This volume contains a selection of papers that focus on the state-of the-art in real-time scheduling and resource management. Preliminary versions of these papers were presented at a workshop on the foundations of real-time computing sponsored by the Office of Naval Research in October, 1990 in Washington, D.C. A companion volume by the title Foundations of Real-Time Computing: Fonnal Specifications and Methods complements this book by addressing many of the most advanced approaches currently being investigated in the arena of formal specification and verification of real-time systems. Together, these two texts provide a comprehensive snapshot of current insights into the process of designing and building real-time computing systems on a scientific basis. Many of the papers in this book take care to define the notion of real-time system precisely, because it is often easy to misunderstand what is meant by that term. Different communities of researchers variously use the term real-time to refer to either very fast computing, or immediate on-line data acquisition, or deadline-driven computing. This text is concerned with the very difficult problems of scheduling tasks and resource management in computer systems whose performance is inextricably fused with the achievement of deadlines. Such systems have been enabled for a rapidly increasing set of diverse end-uses by the unremitting advances in computing power per constant-dollar cost and per constant-unit-volume of space. End-use applications of deadline-driven real-time computers span a spectrum that includes transportation systems, robotics and manufacturing, aerospace and defense, industrial process control, and telecommunications."

Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.): Adrian Perrig, J. D. Tygar Secure Broadcast Communication - In Wired and Wireless Networks (Hardcover, 2003 ed.)
Adrian Perrig, J. D. Tygar
R2,779 Discovery Miles 27 790 Ships in 18 - 22 working days

Secure Broadcast Communication in Wired and Wireless Networks presents a set of fundamental protocols for building secure information distribution systems. Applications include wireless broadcast, IP multicast, sensor networks and webs, ad hoc networks, and satellite broadcast. This book presents and compares new techniques for basic operations including:
*key distribution for access control,
*source authentication of transmissions, and
*non-repudiation of streams.

This book discusses how to realize these operations both with high performance processors and resource constrained processors. It shows how to protect against adversaries who inject packets or eavesdrop. The focus is on functional descriptions rather than theoretical discussions. Protocols are presented as basic building blocks that can be combined with each other and traditional security protocols. The book illustrates these protocols in practice by presenting a real implementation that provides security for an ad hoc sensor network.

This book can serve as a textbook or supplementary reading in graduate level courses on security or networking, or can be used for self study.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Hardcover, 2000 ed.)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,358 Discovery Miles 53 580 Ships in 18 - 22 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Tourism Informatics - Towards Novel Knowledge Based Approaches (Hardcover, 1st ed. 2015): Tokuro Matsuo, Kiyota Hashimoto,... Tourism Informatics - Towards Novel Knowledge Based Approaches (Hardcover, 1st ed. 2015)
Tokuro Matsuo, Kiyota Hashimoto, Hidekazu Iwamoto
R3,528 R3,268 Discovery Miles 32 680 Save R260 (7%) Ships in 10 - 15 working days

This book introduces new trends of theory and practice of information technologies in tourism. The book does not handle only the fundamental contribution, but also discusses innovative and emerging technologies to promote and develop new generation tourism informatics theory and their applications. Some chapters are concerned with data analysis, web technologies, social media and their case studies. Travel information on the web provided by travelers is very useful for other travelers make their travel plan. A chapter in this book proposes a method for interactive retrieval of information on accommodation facilities to support travelling customers in their travel preparations. Also an adaptive user interface for personalized transportation guidance system is proposed. Another chapter in this book shows a novel support system for the collaborative tourism planning by using the case reports that are collected via Internet. Also, a system for recommending hotels for the users is proposed and evaluated. Other chapters are concerned with recommendation, personalization and other emerging technologies.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Hardcover, 2003 ed.)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R2,931 Discovery Miles 29 310 Ships in 18 - 22 working days

In light of the rapidly escalating age of uncertainty in the IT security and privacy world, this book provides the professional IT community and, in particular, security and data protection experts and researchers, with a selection of state-of-the-art material on emerging technologies for IT security and privacy issues. Furthermore, the book analyzes the new security threats and vulnerabilities that appear in modern information societies.

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Security Engineering for Service-Oriented Architectures (Hardcover, 2009 ed.): Michael Hafner, Ruth Breu Security Engineering for Service-Oriented Architectures (Hardcover, 2009 ed.)
Michael Hafner, Ruth Breu
R1,428 Discovery Miles 14 280 Ships in 18 - 22 working days

The growing popularity of Service Oriented Architectures is mainly due to business and technology trendsthat have crystallized over thepast decade. On the business side, companies struggle to survive in a competitive - vironment that pushes them towards a tighter integration into an industry's value chain, to outsource non core business operations or to constantly- engineer business processes. These challenges boosted the demand for sc- able IT-solutions, with e?orts ultimately resulting in a ?exible architectural paradigm - Service Oriented Architectures. On the technical side, middleware standards, technologies and archit- turesbasedonXMLand Webservicesaswellastheirsecurityextensionshave matured to a sound technology base that guarantees interoperability across enterprise and application boundaries - a prerequisite to inter-organizational applications and work?ows. While the principles and concepts of Service Oriented Architectures may lookevidentandcogentfromaconceptualperspective, therealizationofint- organizational work?ows and applications based on the paradigm "Service Oriented Architecture" remains a complex task, and, all the more when it comes to security, the implementation is still bound to low-level technical knowledgeandhence error-prone. The number of books and publications o?ering implementation-level c- erageofthetechnologies, standardsandspeci?cationsasrequiredbytechnical developers lookingfor guidance on how to"add"security to service oriented solutions based on Web services and XML technology is already considerable and ever growing. The present book sets a di?erent focus. Based on the p- adigmof Model Driven Security, it shows how to systematically designand realize security-critical applications for Service Oriented Architectures.

3D Surface Reconstruction - Multi-Scale Hierarchical Approaches (Hardcover, 2013 ed.): Francesco Bellocchio, N. Alberto... 3D Surface Reconstruction - Multi-Scale Hierarchical Approaches (Hardcover, 2013 ed.)
Francesco Bellocchio, N. Alberto Borghese, Stefano Ferrari, Vincenzo Piuri
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

"3D Surface Reconstruction: Multi-Scale Hierarchical Approaches "presents methods to model 3D objects in an incremental way so as to capture more finer details at each step. The configuration of the model parameters, the rationale and solutions are described and discussed in detail so the reader has a strong understanding of the methodology. Modeling starts from data captured by 3D digitizers and makes the process even more clear and engaging.

Innovative approaches, based on two popular machine learning paradigms, namely Radial Basis Functions and the Support Vector Machines, are also introduced. These paradigms are innovatively extended to a multi-scale incremental structure, based on a hierarchical scheme. The resulting approaches allow readers to achieve high accuracy with limited computational complexity, and makes the approaches appropriate for online, real-time operation. Applications can be found in any domain in which regression is required.

"3D Surface Reconstruction: Multi-Scale Hierarchical Approaches" is designed as a secondary text book or reference for advanced-level students and researchers in computer science. This book also targets practitioners working in computer vision or machine learning related fields.

Canadian Semantic Web - Technologies and Applications (Hardcover, 2010 ed.): Weichang Du, Faezeh Ensan Canadian Semantic Web - Technologies and Applications (Hardcover, 2010 ed.)
Weichang Du, Faezeh Ensan
R4,132 Discovery Miles 41 320 Ships in 18 - 22 working days

The emergence of Web technologies for the distribution of an immense amount of data and knowledge has given rise to the need for supportive frameworks for kno- edge management. Semantic Web technologies aim at providing shared semantic spaces for Web contents, such that people, applications and communities can use a common platform to share information. Canadian Semantic Web: Technologies and Applications aims at contributing to the advancement of the Semantic Web by providing the most recent signi?cant - search on Semantic Web theory, techniques and applications in academia, industry and government in Canada and all over the world. It also enlightens possible - mantic Web research directions in future by reporting some works in-progress that presenton-goingresearchonprinciplesandapplicationsoftheSemanticWeb, while their implementation or deployment may have not been completed. This book consists of ten chapters. The chapters are extended versions of a - lected set of papers from the second Canadian Semantic Web Working Symposium (CSWWS 2009) and the twenty-?rst international Conference on Software En- neering and Knowledge Engineering (SEKE 2009). CSWWS 2009 was held in Kelowna, British Columbia in May 2009. Since many of the challenging aspects of the research problems tackled in the Semantic Web area fall in the realm of Ar- ?cial Intelligence or employ of AI techniques, CSWWS 2009 was organized in - nd sociation with the 22 Canadian Conference on Arti?cial Intelligence

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Genius SP-906BT R2 Plus Portable…
 (1)
R308 R270 Discovery Miles 2 700
Safari Nation - A Social History Of The…
Jacob Dlamini Paperback R330 R305 Discovery Miles 3 050
Across Boundaries - A Life In The Media…
Ton Vosloo Paperback R320 Discovery Miles 3 200
How Long Will South Africa Survive…
R.W. Johnson Paperback R304 Discovery Miles 3 040
Historian: An Autobiography
Hermann Giliomee Paperback  (4)
R385 R344 Discovery Miles 3 440
SonicGear SonicGo! 2 Portable Wireless…
R219 R149 Discovery Miles 1 490
Walk Audio Fonics Bluetooth Speaker…
R320 Discovery Miles 3 200
Canyon Speaker (Bsp-4 5w)(Dark Grey)
R299 Discovery Miles 2 990
Everlotus Bluetooth Speaker MP-0318…
R290 R229 Discovery Miles 2 290
Growing Up In 'White' South Africa
Neville Herrington Paperback  (1)
R320 Discovery Miles 3 200

 

Partners