0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (70)
  • R250 - R500 (373)
  • R500+ (14,476)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Stream Data Management (Hardcover, 2005 ed.): Nauman Chaudhry, Kevin Shaw, Mahdi Abdelguerfi Stream Data Management (Hardcover, 2005 ed.)
Nauman Chaudhry, Kevin Shaw, Mahdi Abdelguerfi
R2,748 Discovery Miles 27 480 Ships in 18 - 22 working days

Researchers in data management have recently recognized the importance of a new class of data-intensive applications that requires managing data streams, i.e., data composed of continuous, real-time sequence of items. Streaming applications pose new and interesting challenges for data management systems. Such application domains require queries to be evaluated continuously as opposed to the one time evaluation of a query for traditional applications. Streaming data sets grow continuously and queries must be evaluated on such unbounded data sets. These, as well as other challenges, require a major rethink of almost all aspects of traditional database management systems to support streaming applications.

Stream Data Management comprises eight invited chapters by researchers active in stream data management. The collected chapters provide exposition of algorithms, languages, as well as systems proposed and implemented for managing streaming data.

Stream Data Management is designed to appeal to researchers or practitioners already involved in stream data management, as well as to those starting out in this area. This book is also suitable for graduate students in computer science interested in learning about stream data management.

Social Inclusion: Societal and Organizational Implications for Information Systems - IFIP TC8 WG 8.2 International Working... Social Inclusion: Societal and Organizational Implications for Information Systems - IFIP TC8 WG 8.2 International Working Conference, July 12-15, 2006, Limerick, Ireland (Hardcover, 2006 ed.)
Eileen Trauth, Debra Howcroft, Tom Butler, Brian Fitzgerald, Janice Degross
R2,882 Discovery Miles 28 820 Ships in 18 - 22 working days

This book presents the proceedings of the Working Conference on the societal and organizational implications for information systems of social inclusion. The contributed papers explore technology design and use in organizations, and consider the processes that engender social exclusion along with the issues that derive from it. The conference, sponsored by the International Federation for Information Processing Working Group 8.2, was held in Limerick, Ireland, in July, 2006.

Operations Research and Big Data - IO2015-XVII Congress of Portuguese Association of Operational Research (APDIO) (Hardcover,... Operations Research and Big Data - IO2015-XVII Congress of Portuguese Association of Operational Research (APDIO) (Hardcover, 1st ed. 2015)
Ana Paula Ferreira Dias Barbosa Povoa, Joao Luis De Miranda
R4,168 R3,367 Discovery Miles 33 670 Save R801 (19%) Ships in 10 - 15 working days

The development of Operations Research (OR) requires constant improvements, such as the integration of research results with business applications and innovative educational practice. The full deployment and commercial exploitation of goods and services generally need the construction of strong synergies between educational institutions and businesses. The IO2015 -XVII Congress of APDIO aims at strengthening the knowledge triangle in education, research and innovation, in order to maximize the contribution of OR for sustainable growth, the promoting of a knowledge-based economy, and the smart use of finite resources. The IO2015-XVII Congress of APDIO is a privileged meeting point for the promotion and dissemination of OR and related disciplines, through the exchange of ideas among teachers, researchers, students , and professionals with different background, but all sharing a common desire that is the development of OR.

Mathematical Techniques in Multi-sensor Data Fusion (Hardcover): David L. Hall Mathematical Techniques in Multi-sensor Data Fusion (Hardcover)
David L. Hall
R2,869 Discovery Miles 28 690 Ships in 18 - 22 working days

This invaluable reference offers the most comprehensive introduction available to the concepts of multisensor data fusion. It introduces key algorithms, provides advice on their utilization, and raises issues associated with their implementation. With a diverse set of mathematical and heuristic techniques for combining data from multiple sources, the book shows how to implement a data fusion system, describes the process for algorithm selection, functional architectures and requirements for ancillary software, and illustrates man-machine interface requirements an database issues.

Intelligent Computing Paradigm: Recent Trends (Hardcover, 1st ed. 2020): J K Mandal, Devadutta Sinha Intelligent Computing Paradigm: Recent Trends (Hardcover, 1st ed. 2020)
J K Mandal, Devadutta Sinha
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book includes extended versions of selected works presented at the 52nd Annual Convention of Computer Society of India (CSI 2017), held at Science City, Kolkata on 19-21 January 2018. It features a collection of chapters focusing on recent trends in computational intelligence, covering topics such as ANN, neuro-fuzzy based clustering, edge detection, data mining, mobile cloud computing, intelligent scheduling, processing and authentication. It also discusses societal applications of these methods. As such it is useful for students, researchers and industry professionals working in the area of computational intelligence.

Linking Government Data (Hardcover, 2011): David Wood Linking Government Data (Hardcover, 2011)
David Wood
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

Linking Government Data provides a practical approach to addressing common information management issues. The approaches taken are based on international standards of the World Wide Web Consortium. Linking Government Data gives both the costs and benefits of using linked data techniques with government data; describes how agencies can fulfill their missions with less cost; and recommends how intra-agency culture must change to allow public presentation of linked data. Case studies from early adopters of linked data approaches in international governments are presented in the last section of the book. Linking Government Data is designed as a professional book for those working in Semantic Web research and standards development, and for early adopters of Semantic Web standards and techniques. Enterprise architects, project managers and application developers in commercial, not-for-profit and government organizations concerned with scalability, flexibility and robustness of information management systems will also find this book valuable. Students focused on computer science and business management will also find value in this book.

Information Systems for eGovernment - A Quality-of-Service Perspective (Hardcover, 2010 ed.): Gianluigi Viscusi, Carlo Batini,... Information Systems for eGovernment - A Quality-of-Service Perspective (Hardcover, 2010 ed.)
Gianluigi Viscusi, Carlo Batini, Massimo Mecella
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

Motivation for the Book This book aims to describe a comprehensive methodology for service-oriented inf- mation systems planning, considered in particular, in eGovernment initiatives. The methodology is based on the research results produced by the Italian project "eG- ernment for Mediterranean Countries (eG4M)," granted by the Italian Ministry of University and Research from 2005 to 2008. The concept of service is at the center of the book. The methodology is focused on quality of services as a key factor for eGovernment initiatives. Since its grou- ing is in a project whose goal has been to develop a methodology for eGove- ment in Mediterranean countries it is called eG4M. Furthermore, eG4M aims at encompassing the relationships existing between ICT technologies and social c- texts of service provision, organizational issues, and juridical framework, looking at ICT technologies more as a means than an end. eG4M satis es a real need of constituencies and stakeholders involved in eGovernment projects, con rmed in the eG4M experimentations and in previous preliminary experiences in the Italian P- lic Administrations. A structured process is needed that provides a clear perspective on the different facets that eGovernment initiatives usually have to challenge and disciplines the complex set of decisions to be taken. The available approaches to eGovernment usually provide only one perspective to public managers and local authorities on the domain of intervention, either te- nological, organizational, legal, economic, or social.

Pervasive Social Computing - Socially-Aware Pervasive Systems and Mobile Applications (Hardcover, 1st ed. 2016): Muhammad Ashad... Pervasive Social Computing - Socially-Aware Pervasive Systems and Mobile Applications (Hardcover, 1st ed. 2016)
Muhammad Ashad Kabir, Jun Han, Alan Colman
R3,666 R3,406 Discovery Miles 34 060 Save R260 (7%) Ships in 10 - 15 working days

This book presents a review of traditional context-aware computing research, identifies its limitations in developing social context-aware pervasive systems, and introduces a new technology framework to address these limitations. Thus, this book provides a good reference for developments in context-aware computing and pervasive social computing. It examines the emerging area of pervasive social computing, which is a novel collective paradigm derived from pervasive computing, social media, social networking, social signal processing and multimodal human-computer interaction. This book offers a novel approach to model, represent, reason about and manage different types of social context. It shows how users' social context information can be acquired from different online social networks such as Facebook, LinkedIn, Twitter and Google Calendar. It further presents the use of social context information in developing innovative smart mobile applications to assist users in their daily life. The mix of both theoretical and applied research results makes this book attractive to a variety of readers from both academia and industry. This book provides a new platform for implementing different types of socially-aware mobile applications. The platform hides the complexity of managing social context, and thus provides essential support to application developers for the development of socially-aware applications. The book contains detailed descriptions of how the underlying platform has been implemented using available technologies such as ontology and rule engines, and how this platform can be used to develop socially-aware mobile applications using two exemplar applications. The book also presents evaluations of the proposed platform and applications using real-world data from Facebook, LinkedIn and Twitter. Therefore, this book is a syndication of scientific research with practical industrial applications, making it useful to researchers as well as to software engineers.

Information Processing and Security Systems (Hardcover): Khalid Saeed, Jerzy Pejas Information Processing and Security Systems (Hardcover)
Khalid Saeed, Jerzy Pejas
R5,405 Discovery Miles 54 050 Ships in 18 - 22 working days

Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science, education and industrial management applications.

Interdisciplinary Knowledge Organization (Hardcover, 1st ed. 2016): Rick Szostak, Claudio Gnoli, Maria Lopez-Huertas Interdisciplinary Knowledge Organization (Hardcover, 1st ed. 2016)
Rick Szostak, Claudio Gnoli, Maria Lopez-Huertas
R3,121 Discovery Miles 31 210 Ships in 18 - 22 working days

This book proposes a novel approach to classification, discusses its myriad advantages, and outlines how such an approach to classification can best be pursued. It encourages a collaborative effort toward the detailed development of such a classification. This book is motivated by the increased importance of interdisciplinary scholarship in the academy, and the widely perceived shortcomings of existing knowledge organization schemes in serving interdisciplinary scholarship. It is designed for scholars of classification research, knowledge organization, the digital environment, and interdisciplinarity itself. The approach recommended blends a general classification with domain-specific classification practices. The book reaches a set of very strong conclusions: -Existing classification systems serve interdisciplinary research and teaching poorly. -A novel approach to classification, grounded in the phenomena studied rather than disciplines, would serve interdisciplinary scholarship much better. It would also have advantages for disciplinary scholarship. The productivity of scholarship would thus be increased. -This novel approach is entirely feasible. Various concerns that might be raised can each be addressed. The broad outlines of what a new classification would look like are developed. -This new approach might serve as a complement to or a substitute for existing classification systems. -Domain analysis can and should be employed in the pursuit of a general classification. This will be particularly important with respect to interdisciplinary domains. -Though the impetus for this novel approach comes from interdisciplinarity, it is also better suited to the needs of the Semantic Web, and a digital environment more generally. Though the primary focus of the book is on classification systems, most chapters also address how the analysis could be extended to thesauri and ontologies. The possibility of a universal thesaurus is explored. The classification proposed has many of the advantages sought in ontologies for the Semantic Web. The book is therefore of interest to scholars working in these areas as well.

Cognitive Social Mining Applications in Data Analytics and Forensics (Hardcover): Anandakumar Haldorai, Arulmurugan Ramu Cognitive Social Mining Applications in Data Analytics and Forensics (Hardcover)
Anandakumar Haldorai, Arulmurugan Ramu
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

Recently, there has been a rapid increase in interest regarding social network analysis in the data mining community. Cognitive radios are expected to play a major role in meeting this exploding traffic demand on social networks due to their ability to sense the environment, analyze outdoor parameters, and then make decisions for dynamic time, frequency, space, resource allocation, and management to improve the utilization of mining the social data. Cognitive Social Mining Applications in Data Analytics and Forensics is an essential reference source that reviews cognitive radio concepts and examines their applications to social mining using a machine learning approach so that an adaptive and intelligent mining is achieved. Featuring research on topics such as data mining, real-time ubiquitous social mining services, and cognitive computing, this book is ideally designed for social network analysts, researchers, academicians, and industry professionals.

Data Engineering - Mining, Information and Intelligence (Hardcover, 2010): Yupo Chan, John Talburt, Terry M. Talley Data Engineering - Mining, Information and Intelligence (Hardcover, 2010)
Yupo Chan, John Talburt, Terry M. Talley
R4,261 Discovery Miles 42 610 Ships in 18 - 22 working days

DATA ENGINEERING: Mining, Information, and Intelligence describes applied research aimed at the task of collecting data and distilling useful information from that data. Most of the work presented emanates from research completed through collaborations between Acxiom Corporation and its academic research partners under the aegis of the Acxiom Laboratory for Applied Research (ALAR). Chapters are roughly ordered to follow the logical sequence of the transformation of data from raw input data streams to refined information. Four discrete sections cover Data Integration and Information Quality; Grid Computing; Data Mining; and Visualization. Additionally, there are exercises at the end of each chapter. The primary audience for this book is the broad base of anyone interested in data engineering, whether from academia, market research firms, or business-intelligence companies. The volume is ideally suited for researchers, practitioners, and postgraduate students alike. With its focus on problems arising from industry rather than a basic research perspective, combined with its intelligent organization, extensive references, and subject and author indices, it can serve the academic, research, and industrial audiences.

Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland... Artificial Intelligence and Security in Computing Systems - 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings (Hardcover, 2003 ed.)
Jerzy Soldek, Leszek Drobiazgiewicz
R4,179 Discovery Miles 41 790 Ships in 18 - 22 working days

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Hardcover, Revised ed.): Pim... Security with Noisy Data - On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (Hardcover, Revised ed.)
Pim Tuyls, Boris Skoric, Tom Kevenaar
R2,841 Discovery Miles 28 410 Ships in 18 - 22 working days

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human beings, or physical structures, such as physical unclonable functions. This book examines how the presence of noise has an impact on information security, describes how it can be dealt with and possibly used to generate an advantage over traditional approaches, and provides a self-contained overview of the techniques and applications of security based on noisy data.

Security with Noisy Data thoroughly covers the theory of authentication based on noisy data and shows it in practice as a key tool for preventing counterfeiting. Part I discusses security primitives that allow noisy inputs, and Part II focuses on the practical applications of the methods discussed in the first part.

Key features:

a [ Contains algorithms to derive secure keys from noisy data, in particular from physical unclonable functions and biometrics - as well as the theory proving that those algorithms are secure

a [ Offers practical implementations of algorithms, including techniques that give insight into system security

a [ Includes an overview and detailed description of new applications made possible by using these new algorithms

a [ Discusses recent theoretical as well as application-oriented developments in the field, combining noisy data with cryptography

a [ Describes the foundations of the subject in a clear, accessible and reader-friendly style

a [ Presents the principles of key establishment and multiparty computation over noisy channels

a [ Provides a detailed overview of the building blocks of cryptography for noisy data and explains how these techniquescan be applied, (for example as anti-counterfeiting and key storage)

a [ Introduces privacy protected biometric systems, analyzes the theoretical and practical properties of PUFs and discusses PUF based systems

a [ Addresses biometrics and physical unclonable functions extensively

This comprehensive introduction offers an excellent foundation to graduate students and researchers entering the field, and will also benefit professionals needing to expand their knowledge. Readers will gain a well-rounded and broad understanding of the topic through the insight it provides into both theory and practice.

Pim Tuyls is a Principal Scientist at Philips Research and a Visiting Professor at the COSIC Department of the Katholieke Universiteit of Leuven, Dr Boris Skoric and Dr Tom Kevenaar are research scientists at Philips Research Laboratories, Eindhoven.

Modeling, Simulation, and Optimization (Hardcover, 1st ed. 2018): Pandian Vasant, Igor Litvinchev, Jose Antonio... Modeling, Simulation, and Optimization (Hardcover, 1st ed. 2018)
Pandian Vasant, Igor Litvinchev, Jose Antonio Marmolejo-Saucedo
R3,182 Discovery Miles 31 820 Ships in 18 - 22 working days

This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.

Congestion Control for 6LoWPAN Wireless Sensor Networks: Toward the Internet of Things (Hardcover, 1st ed. 2020): Hayder... Congestion Control for 6LoWPAN Wireless Sensor Networks: Toward the Internet of Things (Hardcover, 1st ed. 2020)
Hayder Al-Kashoash
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

The Internet of Things (IoT) is the next big challenge for the research community. The IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is considered a key part of the IoT. In 6LoWPAN networks, heavy network traffic causes congestion which significantly degrades network performance and impacts on quality of service aspects. This book presents a concrete, solid and logically ordered work on congestion control for 6LoWPAN networks as a step toward successful implementation of the IoT and supporting the IoT application requirements. The book addresses the congestion control issue in 6LoWPAN networks and presents a comprehensive literature review on congestion control for WSNs and 6LoWPAN networks. An extensive congestion analysis and assessment for 6LoWPAN networks is explored through analytical modelling, simulations and real experiments. A number of congestion control mechanisms and algorithms are proposed to mitigate and solve the congestion problem in 6LoWPAN networks by using and utilizing the non-cooperative game theory, multi-attribute decision making and network utility maximization framework. The proposed algorithms are aware of node priorities and application priorities to support the IoT application requirements and improve network performance in terms of throughput, end-to-end delay, energy consumption, number of lost packets and weighted fairness index.

Multi-Disciplinary Engineering for Cyber-Physical Production Systems - Data Models and Software Solutions for Handling Complex... Multi-Disciplinary Engineering for Cyber-Physical Production Systems - Data Models and Software Solutions for Handling Complex Engineering Projects (Hardcover, 1st ed. 2017)
Stefan Biffl, Arndt Luder, Detlef Gerhard
R4,890 Discovery Miles 48 900 Ships in 10 - 15 working days

This book discusses challenges and solutions for the required information processing and management within the context of multi-disciplinary engineering of production systems. The authors consider methods, architectures, and technologies applicable in use cases according to the viewpoints of product engineering and production system engineering, and regarding the triangle of (1) product to be produced by a (2) production process executed on (3) a production system resource. With this book industrial production systems engineering researchers will get a better understanding of the challenges and requirements of multi-disciplinary engineering that will guide them in future research and development activities. Engineers and managers from engineering domains will be able to get a better understanding of the benefits and limitations of applicable methods, architectures, and technologies for selected use cases. IT researchers will be enabled to identify research issues related to the development of new methods, architectures, and technologies for multi-disciplinary engineering, pushing forward the current state of the art.

Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School,... Privacy and Identity Management for Life - 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Helsingborg, Sweden, August 2-6, 2010, Revised Selected Papers (Hardcover, Edition.)
Simone Fischer-Hubner, Penny Duquenoy, Marit Hansen, Ronald Leenes, Ge Zhang
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the 6th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, held in Helsingborg, Sweden, in August 2010. The 27 revised papers were carefully selected from numerous submissions during two rounds of reviewing. They are organized in topical sections on terminology, privacy metrics, ethical, social, and legal aspects, data protection and identity management, eID cards and eID interoperability, emerging technologies, privacy for eGovernment and AAL applications, social networks and privacy, privacy policies, and usable privacy.

Data Warehouse Designs - Achieving ROI with Market Basket Analysis and Time Variance (Paperback): Fon Silvers Data Warehouse Designs - Achieving ROI with Market Basket Analysis and Time Variance (Paperback)
Fon Silvers
R1,757 Discovery Miles 17 570 Ships in 10 - 15 working days

Market Basket Analysis (MBA) provides the ability to continually monitor the affinities of a business and can help an organization achieve a key competitive advantage. Time Variant data enables data warehouses to directly associate events in the past with the participants in each individual event. In the past however, the use of these powerful tools in tandem led to performance degradation and resulted in unactionable and even damaging information. Data Warehouse Designs: Achieving ROI with Market Basket Analysis and Time Variance presents an innovative, soup-to-nuts approach that successfully combines what was previously incompatible, without degradation, and uses the relational architecture already in place. Built around two main chapters, Market Basket Solution Definition and Time Variant Solution Definition, it provides a tangible how-to design that can be used to facilitate MBA within the context of a data warehouse. Presents a solution for creating home-grown MBA data marts Includes database design solutions in the context of Oracle, DB2, SQL Server, and Teradata relational database management systems (RDBMS) Explains how to extract, transform, and load data used in MBA and Time Variant solutions The book uses standard RDBMS platforms, proven database structures, standard SQL and hardware, and software and practices already accepted and used in the data warehousing community to fill the gaps left by most conceptual discussions of MBA. It employs a form and language intended for a data warehousing audience to explain the practicality of how data is delivered, stored, and viewed. Offering a comprehensive explanation of the applications that provide, store, and use MBA data, Data Warehouse Designs provides you with the language and concepts needed to require and receive information that is relevant and actionable.

Communities and Technologies 2005 - Proceedings of the Second Communities and Technologies Conference, Milano 2005 (Hardcover,... Communities and Technologies 2005 - Proceedings of the Second Communities and Technologies Conference, Milano 2005 (Hardcover, 2005 ed.)
Peter Van den Besselaar, Giorgio De Michelis, Jenny Preece, Carla Simone
R5,217 Discovery Miles 52 170 Ships in 18 - 22 working days

This book includes 23 papers dealing with the impact of modern information and communication technologies that support a wide variety of communities: local communities, virtual communities, and communities of practice, such as knowledge communities and scientific communities. The volume is the result of the second multidisciplinary "Communities and Technologies Conference," a major event in this emerging research field. The various chapters discuss how communities are affected by technologies, and how understanding of the way that communities function can be used in improving information systems design. This state of the art overview will be of interest to computer and information scientists, social scientists and practitioners alike.

Data Fusion in Information Retrieval (Hardcover, 2012 ed.): Shengli Wu Data Fusion in Information Retrieval (Hardcover, 2012 ed.)
Shengli Wu
R4,025 Discovery Miles 40 250 Ships in 18 - 22 working days

The technique of data fusion has been used extensively in information retrieval due to the complexity and diversity of tasks involved such as web and social networks, legal, enterprise, and many others. This book presents both a theoretical and empirical approach to data fusion. Several typical data fusion algorithms are discussed, analyzed and evaluated. A reader will find answers to the following questions, among others:

What are the key factors that affect the performance of data fusion algorithms significantly?

What conditions are favorable to data fusion algorithms?

CombSum and CombMNZ, which one is better? and why?

What is the rationale of using the linear combination method?

How can the best fusion option be found under any given circumstances?"

Data Mining: Foundations and Intelligent Paradigms - Volume 1:  Clustering, Association and Classification (Hardcover, 2012):... Data Mining: Foundations and Intelligent Paradigms - Volume 1: Clustering, Association and Classification (Hardcover, 2012)
Dawn E Holmes, Lakhmi C. Jain
R4,066 Discovery Miles 40 660 Ships in 18 - 22 working days

There are many invaluable books available on data mining theory and applications. However, in compiling a volume titled DATA MINING: Foundations and Intelligent Paradigms: Volume 1: Clustering, Association and Classification we wish to introduce some of the latest developments to a broad audience of both specialists and non-specialists in this field.

"

Handbook of Research on Big Data Storage and Visualization Techniques, VOL 2 (Hardcover): Richard S Segall, Jeffrey S Cook Handbook of Research on Big Data Storage and Visualization Techniques, VOL 2 (Hardcover)
Richard S Segall, Jeffrey S Cook
R8,491 Discovery Miles 84 910 Ships in 18 - 22 working days
Handbook on Data Management in Information Systems (Hardcover, 2003 ed.): Jacek Blazewicz, Wieslaw Kubiak, Tadeusz Morzy, Marek... Handbook on Data Management in Information Systems (Hardcover, 2003 ed.)
Jacek Blazewicz, Wieslaw Kubiak, Tadeusz Morzy, Marek Rusinkiewicz
R5,461 Discovery Miles 54 610 Ships in 18 - 22 working days

The Handbook provides practitioners, scientists and graduate students with a good overview of basic notions, methods and techniques, as well as important issues and trends across the broad spectrum of data management. In particular, the book covers fundamental topics in the field such as distributed databases, parallel databases, advanced databases, object-oriented databases, advanced transaction management, workflow management, data warehousing, data mining, mobile computing, data integration and the Web. Summing up, the Handbook is a valuable source of information for academics and practitioners who are interested in learning the key ideas in the considered area.

Integrating and Streamlining Event-Driven IoT Services (Hardcover): Yang Zhang, Yanmeng Guo Integrating and Streamlining Event-Driven IoT Services (Hardcover)
Yang Zhang, Yanmeng Guo
R5,090 Discovery Miles 50 900 Ships in 18 - 22 working days

In IoT scenarios, ways in which large-scale and cross-domain service systems can be established are still unclear, and no systematic or in-depth theories and methods have yet been found. An effective, formal foundation to IoT application designs could serve as a knowledge base for a variety of virtual world applications. Integrating and Streamlining Event-Driven IoT Services discusses how to observe isolated services running by different observation sources, how to fuse different observations to deal with observation conflict and incompleteness, and how to deal with adversaries and physical system features for real-time property enforcement over the fused knowledge. Overall, presenting an exploration of systematic theories and methods for the design of IoT services based on the principles of streamlining and integration, this book features research on topics such as CEP service, virtual machine technologies, and hybrid EPC. It is ideally designed for engineers, researchers, and university students seeking coverage on applications for smart cities, smart grids, and Industry 4.0.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Microsoft Excel 2016 Tips & Tricks
Curtis Frye Fold-out book or chart R229 Discovery Miles 2 290
Web Services Research for Emerging…
Hardcover R4,733 Discovery Miles 47 330
Guerrilla Data Analysis Using Microsoft…
Oz du Soleil, Bill Jelen Paperback R550 Discovery Miles 5 500
Micro-Tec Spanner Combination (30mm)
King Tony Spanner Combination (9/16")
Semantic Web Services for Web Databases
Mourad Ouzzani, Athman Bouguettaya Hardcover R1,399 Discovery Miles 13 990
Cincinnati Television
Jim Friedman Paperback R562 R516 Discovery Miles 5 160
Shifting Spanner 4" 100mm 0-12.8mm…
Intro to Python for Computer Science and…
Paul Deitel Paperback R1,815 R1,474 Discovery Miles 14 740
Micro-Tec Spanner Female Torx E10Xe12

 

Partners