0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (70)
  • R250 - R500 (373)
  • R500+ (14,477)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Exploratory Image Databases - Content-Based Retrieval (Hardcover): Simone Santini Exploratory Image Databases - Content-Based Retrieval (Hardcover)
Simone Santini; Series edited by Jerry D. Gibson
R1,897 Discovery Miles 18 970 Ships in 10 - 15 working days

The explosion of computer use and internet communication has placed new emphasis on the ability to store, retrieve and search for all types of images, both still photo and video images. The success and the future of visual information retrieval depends on the cutting edge research and applications explored in this book. It combines the expertise from both computer vision and database research.
Unlike text retrieval and text/numeric databases the challenges of image databases are enormous. How do you use "data mining" to search for an image if you do not have "key words" to search? Exploratory Image Databases introduces the idea that it is possible to solve this problem by merging database systems into a single search and browse activity called "exploration."
Exploratory Image Databases is one of the first single-author books that unifies the critical emerging topic of image databases. A new approach to image databases, the work is divided into four central parts: introduction to the problems that image database research must solve; computer vision and information retrieval techniques; image database issues; and interface and engines for visual searches.
Example: Imagine the difficulty of building and using a database for "face recognition," where an image of a face is used. In order to effectively use the image a huge number of characteristics would need to be entered in the database. The goal of future image databases is to use hardware and software to recognize and categorize images without typing in characteristics.
* Comprehensive coverage of the image analysis as well as the database/theoretical aspects of image databases.
* Extensive coverage of interfaces and interaction models, with a theoretical framework for the development of new interaction schemes.
* Identifies three interaction models between users and image databases, two of which have no counterpart in traditional databases.
* Coverage of the relation between image and text, including mixed search models and the automatic determination of the relation between images and text on large corpuses like the web.
* Analysis of the process of signification in images and its influence on the interaction models and technological problems of image databases.

Essentials of Blockchain Technology (Hardcover): Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino Essentials of Blockchain Technology (Hardcover)
Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino
R2,631 Discovery Miles 26 310 Ships in 10 - 15 working days

Blockchain technologies, as an emerging distributed architecture and computing paradigm, have accelerated the development/application of the Cloud/GPU/Edge Computing, Artificial Intelligence, cyber physical systems, social networking, crowdsourcing and crowdsensing, 5G, trust management, and finance. The popularity and rapid development of Blockchain brings many technical and regulatory challenges for research and academic communities. This book will feature contributions from experts on topics related to performance, benchmarking, durability, robustness, as well data gathering and management, algorithms, analytics techniques for transactions processing, and implementation of applications.

High-Performance Big-Data Analytics - Computing Systems and Approaches (Hardcover, 1st ed. 2015): Pethuru Raj, Anupama Raman,... High-Performance Big-Data Analytics - Computing Systems and Approaches (Hardcover, 1st ed. 2015)
Pethuru Raj, Anupama Raman, Dhivya Nagaraj, Siddhartha Duggirala
R3,826 R3,565 Discovery Miles 35 650 Save R261 (7%) Ships in 10 - 15 working days

This book presents a detailed review of high-performance computing infrastructures for next-generation big data and fast data analytics. Features: includes case studies and learning activities throughout the book and self-study exercises in every chapter; presents detailed case studies on social media analytics for intelligent businesses and on big data analytics (BDA) in the healthcare sector; describes the network infrastructure requirements for effective transfer of big data, and the storage infrastructure requirements of applications which generate big data; examines real-time analytics solutions; introduces in-database processing and in-memory analytics techniques for data mining; discusses the use of mainframes for handling real-time big data and the latest types of data management systems for BDA; provides information on the use of cluster, grid and cloud computing systems for BDA; reviews the peer-to-peer techniques and tools and the common information visualization techniques, used in BDA.

A Step-by-Step Guide to SPSS for Sport and Exercise Studies (Paperback): Nikos Ntoumanis A Step-by-Step Guide to SPSS for Sport and Exercise Studies (Paperback)
Nikos Ntoumanis
R2,033 Discovery Miles 20 330 Ships in 10 - 15 working days


Statistical Package for Social Sciences is the most widely used statistical software for data analysis in sport and exercise science departments around the world. This book is the first guide to SPSS that employs examples from the area of sport and exercise.
Using a variety of screenshots, figures and tables it demonstrates how students can open data files from different programmes, transform existing variables, compute new variables, split or merge data files, and select specific cases, as well as how to create and edit a variety of different tables and charts. The book uses clear step-by-step demonstrations to show how students can carry out and report a number of statistical tests the book.
Offering a comprehensive guide to SPSS functions, the book also explains the unavoidable jargon that comes with some statistical tests, and gives examples of how different statistical tests can be incorporated in sport and exercise studies. This book will be of great value to any students wanting to learn about the features of SPSS.

eBook available with sample pages: 0203164288

Building the e-World Ecosystem - 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas,... Building the e-World Ecosystem - 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas, Lithuania, October 12-14, 2011, Revised Selected Papers (Hardcover, 2011)
Tomas Skersys, Rimantas Butleris, Lina Nemuraite, Reima Suomi
R1,446 Discovery Miles 14 460 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.

Complexity of Lattice Problems - A Cryptographic Perspective (Hardcover, 2002 ed.): Daniele Micciancio, Shafi Goldwasser Complexity of Lattice Problems - A Cryptographic Perspective (Hardcover, 2002 ed.)
Daniele Micciancio, Shafi Goldwasser
R6,602 Discovery Miles 66 020 Ships in 18 - 22 working days

Lattices are geometric objects that can be pictorially described as the set of intersection points of an infinite, regular n-dimensional grid. De spite their apparent simplicity, lattices hide a rich combinatorial struc ture, which has attracted the attention of great mathematicians over the last two centuries. Not surprisingly, lattices have found numerous ap plications in mathematics and computer science, ranging from number theory and Diophantine approximation, to combinatorial optimization and cryptography. The study of lattices, specifically from a computational point of view, was marked by two major breakthroughs: the development of the LLL lattice reduction algorithm by Lenstra, Lenstra and Lovasz in the early 80's, and Ajtai's discovery of a connection between the worst-case and average-case hardness of certain lattice problems in the late 90's. The LLL algorithm, despite the relatively poor quality of the solution it gives in the worst case, allowed to devise polynomial time solutions to many classical problems in computer science. These include, solving integer programs in a fixed number of variables, factoring polynomials over the rationals, breaking knapsack based cryptosystems, and finding solutions to many other Diophantine and cryptanalysis problems."

Feature Selection for Knowledge Discovery and Data Mining (Hardcover, 1998 ed.): Huan Liu, Hiroshi Motoda Feature Selection for Knowledge Discovery and Data Mining (Hardcover, 1998 ed.)
Huan Liu, Hiroshi Motoda
R8,892 Discovery Miles 88 920 Ships in 18 - 22 working days

As computer power grows and data collection technologies advance, a plethora of data is generated in almost every field where computers are used. The com puter generated data should be analyzed by computers; without the aid of computing technologies, it is certain that huge amounts of data collected will not ever be examined, let alone be used to our advantages. Even with today's advanced computer technologies (e. g., machine learning and data mining sys tems), discovering knowledge from data can still be fiendishly hard due to the characteristics of the computer generated data. Taking its simplest form, raw data are represented in feature-values. The size of a dataset can be measUJ.ed in two dimensions, number of features (N) and number of instances (P). Both Nand P can be enormously large. This enormity may cause serious problems to many data mining systems. Feature selection is one of the long existing methods that deal with these problems. Its objective is to select a minimal subset of features according to some reasonable criteria so that the original task can be achieved equally well, if not better. By choosing a minimal subset offeatures, irrelevant and redundant features are removed according to the criterion. When N is reduced, the data space shrinks and in a sense, the data set is now a better representative of the whole data population. If necessary, the reduction of N can also give rise to the reduction of P by eliminating duplicates."

Relational Data Mining (Hardcover, 2001 ed.): Saso Dzeroski, Nada Lavrac Relational Data Mining (Hardcover, 2001 ed.)
Saso Dzeroski, Nada Lavrac
R2,875 Discovery Miles 28 750 Ships in 18 - 22 working days

As the first book devoted to relational data mining, this coherently written multi-author monograph provides a thorough introduction and systematic overview of the area. The first part introduces the reader to the basics and principles of classical knowledge discovery in databases and inductive logic programming; subsequent chapters by leading experts assess the techniques in relational data mining in a principled and comprehensive way; finally, three chapters deal with advanced applications in various fields and refer the reader to resources for relational data mining.This book will become a valuable source of reference for R&D professionals active in relational data mining. Students as well as IT professionals and ambitioned practitioners interested in learning about relational data mining will appreciate the book as a useful text and gentle introduction to this exciting new field.

Content-Based Access to Multimedia Information - From Technology Trends to State of the Art (Hardcover, 1999 ed.): Brad Perry,... Content-Based Access to Multimedia Information - From Technology Trends to State of the Art (Hardcover, 1999 ed.)
Brad Perry, Shi-Kuo Chang, J. Dinsmore, David Doermann, Azriel Rosenfeld, …
R2,732 Discovery Miles 27 320 Ships in 18 - 22 working days

In the past five years, the field of electrostatic discharge (ESD) control has under gone some notable changes. Industry standards have multiplied, though not all of these, in our view, are realistic and meaningful. Increasing importance has been ascribed to the Charged Device Model (CDM) versus the Human Body Model (HBM) as a cause of device damage and, presumably, premature (latent) failure. Packaging materials have significantly evolved. Air ionization techniques have improved, and usage has grown. Finally, and importantly, the government has ceased imposing MIL-STD-1686 on all new contracts, leaving companies on their own to formulate an ESD-control policy and write implementing documents. All these changes are dealt with in five new chapters and ten new reprinted papers added to this revised edition of ESD from A to Z. Also, the original chapters have been augmented with new material such as more troubleshooting examples in Chapter 8 and a 20-question multiple-choice test for certifying operators in Chapter 9. More than ever, the book seeks to provide advice, guidance, and practical ex amples, not just a jumble of facts and generalizations. For instance, the added tailored versions of the model specifications for ESD-safe handling and packaging are actually in use at medium-sized corporations and could serve as patterns for many readers."

System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.): Maire McLoone, John V.... System-on-Chip Architectures and Implementations for Private-Key Data Encryption (Hardcover, 2003 ed.)
Maire McLoone, John V. McCanny
R2,745 Discovery Miles 27 450 Ships in 18 - 22 working days

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation.

In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.

Cryptography and Security Services - Mechanisms and Applications (Hardcover): Manuel Mogollon Cryptography and Security Services - Mechanisms and Applications (Hardcover)
Manuel Mogollon
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography & Security Devices: Mechanisms & Applications addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks.

Grey Data Analysis - Methods, Models and Applications (Hardcover, 1st ed. 2017): Sifeng Liu, Yingjie Yang, Jeffrey Forrest Grey Data Analysis - Methods, Models and Applications (Hardcover, 1st ed. 2017)
Sifeng Liu, Yingjie Yang, Jeffrey Forrest
R3,731 R3,471 Discovery Miles 34 710 Save R260 (7%) Ships in 10 - 15 working days

This book inclusively and systematically presents the fundamental methods, models and techniques of practical application of grey data analysis, bringing together the authors' many years of theoretical exploration, real-life application, and teaching. It also reflects the majority of recent theoretical and applied advances in the theory achieved by scholars from across the world, providing readers a vivid overall picture of this new theory and its pioneering research activities. The book includes 12 chapters, covering the introduction to grey systems, a novel framework of grey system theory, grey numbers and their operations, sequence operators and grey data mining, grey incidence analysis models, grey clustering evaluation models, series of GM models, combined grey models, techniques for grey systems forecasting, grey models for decision-making, techniques for grey control, etc. It also includes a software package that allows practitioners to conveniently and practically employ the theory and methods presented in this book. All methods and models presented here were chosen for their practical applicability and have been widely employed in various research works. I still remember 1983, when I first participated in a course on Grey System Theory. The mimeographed teaching materials had a blue cover and were presented as a book. It was like finding a treasure: This fascinating book really inspired me as a young intellectual going through a period of confusion and lack of academic direction. It shone with pearls of wisdom and offered a beacon in the mist for a man trying to find his way in academic research. This book became the guiding light in my life journey, inspiring me to forge an indissoluble bond with Grey System Theory. --Sifeng Liu

Cyberspace Security and Defense: Research Issues - Proceedings of the NATO Advanced Research Workshop on Cyberspace Security... Cyberspace Security and Defense: Research Issues - Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004. (Hardcover, 2005 ed.)
Janusz S. Kowalik, Janusz G orski, Anatoly Sachenko
R2,862 Discovery Miles 28 620 Ships in 18 - 22 working days

Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.

Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security," the question is "How to do it."

Workflow and Process Automation - Concepts and Technology (Hardcover, 1998 ed.): Andrzej Cichocki, Helal A. Ansari, Marek... Workflow and Process Automation - Concepts and Technology (Hardcover, 1998 ed.)
Andrzej Cichocki, Helal A. Ansari, Marek Rusinkiewicz, Darrell Woelk
R2,719 Discovery Miles 27 190 Ships in 18 - 22 working days

Based on the results of the study carried out in 1996 to investigate the state of the art of workflow and process technology, MCC initiated the Collaboration Management Infrastructure (CMI) research project to develop innovative agent-based process technology that can support the process requirements of dynamically changing organizations and the requirements of nomadic computing. With a research focus on the flow of interaction among people and software agents representing people, the project deliverables will include a scalable, heterogeneous, ubiquitous and nomadic infrastructure for business processes. The resulting technology is being tested in applications that stress an intensive mobile collaboration among people as part of large, evolving business processes. Workflow and Process Automation: Concepts and Technology provides an overview of the problems and issues related to process and workflow technology, and in particular to definition and analysis of processes and workflows, and execution of their instances. The need for a transactional workflow model is discussed and a spectrum of related transaction models is covered in detail. A plethora of influential projects in workflow and process automation is summarized. The projects are drawn from both academia and industry. The monograph also provides a short overview of the most popular workflow management products, and the state of the workflow industry in general. Workflow and Process Automation: Concepts and Technology offers a road map through the shortcomings of existing solutions of process improvement by people with daily first-hand experience, and is suitable as a secondary text for graduate-level courses on workflow and process automation, and as a reference for practitioners in industry.

Prominent Feature Extraction for Sentiment Analysis (Hardcover, 1st ed. 2016): Basant Agarwal, Namita Mittal Prominent Feature Extraction for Sentiment Analysis (Hardcover, 1st ed. 2016)
Basant Agarwal, Namita Mittal
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

The objective of this monograph is to improve the performance of the sentiment analysis model by incorporating the semantic, syntactic and common-sense knowledge. This book proposes a novel semantic concept extraction approach that uses dependency relations between words to extract the features from the text. Proposed approach combines the semantic and common-sense knowledge for the better understanding of the text. In addition, the book aims to extract prominent features from the unstructured text by eliminating the noisy, irrelevant and redundant features. Readers will also discover a proposed method for efficient dimensionality reduction to alleviate the data sparseness problem being faced by machine learning model. Authors pay attention to the four main findings of the book : -Performance of the sentiment analysis can be improved by reducing the redundancy among the features. Experimental results show that minimum Redundancy Maximum Relevance (mRMR) feature selection technique improves the performance of the sentiment analysis by eliminating the redundant features. - Boolean Multinomial Naive Bayes (BMNB) machine learning algorithm with mRMR feature selection technique performs better than Support Vector Machine (SVM) classifier for sentiment analysis. - The problem of data sparseness is alleviated by semantic clustering of features, which in turn improves the performance of the sentiment analysis. - Semantic relations among the words in the text have useful cues for sentiment analysis. Common-sense knowledge in form of ConceptNet ontology acquires knowledge, which provides a better understanding of the text that improves the performance of the sentiment analysis.

Abstraction in Artificial Intelligence and Complex Systems (Hardcover, 2013 ed.): Lorenza Saitta, Jean-Daniel Zucker Abstraction in Artificial Intelligence and Complex Systems (Hardcover, 2013 ed.)
Lorenza Saitta, Jean-Daniel Zucker
R3,867 Discovery Miles 38 670 Ships in 18 - 22 working days

Abstraction is a fundamental mechanism underlying both human and artificial perception, representation of knowledge, reasoning and learning. This mechanism plays a crucial role in many disciplines, notably Computer Programming, Natural and Artificial Vision, Complex Systems, Artificial Intelligence and Machine Learning, Art, and Cognitive Sciences. This book first provides the reader with an overview of the notions of abstraction proposed in various disciplines by comparing both commonalities and differences. After discussing the characterizing properties of abstraction, a formal model, the KRA model, is presented to capture them. This model makes the notion of abstraction easily applicable by means of the introduction of a set of abstraction operators and abstraction patterns, reusable across different domains and applications. It is the impact of abstraction in Artificial Intelligence, Complex Systems and Machine Learning which creates the core of the book. A general framework, based on the KRA model, is presented, and its pragmatic power is illustrated with three case studies: Model-based diagnosis, Cartographic Generalization, and learning Hierarchical Hidden Markov Models.

Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St.... Collaborative Networks for a Sustainable World - 11th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2010, St. Etienne, France, October 11-13, 2010, Proceedings (Hardcover, Edition.)
Luis M. Camarinha-Matos, Xavier Boucher, Hamideh Afsarmanesh
R2,818 Discovery Miles 28 180 Ships in 18 - 22 working days

Collaborative Networks for a Sustainable World Aiming to reach a sustainable world calls for a wider collaboration among multiple stakeholders from different origins, as the changes needed for sustainability exceed the capacity and capability of any individual actor. In recent years there has been a growing awareness both in the political sphere and in civil society including the bu- ness sectors, on the importance of sustainability. Therefore, this is an important and timely research issue, not only in terms of systems design but also as an effort to b- row and integrate contributions from different disciplines when designing and/or g- erning those systems. The discipline of collaborative networks especially, which has already emerged in many application sectors, shall play a key role in the implemen- tion of effective sustainability strategies. PRO-VE 2010 focused on sharing knowledge and experiences as well as identi- ing directions for further research and development in this area. The conference - dressed models, infrastructures, support tools, and governance principles developed for collaborative networks, as important resources to support multi-stakeholder s- tainable developments. Furthermore, the challenges of this theme open new research directions for CNs. PRO-VE 2010 held in St.

Component Database Systems (Hardcover): Klaus R. Dittrich, Andreas Geppert Component Database Systems (Hardcover)
Klaus R. Dittrich, Andreas Geppert
R1,788 Discovery Miles 17 880 Ships in 10 - 15 working days



"Component Database Systems" is a collection of invited chapters by the researchers making the most influential contributions in the database industry's trend toward componentization


This book represents the sometimes-divergent, sometimes-convergent approaches taken by leading database vendors as they seek to establish commercially viable componentization strategies. Together, these contributions form the first book devoted entirely to the technical and architectural design of component-based database systems. In addition to detailing the current state of their research, the authors also take up many of the issues affecting the likely future directions of component databases.


If you have a stake in the evolution of any of today's leading database systems, this book will make fascinating reading. It will also help prepare you for the technology that is likely to become widely available over the next several years.
* Is comprised of contributions from the field's most highly respected researchers, including key figures at IBM, Oracle, Informix, Microsoft, and POET.
* Represents the entire spectrum of approaches taken by leading software companies working on DBMS componentization strategies.
* Covers component-focused architectures, methods for hooking components into an overall system, and support for component development.
* Examines the component technologies that are most valuable to Web-based and multimedia databases.
* Presents a thorough classification and overview of component database systems.

Technology for Smart Futures (Hardcover, 1st ed. 2018): Mohammad Dastbaz, Hamid Arabnia, Babak Akhgar Technology for Smart Futures (Hardcover, 1st ed. 2018)
Mohammad Dastbaz, Hamid Arabnia, Babak Akhgar
R5,113 Discovery Miles 51 130 Ships in 10 - 15 working days

This book explores the nexus of Sustainability and Information Communication Technologies that are rapidly changing the way we live, learn, and do business. The monumental amount of energy required to power the Zeta byte of data traveling across the globe's billions of computers and mobile phones daily cannot be overstated. This ground-breaking reference examines the possibility that our evolving technologies may enable us to mitigate our global energy crisis, rather than adding to it. By connecting concepts and trends such as smart homes, big data, and the internet of things with their applications to sustainability, the authors suggest that emerging and ubiquitous technologies embedded in our daily lives may rightfully be considered as enabling solutions for our future sustainable development.

Social Media Retrieval (Hardcover, 2013 ed.): Naeem Ramzan, Roelof Van Zwol, Jong-Seok Lee, Kai Cluver, Xian-Sheng Hua Social Media Retrieval (Hardcover, 2013 ed.)
Naeem Ramzan, Roelof Van Zwol, Jong-Seok Lee, Kai Cluver, Xian-Sheng Hua
R4,968 Discovery Miles 49 680 Ships in 10 - 15 working days

Social media is now ubiquitous on the internet, generating both new possibilities and new challenges in information analysis and retrieval.

This comprehensive text/reference examines in depth the synergy between multimedia content analysis, personalization, and next-generation networking. The book demonstrates how this integration can result in robust, personalized services that provide users with an improved multimedia-centric quality of experience. Each chapter offers a practical step-by-step walkthrough for a variety of concepts, components and technologies relating to the development of applications and services.

Topics and features: provides contributions from an international and interdisciplinary selection of experts in their fields; introduces the fundamentals of social media retrieval, presenting the most important areas of research in this domain; examines the important topic of multimedia tagging in social environments, including geo-tagging; discusses issues of personalization and privacy in social media; reviews advances in encoding, compression and network architectures for the exchange of social media information; describes a range of applications related to social media.

Researchers and students interested in social media retrieval will find this book a valuable resource, covering a broad overview of state-of-the-art research and emerging trends in this area. The text will also be of use to practicing engineers involved in envisioning and building innovative social media applications and services.

Machine Learning - The Ultimate Guide to Machine Learning, Neural Networks and Deep Learning for Beginners Who Want to... Machine Learning - The Ultimate Guide to Machine Learning, Neural Networks and Deep Learning for Beginners Who Want to Understand Applications, Artificial Intelligence, Data Mining, Big Data and More (Hardcover)
Herbert Jones
R715 R644 Discovery Miles 6 440 Save R71 (10%) Ships in 18 - 22 working days
R-Trees: Theory and Applications (Hardcover, 2006 ed.): Yannis Manolopoulos, Alexandros Nanopoulos, Apostolos N. Papadopoulos,... R-Trees: Theory and Applications (Hardcover, 2006 ed.)
Yannis Manolopoulos, Alexandros Nanopoulos, Apostolos N. Papadopoulos, Yannis Theodoridis
R4,018 Discovery Miles 40 180 Ships in 18 - 22 working days

Space support in databases poses new challenges in every part of a database management system & the capability of spatial support in the physical layer is considered very important. This has led to the design of spatial access methods to enable the effective & efficient management of spatial objects.

R-trees have a simplicity of structure & together with their resemblance to the B-tree, allow developers to incorporate them easily into existing database management systems for the support of spatial query processing.

This book provides an extensive survey of the R-tree evolution, studying the applicability of the structure & its variations to efficient query processing, accurate proposed cost models, & implementation issues like concurrency control and parallelism. Written for database researchers, designers & programmers as well as graduate students, this comprehensive monograph will be a welcome addition to the field.

Clustering and Information Retrieval (Hardcover, 2004 ed.): Weili Wu, Hui Xiong, S. Shekhar Clustering and Information Retrieval (Hardcover, 2004 ed.)
Weili Wu, Hui Xiong, S. Shekhar
R4,190 Discovery Miles 41 900 Ships in 18 - 22 working days

Clustering is an important technique for discovering relatively dense sub-regions or sub-spaces of a multi-dimension data distribution. Clus tering has been used in information retrieval for many different purposes, such as query expansion, document grouping, document indexing, and visualization of search results. In this book, we address issues of cluster ing algorithms, evaluation methodologies, applications, and architectures for information retrieval. The first two chapters discuss clustering algorithms. The chapter from Baeza-Yates et al. describes a clustering method for a general metric space which is a common model of data relevant to information retrieval. The chapter by Guha, Rastogi, and Shim presents a survey as well as detailed discussion of two clustering algorithms: CURE and ROCK for numeric data and categorical data respectively. Evaluation methodologies are addressed in the next two chapters. Ertoz et al. demonstrate the use of text retrieval benchmarks, such as TRECS, to evaluate clustering algorithms. He et al. provide objective measures of clustering quality in their chapter. Applications of clustering methods to information retrieval is ad dressed in the next four chapters. Chu et al. and Noel et al. explore feature selection using word stems, phrases, and link associations for document clustering and indexing. Wen et al. and Sung et al. discuss applications of clustering to user queries and data cleansing. Finally, we consider the problem of designing architectures for infor mation retrieval. Crichton, Hughes, and Kelly elaborate on the devel opment of a scientific data system architecture for information retrieval."

Trusted Information - The New Decade Challenge (Hardcover, 2001 ed.): Michel Dupuy, Pierre Paradinas Trusted Information - The New Decade Challenge (Hardcover, 2001 ed.)
Michel Dupuy, Pierre Paradinas
R5,414 Discovery Miles 54 140 Ships in 18 - 22 working days

Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security. The explosive growth of the Web is now faced with the formidable challenge of providing trusted information. IFIP/Sec'01 is the first of this decade (and century) and it will be devoted to "Trusted Information - the New Decade Challenge" This proceedings are divided in eleven parts related to the conference program. Session are dedicated to technologies: Security Protocols, Smart Card, Network Security and Intrusion Detection, Trusted Platforms. Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management. The year 2001 is a double anniversary. First, fifteen years ago, the first IFIP/Sec was held in France (IFIP/Sec'86, Monte-Carlo) and 2001 is also the anniversary of smart card technology. Smart cards emerged some twenty years ago as an innovation and have now become pervasive information devices used for highly distributed secure applications. These cards let millions of people carry a highly secure device that can represent them on a variety of networks. To conclude, we hope that the rich "menu" of conference papers for this IFIP/Sec conference will provide valuable insights and encourage specialists to pursue their work in trusted information.

Elsevier's Dictionary of Cybernyms - Abbreviations and Acronyms used in Telecommunications, Electronics and Computer... Elsevier's Dictionary of Cybernyms - Abbreviations and Acronyms used in Telecommunications, Electronics and Computer Science (Hardcover)
T.R. Pyper, C.A.C Stout
R2,721 Discovery Miles 27 210 Ships in 10 - 15 working days

This dictionary was produced in response to the rapidly increasing amount of quasi-industrial jargon in the field of information technology, compounded by the fact that these somewhat esoteric terms are often further reduced to acronyms and abbreviations that are seldom explained. Even when they are defined, individual interpretations continue to diverge.


Until now the codes have been reproduced in separate (language) publications: there is no universal listing in alphabetical order that covers the English, French, Spanish and German languages. This dictionary sets out the English, French, Spanish and German alternatives as a single, merge-sorted whole.

Today, most of the codes have passed into the public domain, simply because they exist in most of the telecommunications systems installed throughout the developed (and developing) world and are largely known to most of those who work in that particular area. However, foreign variants often defy even the most astute observer. This dictionary seeks to clarify this bewildering situation as much as possible. The 26,000 definitions set out here, drawn from some 16,000 individual cybernyms, cover computing, electronics, telecommunications (including intelligent networks and mobile telephony), together with satellite technology and Internet/Web terminology.


Annex I lists some of the innumerable file types found in the filing systems of computers using powerful desktop managers and Annex II lists the abbreviations of country names found in universal resource locators (URL).


"Elsevier's Dictionary of Cybernyms" is a useful tool for translators, students, universities and computer enthusiasts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, … Hardcover R1,961 R1,830 Discovery Miles 18 300
Blockchain Life - Making Sense of the…
Kary Oberbrunner, Lee Richter Hardcover R506 Discovery Miles 5 060
The Data Quality Blueprint - A Practical…
John Parkinson Hardcover R1,606 Discovery Miles 16 060
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian Digital product license key R1,024 Discovery Miles 10 240
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Advances in the Convergence of…
Tiago M. Fernandez-Carames, Paula Fraga-Lamas Hardcover R2,555 Discovery Miles 25 550
Build A Large Language Model - From…
Sebastian Raschka Paperback R1,195 Discovery Miles 11 950
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030
Database Principles - Fundamentals of…
Carlos Coronel, Keeley Crockett, … Paperback R1,109 R995 Discovery Miles 9 950

 

Partners