![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming > General
Wireless Public Safety Networks, Volume One: Overview and Challenges presents the latest advances in the wireless Public Safety Networks (PSNs) field, the networks established by authorities to either prepare the population for an eminent catastrophe, or as support during crisis and normalization phases. Maintaining communication capabilities in a disaster scenario is crucial for avoiding loss of lives and damages to property. Wireless Public Safety Networks examines past communication failures that have directly contributed to the loss of lives. This book will give readers a broad view of the PSNs field, analyzing the benefits PSNs may bring to society, the main challenges related to the establishment and maintenance of these networks, the latest advancements in the field, and future perspectives.
Topics in Parallel and Distributed Computing provides resources and guidance for those learning PDC as well as those teaching students new to the discipline. The pervasiveness of computing devices containing multicore CPUs and GPUs, including home and office PCs, laptops, and mobile devices, is making even common users dependent on parallel processing. Certainly, it is no longer sufficient for even basic programmers to acquire only the traditional sequential programming skills. The preceding trends point to the need for imparting a broad-based skill set in PDC technology. However, the rapid changes in computing hardware platforms and devices, languages, supporting programming environments, and research advances, poses a challenge both for newcomers and seasoned computer scientists. This edited collection has been developed over the past several years in conjunction with the IEEE technical committee on parallel processing (TCPP), which held several workshops and discussions on learning parallel computing and integrating parallel concepts into courses throughout computer science curricula.
Interfaces within computers, computing, and programming are consistently evolving and continue to be relevant to computer science as it progresses. Advancements in human-computer interactions, their aesthetic appeal, ease of use, and learnability are made possible due to the creation of user interfaces and result in further growth in science, aesthetics, and practical applications. Interface Support for Creativity, Productivity, and Expression in Computer Graphics is a collection of innovative research on usability, the apps humans use, and their sensory environment. While highlighting topics such as image datasets, augmented reality, and visual storytelling, this book is ideally designed for researchers, academicians, graphic designers, programmers, software developers, educators, multimedia specialists, and students seeking current research on uniting digital content with the physicality of the device through applications, thus addressing sensory perception.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
Inspired by the success of their best-selling introductory programming text, Java Software Solutions, authors Lewis, DePasquale, and Chase now release Java Foundations, Third Edition. This text is a comprehensive resource for instructors who want a two-or three-semester introduction to programming textbook that includes detail on data structures topics. Java Foundations introduces a Software Methodology early on and revisits it throughout to ensure students develop sound program development skills from the beginning. Control structures are covered before writing classes, providing a solid foundation of fundamental concepts and sophisticated topics.
This book explores how corpus linguistic techniques can be applied to close analysis of videogames as a text, particularly examining how language is used to construct representations of gender in fantasy videogames. The author demonstrates a wide array of techniques which can be used to both build corpora of videogames and to analyse them, revealing broad patterns of representation within the genre, while also zooming in to focus on diachronic changes in the representation of gender within a best-selling videogame series and a Massively Multiplayer Online Role Playing Game (MMORPG). The book examines gender as a social variable, making use of corpus linguistic methods to demonstrate how the language used to depict gender is complex but often repeated. This book combines fields including language and gender studies, new media studies, ludolinguistics, and corpus linguistics, and it will be of interest to scholars in these and related disciplines.
With the development of Web 2.0 technologies, the internet has become a huge platform for information and data sharing. As such, web services provide an important foundation for branching technologies in end-user computing and applications. To make online technology more accessible for users, it is important to optimize web services to function properly or offer a personalized experience. Innovative Solutions and Applications of Web Services Technology is a collection of innovative research on the methods and applications of existing technologies for web service usability and accessibility. Highlighting a range of topics including business processes, cyber-physical systems, and recommendation accuracy, this book is ideally designed for IT professionals, researchers, graduate-level students, software developers, academicians, and computer engineers seeking current research on adapting online information and services to user needs.
"Information Management: Gaining a Competitive Advantage with Data" is about making smart decisions to make the most of company information. Expert author William McKnight develops the value proposition for information in the enterprise and succinctly outlines the numerous forms of data storage. "Information Management" will enlighten you, challenge your preconceived notions, and help activate information in the enterprise. Get the big picture on managing data so that your team can make smart decisions by understanding how everything from workload allocation to data stores fits together. The practical, hands-on guidance in this book includes: Part 1: The importance of information management and analytics to business, and how data warehouses are used Part 2: The technologies and data that advance an organization, and extend data warehouses and related functionality Part 3: Big Data and NoSQL, and how technologies like Hadoop enable management of new forms of data Part 4: Pulls it all together, while addressing topics of agile development, modern business intelligence, and organizational change management Read the book cover-to-cover, or keep it within reach for a
quick and useful resource. Either way, this book will enable you to
master all of the possibilities for data or the broadest view
across the enterprise.
An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource management (CRM), and point of sale (POS), legal contract management, time tracking, accounts payable/receivable, payroll, SOX compliance tracking, budgeting, forecasting and training. In many cases, the organization is absolutely dependent that these applications be kept running. The importance of application administrators and the level to which organizations depend upon them is easily overlooked. "Application Administrators Handbook" provides an overview of
every phase of administering an application, from working with the
vendor before installation, the installation process itself,
importing data into the application, handling upgrades, working
with application users to report problems, scheduling backups,
automating tasks that need to be done on a repetitive schedule, and
finally retiring an application. It provides detailed, hands-on
instructions on how to perform many specific tasks that an
application administrator must be able to handle.
This book addresses the role of appropriate, specialized, structured pedagogy for game-based learning. It is an important reference for researchers who have carried out studies in the field of game-based learning with a focus on the digital learning environment. The educational landscape has dramatically changed in times of global pandemic urging us to search for new solutions, new educational pathways, and new agents for knowledge development. There is a need to support learning by using digital learning materials during remote learning or distance learning, where pedagogically structured game-based learning elements can play a role in motivating students to achieve. Utilizing game-based learning in education is not new, but this book adds substantially to the research base of the topic. The book reveals many new concepts, such as, balancing games and learning, supporting knowledge development, supporting the development of motivation, supporting balanced cognitive load in an effort to avoid ineffective forms of game-based learning
This book gathers outstanding research papers presented at the International Joint Conference on Advances in Computational Intelligence (IJCACI 2020), organized by Daffodil International University (DIU) and Jahangirnagar University (JU) in Bangladesh and South Asian University (SAU) in India. These proceedings present novel contributions in the areas of computational intelligence and offer valuable reference material for advanced research. The topics covered include collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, and signal and natural language processing.
Culture is dependent upon intertextuality to fuel the consumption and production of new media. The notion of intertextuality has gone through many iterations, but what remains constant is its stalwart application to bring to light what audiences value through the marriages of disparate ideology and references. Videogames, in particular, have a longstanding tradition of weaving texts together in multimedia formats that interact directly with players. Contemporary Research on Intertextuality in Video Games brings together game scholars to analyze the impact of video games through the lenses of transmediality, intermediality, hypertextuality, architextuality, and paratextuality. Unique in its endeavor, this publication discusses the vast web of interconnected texts that feed into digital games and their players. This book is essential reading for game theorists, designers, sociologists, and researchers in the fields of communication sciences, literature, and media studies.
Although the majority of information that is published by the current web is aimed at human consumption, the browsers which contain this information are only able to interpret HTML mark-up to visualize this content. Semantic web intends to address the stability between human and machine. Advancing Information Management through Semantic Web Concepts and Ontologies provides an analysis and introduction on the concept of combining the areas of semantic web and web mining. Emphasizing semantics in technologies, reasoning, content searching and social media, this book aims to be an essential source for practitioners, researchers and academics alike.
Since its first volume in 1960, "Advances in Computers" has
presented detailed coverage of innovations in computer hardware,
software, theory, design, and applications. It has also provided
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles usually allow.
As a result, many articles have become standard references that
continue to be of sugnificant, lasting value in this rapidly
expanding field.
Emerging as an effective alternative to organization-based information systems, cloud computing has been adopted by many businesses around the world. Despite the increased popularity, there remain concerns about the security of data in the cloud since users have become accustomed to having control over their hardware and software. Security, Trust, and Regulatory Aspects of Cloud Computing in Business Environments compiles the research and views of cloud computing from various individuals around the world. Detailing cloud security, regulatory and industry compliance, and trust building in the cloud, this book is an essential reference source for practitioners, professionals, and researchers worldwide, as well as business managers interested in an assembled collection of solutions provided by a variety of cloud users.
|
![]() ![]() You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,366
Discovery Miles 13 660
Formal Verification - An Essential…
Erik Seligman, Tom Schubert, …
Paperback
Research Anthology on Agile Software…
Information R Management Association
Hardcover
R16,153
Discovery Miles 161 530
An Introduction to XML and Web…
Anders Moller, Michael Schwartzbach
Paperback
R2,527
Discovery Miles 25 270
|