Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 23 of 23 matches in All Departments
Night of the Living Queers is a YA horror anthology that explores a night when anything is possible, exclusively featuring queer authors of color putting fresh spins on classic horror tropes and tales. No matter its name or occasion, Halloween is more than a Hallmark holiday, it's a symbol of transformation. NIGHT OF THE LIVING QUEERS is a YA horror anthology that explores how Halloween can be more than just candies and frights, but a night where anything is possible. Each short story is told through the lens of a different BIPOC teen and the Halloween night that changes their lives forever. Creative, creepy, and queer, this collection brings fresh terror, heart, and humor to young adult literature. Contributors include editors Alex Brown and Shelly Page, Kalynn Bayron, Ryan Douglass, Sara Farizan, Maya Gittelman, Kosoko Jackson, Em Liu, Vanessa Montalban, Ayida Shonibar, Tara Sim, Trang Thanh Tran, and Rebecca Kim Wells.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
GNSS can detect the seismic atmospheric-ionospheric variations, which can be used to investigate the seismo-atmospheric disturbance characteristics and provide insights on the earthquake. This book presents the theory, methods, results, and modeling of GNSS atmospheric seismology. Sesimo-tropospheric anomalies, Pre-/Co-/Post-seismic ionospheric disturbances, epicenter estimation, tsunami and volcano ionospheric disturbances, and volcanic plumes detection with GNSS will be presented and discussed per chapter in the book.
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage. This book covers the topic of RFID protocol design, optimization, and security. RFID systems allow for a much easier and error free inventory management and tracking, but the probabilistic nature of RFID protocols makes the design and optimization complex and challenging. Most existing commercial RFID systems are not well designed. In this book, the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
Drawing on political choice theories in international relations and
policy decision making, this book provides deep theoretical
understanding of bilateral cooperation and confrontation. Through
conceptual modeling and quantitative data analysis, Liu examines
how changes in political and economic issues affected relations
between China and the United States.
This book contains selected peer-reviewed papers that were presented at the Fourth International Symposium on Transportation Network Reliability (INSTR) Conference held at the University of Minnesota July 22-23, 2010. International scholars, from a variety of disciplines--engineering, economics, geography, planning and transportation-offer varying perspectives on modeling and analysis of the reliability of transportation networks in order to illustrate both vulnerability to day-to-day and unpredictability variability and risk in travel, and demonstrates strategies for addressing those issues. The scope of the chapters includes all aspects of analysis and design to improve network reliability, specifically user perception of unreliability of public transport, public policy and reliability of travel times, the valuation and economics of reliability, network reliability modeling and estimation, travel behavior and vehicle routing under uncertainty, and risk evaluation and management for transportation networks. The book combines new methodologies and state of the art practice to model and address questions of network unreliability, making it of interest to both academics in transportation and engineering as well as policy-makers and practitioners.
This research monograph discusses the close correlation between the magnetic and structural properties of thin films in the context of numerous examples of epitaxial metal films, while emphasis is laid on the stabilization of novel structures compared to the bulk material. Further options, possibilities, and limits for applications are given. Techniques for the characterization of thin films are addressed as well.
A Twenty-First Century Hamlet. Hayden Lichfield’s life is ripped apart when he finds his father murdered in their lab, and the camera logs erased. The killer can only have been after one thing: the Sisyphus Formula the two of them developed together, which might one day reverse death itself. Hoping to lure the killer into the open, Hayden steals the research. In the process, he uncovers a recording his father made in the days before his death, and a dying wish: Avenge me… With the lab on lockdown, Hayden is trapped with four other people—his uncle Charles, lab technician Gabriel Rasmussen, research intern Felicia Xia and their head of security, Felicia’s father Paul—one of whom must be the killer. His only sure ally is the lab’s resident artificial intelligence, Horatio, who has been his dear friend and companion since its creation. With his world collapsing, Hayden must navigate the building’s secrets, uncover his father’s lies, and push the boundaries of sanity in the pursuit of revenge.
This unique compendium focuses on the design and implementation of emerging transport protocols and task scheduling mechanisms to mitigate congestion in datacentre networks. Datacenters have become a critical infrastructure for hosting user-facing online services such as web search and social networking.For datacenter transport, this volume highlights the design and implementation details of the state-of-art transport protocols that not only achieves optimal performance in terms of minimizing flow completion times but are also deployment friendly.Moreover, this must-have reference material also discusses the transport protocols for multi-tenant datacentre networks. For datacenter task scheduling, the book introduces an innovative task placement framework that considers network scheduling while making task placement decisions.
This unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.
Multimodal Perception and Secure State Estimation for Robotic Mobility Platforms Enables readers to understand important new trends in multimodal perception for mobile robotics This book provides a novel perspective on secure state estimation and multimodal perception for robotic mobility platforms such as autonomous vehicles. It thoroughly evaluates filter-based secure dynamic pose estimation approaches for autonomous vehicles over multiple attack signals and shows that they outperform conventional Kalman filtered results. As a modern learning resource, it contains extensive simulative and experimental results that have been successfully implemented on various models and real platforms. To aid in reader comprehension, detailed and illustrative examples on algorithm implementation and performance evaluation are also presented. Written by four qualified authors in the field, sample topics covered in the book include: Secure state estimation that focuses on system robustness under cyber-attacks Multi-sensor fusion that helps improve system performance based on the complementary characteristics of different sensors A geometric pose estimation framework to incorporate measurements and constraints into a unified fusion scheme, which has been validated using public and self-collected data How to achieve real-time road-constrained and heading-assisted pose estimation This book will appeal to graduate-level students and professionals in the fields of ground vehicle pose estimation and perception who are looking for modern and updated insight into key concepts related to the field of robotic mobility platforms.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
This book contains selected peer-reviewed papers that were presented at the Fourth International Symposium on Transportation Network Reliability (INSTR) Conference held at the University of Minnesota July 22-23, 2010. International scholars, from a variety of disciplines--engineering, economics, geography, planning and transportation-offer varying perspectives on modeling and analysis of the reliability of transportation networks in order to illustrate both vulnerability to day-to-day and unpredictability variability and risk in travel, and demonstrates strategies for addressing those issues. The scope of the chapters includes all aspects of analysis and design to improve network reliability, specifically user perception of unreliability of public transport, public policy and reliability of travel times, the valuation and economics of reliability, network reliability modeling and estimation, travel behavior and vehicle routing under uncertainty, and risk evaluation and management for transportation networks. The book combines new methodologies and state of the art practice to model and address questions of network unreliability, making it of interest to both academics in transportation and engineering as well as policy-makers and practitioners.
This research monograph discusses the close correlation between the magnetic and structural properties of thin films in the context of numerous examples of epitaxial metal films, while emphasis is laid on the stabilization of novel structures compared to the bulk material. Further options, possibilities, and limits for applications are given. Techniques for the characterization of thin films are addressed as well.
Survival analysis concerns sequential occurrences of events governed by probabilistic laws. Recent decades have witnessed many applications of survival analysis in various disciplines. This book introduces both classic survival models and theories along with newly developed techniques. Readers will learn how to perform analysis of survival data by following numerous empirical illustrations in SAS. "Survival Analysis: Models and Applications"" " Presents basic techniques before leading onto some of the most advanced topics in survival analysis.Assumes only a minimal knowledge of SAS whilst enabling more experienced users to learn new techniques of data input and manipulation.Provides numerous examples of SAS code to illustrate each of the methods, along with step-by-step instructions to perform each technique.Highlights the strengths and limitations of each technique covered. Covering a wide scope of survival techniques and methods, from the introductory to the advanced, this book can be used as a useful reference book for planners, researchers, and professors who are working in settings involving various lifetime events. Scientists interested in survival analysis should find it a useful guidebook for the incorporation of survival data and methods into their projects.
Robotics began as a science fiction creation which has become quite real, first in assembly line operations such as automobile manufacturing, aeroplane construction etc. They have now reached such areas as the internet, ever-multiplying-medical uses and sophisticated military applications. Control of today's robots is often remote which requires even more advanced computer vision capabilities as well as sensors and interface techniques. Learning has become crucial for modern robotic systems as well. This new book brings together leading research in this exciting field.
Robotics began as a science fiction creation which has become quite real, first in assembly line operations such as automobile manufacturing, aeroplane construction etc. They have now reached such areas as the internet, ever-multiplying-medical uses and sophisticated military applications. Control of today's robots is often remote which requires even more advanced computer vision capabilities as well as sensors and interface techniques. Learning has become crucial for modern robotic systems as well. This book brings together leading research in this exciting field.
This book deals with control and learning in robotic systems.
This book deals with control and learning in robotic systems and computers.
Robotics began as a science fiction creation which has become quite real, first in assembly line operations such as automobile manufacturing, aeroplane construction etc. They have now reached such areas as the internet, ever-multiplying-medical uses and sophisticated military applications. Control of today's robots is often remote which requires even more advanced computer vision capabilities as well as sensors and interface techniques. Learning has become crucial for modern robotic systems as well. This new book deals with control and learning in robotic systems.
This book deals with control and learning in robotic systems.
|
You may like...
|