Utvidet returrett til 31. januar 2025

Bøker i SpringerBriefs in Computer Science-serien

Filter
Filter
Sorter etterSorter Serierekkefølge
  • - Improving Communication and Memory Accesses
    av Eduardo H. M. Cruz, Matthias Diener & Philippe O. A. Navaux
    663,-

    This book presents a study on how thread and data mapping techniques can be used to improve the performance of multi-core architectures.It describes how the memory hierarchy introduces non-uniform memory access, and how mapping can be used to reduce the memory access latency in current hardware architectures.On the software side, this book describes the characteristics present in parallel applications that are used by mapping techniques to improve memory access.Several state-of-the-art methods are analyzed, and the benefits and drawbacks of each one are identified.

  • - A Brief Introduction
    av Jie Hu & Kun Yang
    663,-

    It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band.

  • av Akka Zemmari
    785,-

    This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine learning.

  • - from DNA to Artificial Intelligence
    av Mario Alemi
    274,-

    This Open Access book will explore questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and ΓÇônowΓÇô connected human societies? Physicists have good models for describing the evolution of the universe since the Big Bang, but can we apply the same concepts to the evolution of aggregated matter ΓÇôliving matter included? The Amazing Journey analyzes the latest results in chemistry, biology, neuroscience, anthropology and sociology under the light of the evolution of intelligence, seen as the ability of processing information. The main strength of this book is using just two concepts used in physics ΓÇôinformation and energyΓÇô to explain: The emergence and evolution of life: procaryotes, eukaryotes and complex organismsThe emergence and evolution of the brainThe emergence and evolution of societies (human and not)Possible evolution of our "internet society" and the role that Artificial Intelligence is playing

  • av Yi Li
    648,-

    This book presents a comprehensive review of heterogeneous face analysis and synthesis, ranging from the theoretical and technical foundations to various hot and emerging applications, such as cosmetic transfer, cross-spectral hallucination and face rotation.

  • av Arindam Chaudhuri
    655,-

    This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.

  • - Principles and Applications
    av Zhi Jin & Lili Mou
    729,-

    This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.

  • - Principles, Challenges, and a Survey of Solutions
    av Arthur Francisco Lorenzon
    663,-

  • - Related Technologies, Challenges and Future Prospects
    av Min Chen, Shiwen Mao, Yin Zhang & m.fl.
    873,-

    This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.

  • av Atle Refsdal
    739,-

    This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence.

  • av Santosh Singh Rathore
    648,-

    This book addresses software faults-a critical issue that not only reduces the quality of software, but also increases their development costs.

  • av Daniil Ryabko
    663,-

    The considered problems include homogeneity testing (the so-called two sample problem), clustering with respect to distribution, clustering with respect to independence, change point estimation, identity testing, and the general problem of composite hypotheses testing.

  • av Alvin Penner
    663,-

    This Brief investigates the intersections that occur between three different areas of study that normally would not touch each other: ODF, spline theory, and topology.The Least Squares Orthogonal Distance Fitting (ODF) method has become the standard technique used to develop mathematical models of the physical shapes of objects, due to the fact that it produces a fitted result that is invariant with respect to the size and orientation of the object. It is normally used to produce a single optimum fit to a specific object; this work focuses instead on the issue of whether the fit responds continuously as the shape of the object changes. The theory of splines develops user-friendly ways of manipulating six different splines to fit the shape of a simple family of epiTrochoid curves: two types of Bézier curve, two uniform B-splines, and two Beta-splines. This work will focus on issues that arise when mathematically optimizing the fit. There are typically multiple solutions to the ODF method, and the number of solutions can often change as the object changes shape, so two topological questions immediately arise: are there rules that can be applied concerning the relative number of local minima and saddle points, and are there different mechanisms available by which solutions can either merge and disappear, or cross over each other and interchange roles. The author proposes some simple rules which can be used to determine if a given set of solutions is internally consistent in the sense that it has the appropriate number of each type of solution.

  • av Mayank Kejriwal
    777,-

    The vast amounts of ontologically unstructured information on the Web, including HTML, XML and JSON documents, natural language documents, tweets, blogs, markups, and even structured documents like CSV tables, all contain useful knowledge that can present a tremendous advantage to the Artificial Intelligence community if extracted robustly, efficiently and semi-automatically as knowledge graphs. Domain-specific Knowledge Graph Construction (KGC) is an active research area that has recently witnessed impressive advances due to machine learning techniques like deep neural networks and word embeddings. This book will synthesize Knowledge Graph Construction over Web Data in an engaging and accessible manner. The book describes a timely topic for both early -and mid-career researchers. Every year, more papers continue to be published on knowledge graph construction, especially for difficult Web domains. This book serves as a useful reference, as well as an accessible but rigorous overview of this body of work. The book presents interdisciplinary connections when possible to engage researchers looking for new ideas or synergies. The book also appeals to practitioners in industry and data scientists since it has chapters on both data collection, as well as a chapter on querying and off-the-shelf implementations.

  • - A Survey
    av Mate Horvath
    785,-

    This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.

  • - Lessons for Introductory Python
    av Brian Kokensparger
    665,-

    As an introduction to programming for the Digital Humanities (DH), this book presents six key assignments oriented on DH topics.

  • - Push-Based Data in Research & Practice
    av Wolfram Wingerath
    720,-

    Second, the high-level classification scheme illustrated above provides a gentle introduction into the system space of data management: Abstracting from the extreme system diversity in this field, it helps readers build a mental model of the available options.

  • av Anthony L. Caterini
    655,-

    This SpringerBrief describes how to build a rigorous end-to-end mathematical framework for deep neural networks. In particular, the authors derive gradient descent algorithms in a unified way for several neural network structures, including multilayer perceptrons, convolutional neural networks, deep autoencoders and recurrent neural networks.

  • av Rae Earnshaw
    640,-

    This book examines how digital technology is being used to assist the artists and designers. Augmented and virtual reality techniques can be used to preview designs before they are finalized and implemented. Art and design have shaped the values, social structures, communications, and the culture of communities and civilisations.

  • - A Concise and Practical Introduction
    av Joakim Kavrestad
    799,-

  • av John Davis, Stefan Pappe, Kristof Kloeckner, m.fl.
    729,-

    As more and more industries are experiencing digital disruption, using information technology to enable a competitive advantage becomes a critical success factor for all enterprises. This book covers the authors' insights on how AI technologies can fundamentally reshape the IT services delivery lifecycle to deliver better business outcomes through a data-driven and knowledge-based approach. Three main challenges and the technologies to address them are discussed in detail:· Gaining actionable insight from operational data for service management automation and improved human decision making· Capturing and enhancing expert knowledge throughout the lifecycle from solution design to ongoing service improvement · Enabling self-service for service requests and problem resolution, through intuitive natural language interfacesThe authors are top researchers and practitioners with deep experience in the fields of artificial intelligence and IT service management and are discussing both practical advice for IT teams and advanced research results. The topics appeal to CIOs and CTOs as well as researchers who want to understand the state of the art of applying artificial intelligence to a very complex problem space. Although the book is concise, it comprehensively discuss topics like gaining insight from operational data for automatic problem diagnosis and resolution as well as continuous service optimization, AI for solution design and conversational self-service systems.

  • av Krystina Madej
    728,-

    dsfsdfsf

  • av Dizhi Zhou & Wei Song
    726,-

    This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network.

  • av Yves Sucaet
    590,-

  • - Complex Motion Pattern Queries
    av Marcos R. Vieira & Vassilis J. Tsotras
    655,-

    This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects.

  • av John F. Dooley
    726,-

    For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.

  • - Tutorials on Theory and Problems
    av Ovidiu Bagdasar
    810,-

    Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree.

  • - A Comprehensive Survey of Vulnerabilities and Academic Research
    av Angelos D. Keromytis
    726,-

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases.

  • av Marcio Moretto Ribeiro
    640,-

    however, classical belief revision is not well suited for logics such as Description Logics.Belief Revision in Non-Classical Logics presents a framework which can be applied to a wide class of logics that include - besides most Description Logics such as the ones behind OWL - Horn Logic and Intuitionistic logic, amongst others.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.