
ilość książek w kategorii: 38271
![]() |
Coordination of Large-Scale Multiagent Systems
ISBN: 9780387261935 / Angielski / Twarda / 2005 / 352 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Challenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains such as space exploration, military and disaster response, groups of this size (or larger) are required to achieve extremely complex, distributed goals. To effectively and efficiently achieve their goals, members of a group need to cohesively follow a joint course of action while remaining flexible to unforeseen developments in the environment. Coordination of Large-Scale Multiagent Systems provides extensive coverage of the latest research and... Challenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains such as space exploration... |
cena:
603,81 |
![]() |
Biometric User Authentication for It Security: From Fundamentals to Handwriting
ISBN: 9780387261942 / Angielski / Twarda / 2005 / 284 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue technology for automated determination or confirmation of the identity of subjects based on measurements of physiological or behavioral traits of humans. Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological traits such as fingerprint, iris, face) and active (learned and trained behavior such as voice, handwriting and gait) biometric... Biometric user authentication techniques evoke an enormous interest by science, industry and society. Scientists and developers constantly pursue t... |
cena:
402,53 |
![]() |
Transaction-Level Modeling with Systemc: Tlm Concepts and Applications for Embedded Systems
ISBN: 9780387262321 / Angielski / Twarda / 2005 / 272 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Currently employed at STMicroelectronics, Transactional-Level Modeling (TLM) puts forward a novel SoC design methodology beyond RTL with measured improvements of productivity and first time silicon success. The SystemC consortium has published the official TLM development kit in May 2005 to standardize this modeling technique. The library is flexible enough to model components and systems at many different levels of abstractions: from cycle-accurate to untimed models, and from bit-true behavior to floating-point algorithms. However, careful selection of the abstraction... Currently employed at STMicroelectronics, Transactional-Level Modeling (TLM) puts forward a novel SoC design methodology beyond RTL with measured i... |
cena:
684,33 |
![]() |
Unconstrained Face Recognition
ISBN: 9780387264073 / Angielski / Twarda / 2005 / 244 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun to investigate face recognition under unconstrained conditions. Unconstrained Face Recognition provides a comprehensive review of this biometric, especially face recognition from video, assembling a collection of novel approaches that are able to recognize human faces under various unconstrained situations. The underlying basis of these approaches is that, unlike conventional face recognition algorithms, they exploit the... Face recognition has been actively studied over the past decade and continues to be a big research challenge. Just recently, researchers have begun... |
cena:
402,53 |
![]() |
Data Warehousing and Data Mining Techniques for Cyber Security
ISBN: 9780387264097 / Angielski / Twarda / 2006 / 159 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important. Data Warehousing and Data... Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The eve... |
cena:
402,53 |
![]() |
Knowledge Sharing in the Integrated Enterprise: Interoperability Strategies for the Enterprise Architect
ISBN: 9780387266084 / Angielski / Twarda / 2005 / 458 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Enterprise Architects, in their endeavor to achieve Enterprise Integration, have limited guidance on how best to use Enterprise Models and Modeling Tools to support their practice. It is widely recognized that the practice of engineering enterprises needs a number of models, but how to maintain the relation between these models with ease is still a problem. Model interoperability is an issue on multiople counts: - How to interchange models between enterprise modeling tools? - How to maintain the interdependencies between models - whether they describe the enterprise on the... Enterprise Architects, in their endeavor to achieve Enterprise Integration, have limited guidance on how best to use Enterprise Models and Modeling... |
cena:
402,53 |
![]() |
From Specification to Embedded Systems Application
ISBN: 9780387275574 / Angielski / Twarda / 2005 / 320 str. Termin realizacji zamówienia: ok. 22 dni roboczych. As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvements of already existing functions, as well as the compliance with traffic regulations and customer requirements, have only become possible by the increasing use of electronic systems, especially in the fields of driving, safety, reliability, and functionality. Along with the functionalities that increase in number and have to cooperate, the complexity of the entire system will increase. Synergy effects resulting from distributed... As almost no other technology, embedded systems is an essential element of many innovations in automotive engineering. New functions and improvemen... |
cena:
402,53 |
![]() |
Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges: Ifip Tc8 Wg 8.2 International Working Conference, August 1-3, 20
ISBN: 9780387275604 / Angielski / Twarda / 2005 / 370 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization, to explore and understand the shifting boundaries and dependencies between organizational activities and their computer support. The book marks the result of the IFIP WG 8. 2 conference on "Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges. " Since its inception in the late 1970s, IFIP WG 8. 2 has sought to understand how computer-based information systems interact and must be designed as an integrated part of...
This book records one of the continuous attempts of the IFIP Working Group 8. 2, studying the interaction of information systems and the organization,...
|
cena:
402,53 |
![]() |
Understanding Intrusion Detection Through Visualization
ISBN: 9780387276342 / Angielski / Twarda / 2005 / 145 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Goteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. It was my honor to serve as the "opponent" at Dr. Axelsson's examination. In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating its significance and contributions to the field and then to introduce the work to the attendees at the examination. This done, the candidate presents the...
This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Goteborg, Sweden. The dissertation, in turn collects a ...
|
cena:
402,53 |
![]() |
Secure Data Management in Decentralized Systems
ISBN: 9780387276946 / Angielski / Twarda / 2006 / 462 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been conducted. Fruitful results have been produced, many of which are widely adopted in commercial and military database management systems. In recent years, the research scope of database security has been greatly expanded due to the rapid development of the global internetworked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of - ganizations....
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management sys...
|
cena:
603,81 |
![]() |
Real-Time Vision for Human-Computer Interaction
ISBN: 9780387276977 / Angielski / Twarda / 2005 / 302 str. Termin realizacji zamówienia: ok. 22 dni roboczych. 200Ts Vision of Vision One of my formative childhood experiences was in 1968 stepping into the Uptown Theater on Connecticut Avenue in Washington, DC, one of the few movie theaters nationwide that projected in large-screen cinerama. I was there at the urging of a friend, who said I simply must see the remarkable film whose run had started the previous week. "You won't understand it," he said, "but that doesn't matter. " All I knew was that the film was about science fiction and had great special eflPects. So I sat in the front row of the balcony, munched my popcorn, sat back, and experienced...
200Ts Vision of Vision One of my formative childhood experiences was in 1968 stepping into the Uptown Theater on Connecticut Avenue in Washington, DC,...
|
cena:
603,81 |
![]() |
A Classical Introduction to Cryptography Exercise Book
ISBN: 9780387279343 / Angielski / Twarda / 2005 / 254 str. Termin realizacji zamówienia: ok. 22 dni roboczych. TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
|
cena:
173,06 |
![]() |
Genetic Programming Theory and Practice III
ISBN: 9780387281100 / Angielski / Twarda / 2005 / 310 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machine learning method of Genetic Programming (GP). The contributions developed from a third workshop at the University of Michigan's Center for the Study of Complex Systems, where leading international genetic programming theorists from major universities and active practitioners from leading industries and businesses meet to examine and challenge... Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and... |
cena:
603,81 |
![]() |
Methods and Procedures for the Verification and Validation of Artificial Neural Networks
ISBN: 9780387282886 / Angielski / Twarda / 2005 / 278 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. Currently no standards exist to verify and validate neural network-based systems. NASA Independent Verification and Validation Facility has contracted the Institute for Scientific Research, Inc. to perform research on this topic and develop a comprehensive guide to performing V&V on adaptive systems, with emphasis on neural networks used in safety-critical or mission-critical applications. ...Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating charac... |
cena:
402,53 |
![]() |
Artificial Intelligence Applications and Innovations II: Ifip Tc12 and Wg12.5 - Second Ifip Conference on Artificial Intelligence Applications and Inn
ISBN: 9780387283180 / Angielski / Twarda / 2005 / 881 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Artificial Intelligence is one of the oldest and most exciting subfields of computing, covnering such areas as intelligent robotics, intelligent planning and scheduling, model-based reasoning, fault diagnosis, natural language processing, maching translation, knowledge representation and reasoning, knowledge-based systems, knowledge engineering, intelligent agents, machine learning, neural nets, genetic algorithms and knowledge management. The papers in this volume comprise the refereed proceedings of the Second International Conference on Artificial Intelligence Applications and... Artificial Intelligence is one of the oldest and most exciting subfields of computing, covnering such areas as intelligent robotics, intelligent pl... |
cena:
805,10 |
![]() |
Hyperspectral Data Compression
ISBN: 9780387285795 / Angielski / Twarda / 2005 / 418 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Hyperspectral Data Compression provides a survey of recent results in the field of compression of remote sensed 3D data, with a particular interest in hyperspectral imagery. Chapter 1 addresses compression architecture, and reviews and compares compression methods. Chapters 2 through 4 focus on lossless compression (where the decompressed image must be bit for bit identical to the original). Chapter 5, contributed by the editors, describes a lossless algorithm based on vector quantization with extensions to near lossless and possibly lossy compression for efficient browning...
Hyperspectral Data Compression provides a survey of recent results in the field of compression of remote sensed 3D data, with a parti...
|
cena:
603,81 |
![]() |
Data Streams: Models and Algorithms
ISBN: 9780387287591 / Angielski / Twarda / 2006 / 380 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Data Streams: Models and Algorithms primarily discusses issues related to the mining aspects of data streams. Recent progress in hardware technology makes it possible for organizations to store and record large streams of transactional data. For example, even simple daily transactions such as using the credit card or phone result in automated data storage, which brings us to a fairly new topic called data streams. This volume covers mining aspects of data streams comprehensively: each contributed chapter contains a survey on the topic, the key ideas in the field for that particular... Data Streams: Models and Algorithms primarily discusses issues related to the mining aspects of data streams. Recent progress in hardware technolog... |
cena:
644,07 |
![]() |
Quality of Protection: Security Measurements and Metrics
ISBN: 9780387290164 / Angielski / Twarda / 2006 / 198 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis... Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano... |
cena:
805,10 |
![]() |
Modelling and Reasoning with Vague Concepts
ISBN: 9780387290560 / Angielski / Twarda / 2006 / 246 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Vague concepts are intrinsic to human communication. Somehow it would seems that vagueness is central to the flexibility and robustness of natural l- guage descriptions. If we were to insist on precise concept definitions then we would be able to assert very little with any degree of confidence. In many cases our perceptions simply do not provide sufficient information to allow us to verify that a set of formal conditions are met. Our decision to describe an individual as 'tall' is not generally based on any kind of accurate measurement of their height. Indeed it is part of the power of human...
Vague concepts are intrinsic to human communication. Somehow it would seems that vagueness is central to the flexibility and robustness of natural l- ...
|
cena:
402,53 |
![]() |
Similarity Search: The Metric Space Approach
ISBN: 9780387291468 / Angielski / Twarda / 2005 / 220 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The area of similarity searching is a very hot topic for both research and c- mercial applications. Current data processing applications use data with c- siderably less structure and much less precise queries than traditional database systems. Examples are multimedia data like images or videos that offer query by example search, product catalogs that provide users with preference based search, scientific data records from observations or experimental analyses such as biochemical and medical data, or XML documents that come from hetero- neous data sources on the Web or in intranets and thus...
The area of similarity searching is a very hot topic for both research and c- mercial applications. Current data processing applications use data with...
|
cena:
402,53 |