
ilość książek w kategorii: 38229
![]() |
Mining Sequential Patterns from Large Data Sets
ISBN: 9780387242460 / Angielski / Twarda / 2005 / 163 str. Termin realizacji zamówienia: ok. 22 dni roboczych. In many applications, e.g., bioinformatics, web access traces, system u- lization logs, etc., the data is naturally in the form of sequences. It has been of great interests to analyze the sequential data to find their inherent char- teristics. The sequential pattern is one of the most widely studied models to capture such characteristics. Examples of sequential patterns include but are not limited to protein sequence motifs and web page navigation traces. In this book, we focus on sequential pattern mining. To meet different needs of various applications, several models of sequential patterns...
In many applications, e.g., bioinformatics, web access traces, system u- lization logs, etc., the data is naturally in the form of sequences. It has b...
|
cena:
402,53 |
![]() |
Fuzzy Database Modeling with XML
ISBN: 9780387242484 / Angielski / Twarda / 2005 / 216 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy databases. This volume is the outgrowth of research the author has conducted in recent years. Fuzzy Database Modeling with XML introduces state-of-the-art information to the database research, while at the same time serving the information technology professional faced with a non-traditional application that defeats conventional approaches. The research on fuzzy conceptual models and fuzzy object-oriented databases is... Fuzzy Database Modeling with XML aims to provide a single record of current research and practical applications in the fuzzy datab... |
cena:
402,53 |
![]() |
Software Process Modeling
ISBN: 9780387242613 / Angielski / Twarda / 2005 / 208 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Software Process Modeling brings together experts to discuss relevant results in software process modeling, and expresses their personal view of this field. This book focuses on new aspects of software process modeling. Specifically, it deals with socio-technological aspects, process modeling for new development types (open source software, dependability applications, etc.) and organization change management. The computer audience is placing growing demands on the software industry today. Consumers are looking for more complex products that are, at the same time,... Software Process Modeling brings together experts to discuss relevant results in software process modeling, and expresses their pe... |
cena:
402,53 |
![]() |
Net-Centric Approaches to Intelligence and National Security
ISBN: 9780387242958 / Angielski / Twarda / 2005 / 178 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense, intelligence and national and international law enforcement agencies. In this volume we consider the web architectures and recent developments that make n- centric approaches for intelligence and national security possible. These include developments in information integration and recent advances in web services including the concept of the semantic web. Discovery, analysis and management of web-available data pose a number of interesting...
The development of net-centric approaches for intelligence and national security applications has become a major concern in many areas such as defense...
|
cena:
402,53 |
![]() |
Security in E-Learning
ISBN: 9780387243412 / Angielski / Twarda / 2005 / 185 str. Termin realizacji zamówienia: ok. 22 dni roboczych. As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this... As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this... |
cena:
402,53 |
![]() |
Algebraic Aspects of the Advanced Encryption Standard
ISBN: 9780387243634 / Angielski / Twarda / 2006 / 148 str. Termin realizacji zamówienia: ok. 22 dni roboczych. It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent Rijmcn used algebraic techniques to provide an unparalleled level of assurance against many standard statistical cryptanalytic tech niques. The cipher is a fitting tribute to their distinctive approach to cipher design. Since the publication of the AES, however, the very same algebraic structures have been the subject of increasing cryptanalytic attention and this monograph has been written to summarise current research. We hope that this work...
It is now more than five years since the Belgian block cipher Rijndael was chosen as the Advanced Encryption Standard {AES). Joan Daemen and Vincent R...
|
cena:
422,66 |
![]() |
Intelligence and Security Informatics for International Security: Information Sharing and Data Mining
ISBN: 9780387243795 / Angielski / Twarda / 2006 / 204 str. Termin realizacji zamówienia: ok. 22 dni roboczych. On September 11, 2001 the World became completely cognizant of the security challenges it faces on an international scale. With this awareness a commitment has come from the scientific, engineering, and health communities to help meet the world meet an array of security challenges. From these activities the science of "Intelligence and Security Informatics," is emerging, which will influence a new generation of policy makers, practitioners, researchers, and students. INTELLIGENCE AND SECURITY INFORMATICS FOR INTERNATIONAL SECURITY: Information Sharing and Data Mining... On September 11, 2001 the World became completely cognizant of the security challenges it faces on an international scale. With this awareness a co... |
cena:
805,10 |
![]() |
Evolvable Hardware
ISBN: 9780387243863 / Angielski / Twarda / 2006 / 224 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Evolvable hardware (EHW) refers to hardware whose architecture/structure and functions change dynamically and autonomously in order to improve its performance in carrying out tasks. The emergence of this field has been profoundly influenced by the progress in reconfigurable hardware and evolutionary computation. Traditional hardware can be inflexible--the structure and its functions are often impossible to change once it is created. However, most real world problems are not fixed--they change with time. In order to deal with these problems efficiently and effectively, different hardware... Evolvable hardware (EHW) refers to hardware whose architecture/structure and functions change dynamically and autonomously in order to improve its ... |
cena:
402,53 |
![]() |
Computation Engineering: Applied Automata Theory and Logic
ISBN: 9780387244181 / Angielski / Twarda / 2006 / 472 str. Termin realizacji zamówienia: ok. 22 dni roboczych. It takes more e?ort to verify that digital system designs are correct than it does to design them, and as systems get more complex the proportion of cost spent on veri?cation is increasing (one estimate is that veri?cation complexity rises as the square of design complexity). Although this veri?cation crisis was predicted decades ago, it is only recently that powerful methods based on mathematical logic and automata theory have come to the designers rescue. The ?rst such method was equivalence checking, which automates Boolean algebra calculations.Nextcamemodelchecking, whichcanautomatically...
It takes more e?ort to verify that digital system designs are correct than it does to design them, and as systems get more complex the proportion of c...
|
cena:
370,17 |
![]() |
Communications and Multimedia Security: 8th Ifip Tc-6 Tc-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, the L
ISBN: 9780387244853 / Angielski / Twarda / 2005 / 290 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation,... Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of C... |
cena:
402,53 |
![]() |
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing
ISBN: 9780387245157 / Angielski / Miękka / 2005 / 776 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Fuzzy Models and Algorithms for Pattern Recognition and Image Processing presents a comprehensive introduction of the use of fuzzy models in pattern recognition and selected topics in image processing and computer vision. Unique to this volume in the Kluwer Handbooks of Fuzzy Sets Series is the fact that this book was written in its entirety by its four authors. A single notation, presentation style, and purpose are used throughout. The result is an extensive unified treatment of many fuzzy models for pattern recognition. The main topics are clustering and...
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing presents a comprehensive introduction of the use of fuzzy mo...
|
cena:
1207,67 |
![]() |
Multi-Agent Programming: Languages, Platforms and Applications
ISBN: 9780387245683 / Angielski / Twarda / 2005 / 296 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Multi-Agent Programming is an essential reference for anyone interested in the most up-to-date developments in MAS programming. While previous research has focused on the development of formal and informal approaches to analyze and specify Multi-Agent Systems, this book focuses on the development of programming languages and tools which not only support MAS programming, but also implement key concepts of MAS in a unified framework. Part I describes approaches that rely on computational logic or process algebra Jason, 3APL, IMPACT, and CLAIM/SyMPA. Part II presents... Multi-Agent Programming is an essential reference for anyone interested in the most up-to-date developments in MAS programming. Wh... |
cena:
603,81 |
![]() |
Information Processing and Security Systems
ISBN: 9780387250915 / Angielski / Twarda / 2005 / 475 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Information Processing and Security Systems is a collection of forty papers that were originally presented at an international multi-conference on Advanced Computer Systems (ACS) and Computer Information Systems and Industrial Management Applications (CISIM) held in Elk, Poland. This volume describes the latest developments in advanced computer systems and their applications within artificial intelligence, biometrics and information technology security. The volume also includes contributions on computational methods, algorithms and applications, computational science,... Information Processing and Security Systems is a collection of forty papers that were originally presented at an international mul... |
cena:
805,10 |
![]() |
A Classical Introduction to Cryptography: Applications for Communications Security
ISBN: 9780387254647 / Angielski / Twarda / 2005 / 336 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature... A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication securit... |
cena:
442,79 |
![]() |
Perspectives and Policies on Ict in Society: An Ifip Tc9 (Computers and Society) Handbook
ISBN: 9780387255873 / Angielski / Twarda / 2005 / 290 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) will bring about an inevitable transition from "industrial" to "information" or "knowledge-based" economies and societies. It is assumed that all aspects of our economic and social lives, in both the public and private spheres, will be radically different from what they are today. The World Summit on the Information Society (Geneva 2003 - Tunis 2005) shows the importance of a worldwide reflection on those topics. Perspectives and... Governments, the media, the information technology industry and scientists publicly argue that information and communication technologies (ICT) wil... |
cena:
402,53 |
![]() |
Computer Algebra Recipes: An Advanced Guide to Scientific Modeling
ISBN: 9780387257686 / Angielski / Miękka / 2007 / 374 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book presents a large number of computer algebra worksheets or "recipes" that have been designed using MAPLE to provide tools for problem solving and to stimulate critical thinking. No prior knowledge of MAPLE is necessary. All relevant commands are introduced on a need-to-know basis and are indexed for easy reference. Each recipe features a scientific model or method and an interesting or amusing story designed to both entertain and enhance concept comprehension and retention. This book presents a large number of computer algebra worksheets or "recipes" that have been designed using MAPLE to provide tools for problem solv... |
cena:
201,24 |
![]() |
Information and Communication Technologies and Real-Life Learning: New Education for the Knowledge Society
ISBN: 9780387259963 / Angielski / Twarda / 2005 / 285 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Information and Communication Technologies in Real-Life Learning presents the results of an International Federation for Information Processing (IFIP) working conference held December 2004 in Melbourne, Australia. The working conference was organized by IFIP Working Group 3.2 (Informatics and ICT in Higher Education) and IFIP Working Group 3.4 (Professional and Vocational Education in Information Technology). Challenges originating in large scale economic and social change, rapid transition to a knowledge-based society and shortage of... Information and Communication Technologies in Real-Life Learning presents the results of an International Federation for Infor... |
cena:
402,53 |
![]() |
Relativistic Dynamics of a Charged Sphere: Updating the Lorentz-Abraham Model
ISBN: 9780387260211 / Angielski / Twarda / 2005 / 152 str. Termin realizacji zamówienia: ok. 22 dni roboczych. In addition to expanding and clarifying a number of sections of the first edition, it generalizes the analysis that eliminates the noncausal pre-acceleration so that it applies to removing any pre-deceleration as well. It also introduces a robust power series solution to the equation of motion that produces an extremely accurate solution to problems such as the motion of electrons in uniform magnetic fields. In addition to expanding and clarifying a number of sections of the first edition, it generalizes the analysis that eliminates the noncausal pre-ac... |
cena:
201,24 |
![]() |
Software-Implemented Hardware Fault Tolerance
ISBN: 9780387260600 / Angielski / Twarda / 2006 / 228 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Software-Implemented Hardware Fault Tolerance addresses the innovative topic of software-implemented hardware fault tolerance (SIHFT), i.e., how to deal with faults affecting the hardware by only (or mainly) acting on the software. The first SIHFT techniques were proposed and adopted several decades ago, but they have been the object of new interest in the past few years, mainly due to the need for developing low-cost safety-critical computer-based applications in fields such as automotive, biomedics, and telecommunications. Therefore, several new approaches to detect, and when... Software-Implemented Hardware Fault Tolerance addresses the innovative topic of software-implemented hardware fault tolerance (SIHFT), i.e., how to... |
cena:
603,81 |
![]() |
Continuous System Simulation
ISBN: 9780387261027 / Angielski / Twarda / 2006 / 644 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Highly computer-oriented text, introducing numerical methods and algorithms along with the applications and conceptual tools. Includes homework problems, suggestions for research projects, and open-ended questions at the end of each chapter. Written by our successful author who also wrote Continuous System Modeling, a best-selling Springer book first published in the 1991 (sold about 1500 copies).
Highly computer-oriented text, introducing numerical methods and algorithms along with the applications and conceptual tools. Includes homework pro... |
cena:
463,94 |