• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Springerbriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 
Quality-Aware Scheduling for Key-Value Data Stores

Chen Xu; Aoying Zhou
This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype framework of quality-aware scheduler as well as a demonstration of online applications. The book offers a rich blend of theory and practice which is suitable for students, researchers and practitioners interested in distributed systems, NoSQL key-value stores and scheduling.
This book comprehensively illustrates quality-ware scheduling in key-value stores. In addition, it provides scheduling strategies and a prototype fram...
cena: 201,24
 
Sublinear Algorithms for Big Data Applications

Dan Wang; Zhu Han
The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algorithms, explaining why they are vital to large scale data systems. It also demonstrates how to apply sublinear algorithms to three familiar big data applications: wireless sensor networks, big data processing in Map Reduce and smart grids. These applications present common experiences, bridging the theoretical advances of sublinear algorithms and the application domain. Sublinear Algorithms for Big Data Applications is suitable for researchers,...
The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algo...
cena: 201,24
 
Operators for Similarity Search: Semantics, Techniques and Usage Scenarios

Deepak P; Prasad M. Deshpande
The authors systematically survey the set of similarity operators, primarily focusing on their semantics, while also touching upon mechanisms for processing them effectively.The book starts off by providing introductory material on similarity search systems, highlighting the central role of similarity operators in such systems.
The authors systematically survey the set of similarity operators, primarily focusing on their semantics, while also touching upon mechanisms for proc...
cena: 201,24
 
Encrypted Email: The History and Technology of Message Privacy

Hilarie Orman

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the challenges in standardization, usability, and trust that interfere with the user experience for software protection. Chapters address the origins of email encryption and why email encryption is rarely used despite the myriad of its benefits -- benefits that cannot be obtained in any other way. The construction of a secure message and its entwining with public key technology are covered. Other chapters address both independent standards for secure...

This SpringerBrief examines the technology of email privacy encryption from its origins to its theoretical and practical details. It explains the c...

cena: 201,24
 
Enhanced Building Information Models: Using Iot Services and Integration Patterns

Umit Isikdag
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and integrate Building Information Models (BIMs). Chapter 6 provides advanced SOA patterns for BIMs, while chapter 7 details patterns for IoT, and for BIM and IoT information fusion.
This book explains how to combine and exploit sensor networks and internet-of-things (IoT) technologies and Web-service design patterns to enrich and ...
cena: 201,24
 
Interpretability of Computational Intelligence-Based Regression Models

Tamas Kenesei; Janos Abonyi

The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interpretability of the resulting rule-based systems can be ensured by special model reduction and visualization techniques. The first part of the book deals with the identification of hinging hyperplane-based regression trees. The next part deals with the validation, visualization and structural reduction of neural networks based on the transformation of the hidden layer of the network into an additive fuzzy rule base system. Finally, based on the...

The key idea of this book is that hinging hyperplanes, neural networks and support vector machines can be transformed into fuzzy models, and interp...

cena: 201,24
 
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications

Zhou Lu; Wenye Wang; Cliff Wang
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of...
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-spec...
cena: 201,24
 
Diffusion in Social Networks

Paulo Shakarian; Abhivav Bhatnagar; Ashkan Aleali
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores...
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduc...
cena: 201,24
 
Cyber-Risk Management

Atle Refsdal; Bjornar Solhaug; Ketil Stolen
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence.
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Finally, part III details four important challenges an...
cena: 301,89
 
Spatial Auditory Human-Computer Interfaces

Jaka Sodnik; Sa O. Toma I.

This book focuses on a special group of auditory interfaces using spatial sound for the representation of information. The addition of information on the location of a selected sound source or a group of sources shows many advantages over a mere single-channel audio. This survey explains the most important limitations of the human hearing system and the perception of spatial sound. It also includes some technical background and basic processing and programming techniques for the creation and reproduction of spatial sounds with different audio equipment.

Spatial auditory interfaces...

This book focuses on a special group of auditory interfaces using spatial sound for the representation of information. The addition of information ...

cena: 201,24
ilość książek w kategorii: 352
Pierwsza Podprzednia  16  17  18  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia