The research in content-based indexing and retrieval of visual information such as images and video has become one of the most populated directions in the vast area of information technologies. Social networks such as YouTube, Facebook, FileMobile, and DailyMotion host and supply facilities for accessing a tremendous amount of professional and user generated data. The areas of societal activity, such as, video protection and security, also generate thousands and thousands of terabytes of visual content. This book presents the most recent results and important trends in visual information...
The research in content-based indexing and retrieval of visual information such as images and video has become one of the most populated directions in...
Social media has drastically improved the way we can reach target audiences and serve our customers. Like its financial counterpart, the social media audit (SMA) can be described as a formalized review of anorganization's social media activities. However, contrary to financial audits, social media audits are not guided by government regulations or a set of professional rules and standards.
This book will address social media marketing issues using a cost benefit approach, while presenting a systematic approach to review the organization's social media activities. Using the...
Social media has drastically improved the way we can reach target audiences and serve our customers. Like its financial counterpart, the social med...
The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands more attractive for exploitation or attack by others. Brand risks can come in many different types and this book provides examples of how these risks can arise as well as providing quantitative estimates of the adverse impacts that can result from such risks.
Brand owners need to be aware of the...
The rise of the Internet and social media in particular offer great opportunities for brand owners to increase business and brand recognition. Whil...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO communications is just Hamilton's quaternions in disguise and has spawned the use of PhD-level algebra to produce generalizations. Likewise, in the absence of credible alternatives, the industry has in many cases been forced to adopt elliptic curve cryptography. In...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in t...
"ITIL(r) 2011 At a Glance" is an important update to the internationally-recognized ITIL(r) best practices for IT Service Management. "ITIL(r) 2011 At a Glance" provides graphical and textual memory joggers for the primary concepts of those best practices. IT organizations worldwide are implementing ITIL(r) as a vehicle for improving IT service quality and improve return on investment for IT services. This book is an update based on the ITIL 2011 Update. The desk reference s unique graphical approach will take otherwise complex textual descriptions and make the information accessible in a...
"ITIL(r) 2011 At a Glance" is an important update to the internationally-recognized ITIL(r) best practices for IT Service Management. "ITIL(r) 2011 At...
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential countermeasures which could...
This book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc...
Entropy Guided Transformation Learning: Algorithms and Applications (ETL) presents a machine learning algorithm for classification tasks. ETL generalizes Transformation Based Learning (TBL) by solving the TBL bottleneck: the construction of good template sets. ETL automatically generates templates using Decision Tree decomposition.
The authors describe ETL Committee, an ensemble method that uses ETL as the base learner. Experimental results show that ETL Committee improves the effectiveness of ETL classifiers. The application of ETL is presented to four Natural Language...
Entropy Guided Transformation Learning: Algorithms and Applications (ETL) presents a machine learning algorithm for classification tasks. ET...
Since the advent of the Semantic Web, interest in the dynamics of ontologies (ontology evolution) has grown significantly. Belief revision presents a good theoretical framework for dealing with this problem; however, classical belief revision is not well suited for logics such as Description Logics.
"Belief Revision in Non-Classical Logics" presents a framework which can be applied to a wide class of logics that include - besides most Description Logics such as the ones behind OWL - Horn Logic and Intuitionistic logic, amongst others. The author also presents algorithms for the most...
Since the advent of the Semantic Web, interest in the dynamics of ontologies (ontology evolution) has grown significantly. Belief revision presents...
The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability, reliability, and minor human intervention. The employment of self-* properties and Peer-To-Peer (P2P) are seen as promising alternatives, able to provide the sophisticated solutions required.
Despite being developed in parallel, and with minor direct connections perceived between them, self-* properties and P2P can be used concurrently. In Self-* and P2P for Network Management: Design Principles and Case Studies, the authors...
The network management community has been pushed towards the design of alternative management approaches able to support heterogeneity, scalability...