• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Springerbriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 
Explaining Algorithms Using Metaphors

Michal Fori Ek; Monika Steinova

There is a significant difference between designing a new algorithm, proving its correctness, and teaching it to an audience. When teaching algorithms, the teacher's main goal should be to convey the underlying ideas and to help the students form correct mental models related to the algorithm. This process can often be facilitated by using suitable metaphors. This work provides a set of novel metaphors identified and developed as suitable tools for teaching many of the "classic textbook" algorithms taught in undergraduate courses worldwide. Each chapter provides exercises and didactic...

There is a significant difference between designing a new algorithm, proving its correctness, and teaching it to an audience. When teaching algorit...

cena: 262,25
 
Distributed Space-Time Coding

Yindi Jing
Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basic concept of DSTC, its achievable performance, generalizations, code design, and differential use. Recent results on training design and channel estimation for DSTC and the performance of training-based DSTC are also discussed.
Distributed Space-Time Coding (DSTC) is a cooperative relaying scheme that enables high reliability in wireless networks. This brief presents the basi...
cena: 201,72
 
A General Framework for Reasoning on Inconsistency

Maria Vanina Martinez; Cristian Molinaro; V. S. Subrahmanian
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution methods that have not yet been studied. The proposed framework allows users to specify preferences on how to resolve inconsistency when there are multiple ways to do so. This empowers users to resolve inconsistency in data leveraging both their detailed knowledge of the data as well as their application needs. The brief shows that the framework is well-suited to handle inconsistency in several logics, and provides algorithms to compute preferred...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution meth...
cena: 161,36
 
Motion History Images for Action Recognition and Understanding

MD Atiqur Rahman Ahad
Human action analysis and recognition is a relatively mature field, yet one which is often not well understood by students and researchers. The large number of possible variations in human motion and appearance, camera viewpoint, and environment, present considerable challenges. Some important and common problems remain unsolved by the computer vision community. However, many valuable approaches have been proposed over the past decade, including the motion history image (MHI) method. This method has received significant attention, as it offers greater robustness and performance than other...
Human action analysis and recognition is a relatively mature field, yet one which is often not well understood by students and researchers. The large ...
cena: 201,72
 
Semantic Web-Based Intelligent Geospatial Web Services

Peng Yue

By introducing Semantic Web technologies into geospatial Web services, this book addresses the semantic description of geospatial data and standards-based Web services, discovery of geospatial data and services, and generation of composite services. Semantic descriptions for geospatial data, services, and geoprocessing service chains are structured, organized, and registered in geospatial catalogue services. The ontology-based approach helps to improve the recall and precision of data and services discovery. Semantics-enabled metadata tracking and satisfaction allows analysts to focus on...

By introducing Semantic Web technologies into geospatial Web services, this book addresses the semantic description of geospatial data and standard...

cena: 201,72
 
Transportation and Information: Trends in Technology and Policy

Piyushimita Vonu Thakuriah; D. Glenn Geers

Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation information is generated and used in the future. Sensors in the transportation system, when integrated with those in other sectors (for example, energy, utility and health) have the potential to foster novel new ways of improving livability and sustainability.

The end-result of these developments has been somewhat contradictory. Although automation in the transportation environment has become increasingly widespread, the level of involvement and...

Transformations in wireless connectivity and location-aware technologies hold the promise of bringing a sea-change in the way transportation inform...

cena: 201,72
 
Security for Wireless Implantable Medical Devices

Xiali Hei; Xiaojiang Du
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader). Such communication raises serious security concerns, such as the ability for hackers to gain access to a patient's medical records. This brief provides an overview of such attacks and the new security challenges, defenses, design issues, modeling and performance evaluation in wireless IMDs. While studying the vulnerabilities of IMDs and corresponding security defenses, the reader will also learn the methodologies and tools for designing...
In the treatment of chronic diseases, wireless Implantable Medical Devices (IMDs) are commonly used to communicate with an outside programmer (reader)...
cena: 201,72
 
A Survey of Core Research in Information Systems

Anna Sidorova; Nicholas Evangelopoulos; Russell Torres
The Information Systems (IS) discipline was founded on the intersection of computer science and organizational sciences, and produced a rich body of research on topics ranging from database design and the strategic role of IT to website design and online consumer behavior. In this book, the authors provide an introduction to the discipline, its development, and the structure of IS research, at a level that is appropriate for emerging and current IS scholars. Guided by a bibliometric study of all research articles published in eight premier IS research journals over a 20-year period, the...
The Information Systems (IS) discipline was founded on the intersection of computer science and organizational sciences, and produced a rich body of r...
cena: 201,72
 
Web Proxy Cache Replacement Strategies: Simulation, Implementation, and Performance Evaluation

Hala Elaarag; Sam Romano; Jake Cobb
Presents a study of cache replacement strategies designed for static web content. This work describes a novel approach to web proxy cache replacement that uses neural networks for decision making, evaluates its performance and decision structures, and examines its implementation in a real environment, namely, in the Squid proxy server.
Presents a study of cache replacement strategies designed for static web content. This work describes a novel approach to web proxy cache replacement ...
cena: 201,72
 
Cooperative Networking in a Heterogeneous Wireless Medium

Muhammad Ismail; Weihua Zhuang
This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralized implementation, which support both single-network and multi-homing services. The brief provides a set of cooperative networking algorithms, which rely on the concepts of short-term call traffic load prediction, network cooperation, convex optimization, and decomposition theory. In the proposed solutions, mobile terminals play an active role in the resource allocation operation, instead of their traditional role as passive service recipients in...
This brief focuses on radio resource allocation in a heterogeneous wireless medium. It presents radio resource allocation algorithms with decentralize...
cena: 201,72
ilość książek w kategorii: 352
Pierwsza Podprzednia  7  8  9  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia