• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Springerbriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 
Graph-Based Clustering and Data Visualization Algorithms

Agnes Vathy-Fogarassy; Janos Abonyi
This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize the intrinsic data structure in a low-dimensional vector space. The application of graphs in clustering and visualization has several advantages. A graph of important edges (where edges characterize relations and weights represent similarities or distances) provides a compact representation of the entire complex data set. This text describes clustering and visualization methods that are able to utilize information hidden in these graphs, based...
This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize ...
cena: 242,07
 
Trustworthy Execution on Mobile Devices

Amit Vasudevan; Jonathan M. McCune; James Newsome
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mob...
cena: 201,72
 
Twitter Data Analytics

Shamanth Kumar; Fred Morstatter; Huan Liu
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting data through Twitter's APIs and offers strategies for curating large datasets. The text gives examples of Twitter data with real-world examples, the present challenges and complexities of building visual analytic tools, and the best strategies to address these issues. Examples demonstrate how powerful measures can be computed using various Twitter data sources. Due to its openness in sharing data, Twitter is a prime example of social media in which...
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The brief introduces the process of collecting dat...
cena: 201,72
 
Unsupervised Information Extraction by Text Segmentation

Eli Cortez; Altigran S. Silva

A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The authors' approach relies on information available on pre-existing data to learn how to associate segments in the input string with attributes of a given domain relying on a very effective set of content-based features. The effectiveness of the content-based features is also exploited to directly learn from test data structure-based features, with no previous human-driven training, a feature unique to the presented approach. Based on the...

A new unsupervised approach to the problem of Information Extraction by Text Segmentation (IETS) is proposed, implemented and evaluated herein. The...

cena: 201,72
 
Integrating 3D Modeling, Photogrammetry and Design

Shaun Foster; David Halbstein
This book looks at the convergent nature of technology and its relationship to the field of photogrammetry and 3D design. This is a facet of a broader discussion of the nature of technology itself and the relationship of technology to art, as well as an examination of the educational process. In the field of technology-influenced design-based education it is natural to push for advanced technology, yet within a larger institution the constraints of budget and adherence to tradition must be accepted. These opposing forces create a natural balance; in some cases constraints lead to greater...
This book looks at the convergent nature of technology and its relationship to the field of photogrammetry and 3D design. This is a facet of a broader...
cena: 242,07
 
A Brief History of Cryptology and Cryptographic Algorithms

John F. Dooley
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to...
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the...
cena: 201,72
 
Physical Layer Security in Random Cellular Networks

Hui-Ming Wang; Tong-Xing Zheng
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. By examining recently introduced security techniques for wireless point-to-point communications, the book proposes new solutions to physical layer security based on stochastic geometric frameworks for random cellular networks.
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. By examining recently introduc...
cena: 221,90
 
Spatial Network Data: Concepts and Techniques for Summarization

Dev Oliver
This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed. Within this book, these challenges are conceptualized, well-defined problems are explored, and critical techniques are discussed.The process of summarizing spatial network data entails finding a compact description or representation of observations or activities on large spatial or spatiotemporal networks. However, summarizing spatial network data can be computationally challenging for various reasons,...
This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many can...
cena: 201,72
 
Automated Software and Service Composition: A Survey and Evaluating Review

Felix Mohr
And what are the most prominent solution paradigms for the different types? Overall, this book saves a great deal of time for everyone pursuing research in the area of automated software composition who needs a comprehensive guide that helps them understand the field, and that relates new approaches to existing ones.
And what are the most prominent solution paradigms for the different types? Overall, this book saves a great deal of time for everyone pursuing resear...
cena: 201,72
 
Parallel and Distributed Map Merging and Localization: Algorithms, Tools and Strategies for Robotic Networks

Rosario Aragues; Carlos Sagues; Youcef Mezouar

This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this problem, each chapter introduces a different distributed strategy for solving them.

In addition to presenting a review of distributed algorithms for perception in localization and map merging, the text also provides the reader with the necessary tools for proposing new solutions to problems of multi-robot perception, as...

This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge...

cena: 201,72
ilość książek w kategorii: 352
Pierwsza Podprzednia  7  8  9  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia