Network hardware Books
Springer Nature Switzerland AG Simulation Gaming Through Times and Disciplines: 50th International Simulation and Gaming Association Conference, ISAGA 2019, Warsaw, Poland, August 26–30, 2019, Revised Selected Papers
Book SynopsisThis book constitutes revised selected papers from the 50th International Simulation and Gaming Association Conference, ISAGA 2019, which took place in Warsaw, Poland, during August 26–30, 2019.The 38 papers presented in this volume were carefully reviewed and selected from 72 submissions. They were organized in topical sections named: simulation gaming in the science space; simulation gaming design and implementation; simulation games for current challenges; simulation games and gamification; and board perspective on simulation gaming.Table of ContentsSimulation gaming in the science space.- A Journey to the Role of Facilitator: Personal stories unfolding alongside world trends.- Differences between Facilitator-guided and Self-guided Debriefing on the Attitudes of University Students.- Evaluation of a pilot game to change civil servants’ willingness towards open data policy making.- Structuring game design with active learning benefits: insights from logistical skills training in managing an emergency department.- Playing (in) a Crisis Simulation: What is the playful engagement in a serious simulation made of.- Through a Mirror Darkly – On the Obscurity of Teaching Goals in Game-Based Learning in IT Security.- The Tacit Knowledge in Games: From Validation to Debriefing.- Educational Escape Room – Challenges and Obstacles.-Simulation gaming design and implementation.- Simulated Construction of State`s Intersubjective Reality in Virtual Games: An Emerging Tool of Social Power.- A Review of Game-Based Research for English Language Learning in S&G Interdiscipline Journal.- Accuracy in Business Simulations.- Group-based learning and group composition on the provision of public goods: Incorporating agent-based simulation and gaming.- Can the Veil of Ignorance Create Consensus? A Qualitative Analysis Using the Siting for a Contaminated Waste Landfill Game.- The Development of the 3D Role-Playing Game on PC with an Assistive System for Deuteranopia.- The Trust Game: The influence of Trust on: Collaboration in the light of Technological Innovations.- The funnel of game design - Proposing a new way to address a problem definition using the IDEAS approach.- Little Things Mean a Lot in Simulations.- Impact of Competition in Energy Market on Promotion of Renewables: an Agent-Based Model Approach.- The perception of business wargaming practices among strategic and competitive intelligence professionals.- Managing Competing Values in Sustainable Urban Tourism: a Simulation-Gaming Approach.- Simulation games as a framework to conduct scientific experiments – the example of prospect theory research.- Study on occurrence mechanism of quality scandal in enterprises by ”Sontaku”, ”air” and ”water” theory using business game.- Interpersonal Competitiveness in a Cohesive Team: Insights from a Business Simulation Game.- Simulation games for current challenges.- Review of Haptic and Computerized (Simulation) Games on Climate Change.- Food-web modeling in the Maritime Spatial Planning Challenge Simulation Platform: Results from the Baltic Sea Region.- Unpacking, Overconfidence, and Game Design.- Authentic Learning in Entrepreneurship Education.- Learning from a Business Simulation Game: A Factor-Analytic Study.- Gamification and gaming cultures.- Resolving Migrant Issues in Thailand Using the Framework of ‘Simulation Game – Project PAL’.- Gamification Design Strategies - summary of research project.- Fostering Adaptive Organizations: Some Practical Lessons From Space Pirates.- Comparison of Experience of Using Business Games in University of Lodz and Kaunas University of Technology.- Board perspective on simulation gaming.- Video game monetization mechanisms in triple A (AAA) video games.- Learning with Location-Based Gaming.- Methodological challenges of creating a next-generation machine learning-based game engine for generating maps and vehicle behavior.- Agent-based Simulation for Sustainable Management of Supply Chain and Natural Resources: Basic Model.- Wonders of the World Simulation Program by Virtual Reality.- Framework and application of live video streaming as a virtual reality gaming technology: a study of function and performance.
£67.49
Springer Nature Switzerland AG Data-Driven Mining, Learning and Analytics for
Book SynopsisThis book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.Table of Contents1. Smart City Ecosystem – An Introduction.- 2. Datafication for secured smart cities.- 3. Secured big data infrastructure services.- 4. Intelligent infrastructure of secured smart cities.- 5. Cyber-physical systems for secured smart cities.- 6. Blockchain for smart cities.- 7. Context-aware security and privacy of smart cities.- 7. Privacy and social Issues in smart cities.- 8. Sensor and RFID applications of smart cities.- 9. Advanced data mining for secured smart cities.- 10. Big data for secured smart cities.- 11. Data analytics tools and technologies for smart cities.- 12. Machine learning and AI for secured smart cities.
£85.49
Springer Nature Switzerland AG Graph Structures for Knowledge Representation and Reasoning: 6th International Workshop, GKR 2020, Virtual Event, September 5, 2020, Revised Selected Papers
Book SynopsisThis open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence.The 7 revised full papers presented together with 2 invited contributions were reviewed and selected from 9 submissions. The contributions address various issues for knowledge representation and reasoning and the common graph-theoretic background, which allows to bridge the gap between the different communities.Table of ContentsExtended Workshop Papers.- Active Semantic Relations in Layered Enterprise Architecture Development.- A Belief Update System Using an Event Model for Location of People in a Smart Home.- A Natural Language Generation Technique for Automated Psychotherapy.- Creative Composition Problem: A Knowledge Graph Logical-based AI Construction and Optimization Solution.- Set Visualisations with Euler and Hasse Diagrams.- Usage Patterns Identification Using Graphs and Machine Learning.- Collaborative Design and Manufacture: Information Structures for Team Formation and Coordination.- Invited Additional Contributions.- Approximate Knowledge Graph Query Answering: From Ranking to Binary Classification.- Galois Connections for Patterns: An Algebra of Labelled Graphs.
£31.49
Springer Nature Switzerland AG Practical Channel-Aware Resource Allocation: With
Book SynopsisThis book dives into radio resource allocation optimizations, a research area for wireless communications, in a pragmatic way and not only includes wireless channel conditions but also incorporates the channel in a simple and practical fashion via well-understood equations. Most importantly, the book presents a practical perspective by modeling channel conditions using terrain-aware propagation which narrows the gap between purely theoretical work and that of industry methods. The provided propagation modeling reflects industry grade scenarios for radio environment map and hence makes the channel based resource allocation presented in the book a field-grade view. Also, the book provides large scale simulations that account for realistic locations with terrain conditions that can produce realistic scenarios applicable in the field. Most portions of the book are accompanied with MATLAB code and occasionally MATLAB/Python/C code. The book is intended for graduate students, academics, researchers of resource allocation in mathematics, computer science, and electrical engineering departments as well as working professionals/engineers in wireless industry.Table of ContentsIntroduction.- Utility Functions and Resource Allocation.- Resource Allocation without Channel.- Distributed or Centralized.- Channel Conditions and Resource Allocation.- Propagation Modeling .- Simulation.- Conclusion.
£71.24
Springer Nature Switzerland AG Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.
£58.49
Springer Nature Switzerland AG A Holistic Solution for Smart Grids based on LINK– Paradigm: Architecture, Energy Systems Integration, Volt/var Chain Process
Book SynopsisThis book presents a holistic solution for Smart Grids that includes the electricity: producers, electricity storages, grids, market and customer plants. The authors have derived the architectural paradigm for Smart Grids LINK from the signature of their fractal structure. The presented LINK-based holistic architecture enables the large-scale integration of distributed energy resources by minimising the data to be exchanged, thus considering privacy and cyber security by design. The straightforwardness of LINK-Solution is related to its standardised structures, enabling the coupling of energy and non-energy sectors and Energy Communities. The Volt/var chain control as one of the most challenging operation processes of Smart Grids is covered in detail in this edition. Chapter by chapter, the reader is smoothly introduced to this unique solution, facilitating its practical implementation. This book is a valuable resource for experts, consultants, engineers, scientists, and students in the Smart Grids area and actors of the electricity market and politicians.Table of ContentsIntroduction.- Holistic architecture.- Energy Systems Integration.- Volt/var chain process.
£60.95
Springer Nature Switzerland AG Emerging Technologies and the Digital Transformation of Museums and Heritage Sites: First International Conference, RISE IMET 2021, Nicosia, Cyprus, June 2–4, 2021, Proceedings
Book SynopsisThis book constitutes the post-conference proceedings of the First International Conference on Emerging Technologies and the Digital Transformation of Museums and Heritage Sites, RISE IMET 2020, held in Nicosia, Cyprus, in June 2021*.The 23 revised full papers were carefully reviewed and selected from 38 submissions. The papers are organized in the following topical sections: digital curation and visitor engagement in museums and heritage sites; VR, AR, MR, mobile applications and gamification in museums and heritage sites; digital storytelling and embodied characters for the interpretation of cultural heritage; emerging technologies, difficult heritage and affective practices; participatory approaches, crowdsourcing and new technologies; digitization, documentation and digital representation of cultural heritage.* The conference was held virtually due to the COVID-19 pandemic.Table of ContentsDigital curation and visitor engagement in museums and heritage sites.- VR, AR, MR, mobile applications and gamification in museums and heritage sites.- Digital storytelling and embodied characters for the interpretation of cultural heritage.- Emerging technologies, difficult heritage and affective practices.- Participatory approaches, crowdsourcing and new technologies.- Digitization, documentation and digital representation of cultural heritage.
£62.99
Springer Nature Switzerland AG Optimal Localization of Internet of Things Nodes
Book SynopsisThis book is a practical resource for designing Internet of Things (IoT) networks and implementing IoT applications from the localization perspective. With the emergence of IoT, machine to machine communication, Industrial IoT, and other societal applications, many applications require knowledge of the exact location of mobile IoT nodes in real-time. As the IoT nodes have computational and energy limitations, it is a crucial research challenge to optimize the network's performance with the highest localization accuracy. Many researchers are working towards such localization problems. However, there is no single book available for the detailed study on IoT node localization. This book provides one-stop multidisciplinary solutions for IoT node localization, design requirements, challenges, constraints, available techniques, comparison, related applications, and future directions. Special features included are theory supported by algorithmic development, treatment of optimization techniques, and applications.Table of ContentsChapter 1. Localization Techniques for IoT.- Chapter 2. Quantum based Metaheuristics for Localization in IoT.- Chapter 3. Optimal Node Deployment in Smart Parking.- Chapter 4. Assistance and Localization of Elderly persons.- Chapter 5. Social Distancing and Emergency Management in Smart Cities.- Chapter 6. Optimal Configuration in Heterogeneous Industrial IoT.
£49.49
Springer Nature Switzerland AG High-Speed Networks: A Tutorial
Book SynopsisThis book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Science DMZs). The Science DMZ is a high-speed network designed to facilitate the transfer of big science data which is presented in this book. These networks are increasingly important, as large data sets are now often transferred across sites. This book starts by describing the limitations of general-purpose networks which are designed for transferring basic data but face numerous challenges when transferring terabyte- and petabyte-scale data. This book follows a bottom-up approach by presenting an overview of Science DMZs and how they overcome the limitations of general-purpose networks. It also covers topics that have considerable impact on the performance of large data transfers at all layers: link layer (layer-2) and network layer (layer-3) topics such as maximum transmission unit (MTU), switch architectures, and router’s buffer size; transport layer (layer-4) topics including TCP features, congestion control algorithms for high-throughput high-latency networks, flow control, and pacing; applications (layer-5) used for large data transfers and for maintenance and operation of Science DMZs; and security considerations. Most chapters incorporate virtual laboratory experiments, which are conducted using network appliances running real protocol stacks. Students in computer science, information technology and similar programs, who are interested in learning fundamental concepts related to high-speed networks and corresponding implementations will find this book useful as a textbook. This book assumes minimal familiarity with networking, typically covered in an introductory networking course. It is appropriate for an upper-level undergraduate course and for a first-year graduate course. Industry professionals working in this field will also want to purchase this book.Table of ContentsIntroduction to high-speed networks and science DMZ.- Network cyberinfrastructure aspects for big data transfers.- Data link and network layer considerations for large data transfers.- Impact of TCP on high-speed networks and advances in congestion control algorithms.- Application and security aspects for large flows.- Security aspects.- Challenges and open research issues.
£62.99
Springer Nature Switzerland AG Internet Access in Vehicular Networks
Book SynopsisThis book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme.This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book. Table of ContentsOverview of Internet Access of Vehicular Networks.- Internet Access Modeling of Vehicular Internet Access.- V2X Interworking via Vehicular Internet Access.- Intelligent Link Management for Vehicular Internet Access.- Intelligent Networking enabled Vehicular Distributed Learning.- Conclusion and Future Works.
£98.99
Springer Nature Switzerland AG Towards Autonomous Robotic Systems: 22nd Annual Conference, TAROS 2021, Lincoln, UK, September 8–10, 2021, Proceedings
Book SynopsisThe volume LNAI 13054 constitutes the refereed proceedings of the 22th Annual Conference Towards Autonomous Robotic Systems, TAROS 2021, held in Lincoln, UK, in September 2021.*The 45 full papers were carefully reviewed and selected from 66 submissions. Organized in the topical sections "Algorithms" and "Systems", they discuss significant findings and advances in the following areas: artificial intelligence; mechatronics; image processing and computer vision; special purpose and application-based systems; user interfaces and human computer interaction.* The conference was held virtually due to the COVID-19 pandemic.Table of ContentsAlgorithms.- A Study on Dense and Sparse (Visual) Rewards in Robot Policy Learning.- An Open-Source Multi-Goal Reinforcement Learning Environment for Robotic Manipulation with Pybullet.- CPG-Actor: Reinforcement Learning for Central Pattern Generators .- Deep semantic segmentation of 3D plant point clouds.- Grasp Stability Prediction for a Dexterous Robotic Hand combining RGB-D Vision and Haptic Bayesian Exploration.- Improving SLAM in Pipe Networks by Leveraging Cylindrical Regularity.- CRH*: A Deadlock Free Framework for Scalable Prioritised Path Planning in Multi-Robot Systems.- TASK-BASED AD-HOC TEAMWORK with ADVERSARY.- Human-Robot Cooperative Lifting using IMUs and Human Gestures.- Reinforcement Learning-based Mapless Navigation with Fail-safe Localisation.- Collaborative Coverage for a Network of Vacuum Cleaner Robots.- Network-Aware Genetic Algorithms for the Coordination of MALE UAV Networks.- Self-organised Flocking of Robotic Swarm in Cluttered Environments.- Exploring Feedback Modalities in a Mobile Robot for Telecare.- Demonstrating the Differential Impact of Flock Heterogeneity on Multi-Agent Herding.- Evaluation of an OpenCV Implementation of Structure from Motion on Open Source Data.- Benchmark of visual and 3D lidar SLAM systems in simulation environment for vineyards.- Lidar-only localization in 3D Pose-Feature Map.- Toward robust visual odometry using prior 2D map information.- Comparison of Concentrated and Distributed Compliant Elements in a 3D Printed Gripper.- Perception of a humanoid robot as an interface for auditory testing.- Deep Learning Traversability Estimator for Mobile Robots in Unstructured Environments.- Systems.- Predicting Artist Drawing Activity via Multi-Camera Inputs for Co-Creative Drawing.- 3D printed mechanically modular two-degree-of-freedom robotic segment utilizing variable-stiffness actuators.- Design of a Multimaterial 3D-printed Soft Actuator with Bi-directional Variable Stiffness.- Designing a Multi-Locomotion Modular Snake Robot.- Deep robot path planning from demonstrations for breast cancer examination.- Priors inspired by Speed-Accuracy Trade-Offs for Incremental Learning of Probabilistic Movement Primitives.- Tactile Dynamic Behaviour Prediction Based on Robot Action.- State space analysis of variable-stiffness tendon drive with non-back-drivable worm-gear motor actuation.- Development of a ROS Driver and Support Stack for the KMR iiwa Mobile Manipulator.- Collision Avoidance with Optimal Path Replanning for Mobile Robots.- An Autonomous Mapping Approach for Confined Spaces using Flying Robots.- Maximising availability of transportation robots through intelligent allocation of parking spaces.- A Minimalist Solution to the Multi-Robot Barrier Coverage Problem.- Scheduling Multi-robot Missions with JointTasks and Heterogeneous Robot Teams.- Area Coverage in Two-Dimensional Grid Worlds Using Computation-Free Agents.- Online Scene Visibility Estimation as a Complement to SLAM in UAVs.- Statics Optimization of a Hexapedal Robot Modelled as a Stewart Platform.- EtherCAT implementation of a variable-stiffness tendon drive with non-back-drivable worm-gear motor actuation.- Growing Robotic Endoscope for early Breast Cancer Detection: Robot Motion Control.- Design and Charachterisation of a Variable-Stiffness Soft Actuator Based on Tendon Twisting.- WhiskEye: A biomimetic model of multisensoryspatial memory based on sensory reconstruction.- Equipment Detection based Inspection Robot for Industrial Plants.- Inference of Mechanical Properties of Dynamic Objects through Active Perception.
£62.99
Springer Nature Switzerland AG Fundamentals of Software Engineering: 9th International Conference, FSEN 2021, Virtual Event, May 19–21, 2021, Revised Selected Papers
Book SynopsisThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Fundamentals of Software Engineering, FSEN 2021, held virtually and hosted by IPM in May 2021.The 12 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. The topics of interest in FSEN span over all aspects of formal methods, especially those related to advancing the application of formal methods in the software industry and promoting their integration with practical engineering techniques. The papers are organized in topical sections on coordination, logic, networks, parallel computation, and testing.Table of ContentsCoordination.- Protocol Scheduling.- Automated Replication of Tuple Spaces via Static Analysis.- Incremental Refinement of Goal Models with Contracts.- Logic.- Proof Calculi for Epistemic Logics with Structured Knowledge.- Introducing Intervalar differential dynamic logic.- A Program Logic for Fresh Name Generation.- Event-Driven Temporal Logic Pattern for Control Software Requirements Specification.- Extending OCL with map and function types.- Networks.- Deadlock in packet switching networks.- Runtime Monitoring Processes Across Blockchains.- Solving Systems of Bilinear Equations for Transition Rate Reconstruction.- Parallel Computation.- Term Rewriting on GPUs.- Promise Plus: Flexible Synchronization for Parallel Computations on Arrays.- Testing.- Towards Test Case Generation for Industrial Software Systems Based on Functional Specifications.- Compressing Automatically Generated Unit Test Suites through Test Parameterization.- Systematic Extraction of Test Cases from Object-oriented Programs.
£53.99
Springer Nature Switzerland AG Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2021, held in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.Table of ContentsMachine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A Usability Study of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.
£62.99
Springer Nature Switzerland AG ICWE 2021 Workshops: ICWE 2021 International Workshops, BECS and Invited Papers, Biarritz, France, May 18–21, 2021, Revised Selected Papers
Book SynopsisThis book constitutes the thoroughly refereed post-workshop proceedings of the 21th International Conference on Web Engineering, ICWE 2021, held in Biarritz, France, in May 2021.*The first international workshop on Big data-driven Edge Cloud Services (BECS 2021) was held to provide a venue in which scholars and practitioners can share their experiences and present on-going work on providing value-added Web services for users by utilizing big data in edge cloud environments. The 5 revised full papers and 1 revised short contribution selected from 11 submissions are presented with 2 invited papers.*The conference was held virtually due to the COVID-19 pandemic.Table of ContentsBECS 2021.- Putting Data Science Pipelines on the Edge.- DNN Model Deployment on Distributed Edges.- Towards Proactive Context-Aware IoT Environments by means of Federated Learning.- Real-time Deep Learning-based Anomaly Detection Approach for Multivariate Data Streams with Apache Flink.- A Novel Approach to Dynamic Pricing for Cloud Computing Through Price Band Prediction.- Learning-based Activation of Energy Harvesting Sensors for Fresh Data Acquisition.- Invited Papers.- Exploiting Triangle Patterns for Heterogeneous Graph Attention Network.- Towards Seamless IoT Device-Edge-Cloud Continuum: Software Architecture Options of IoT Devices Revisited.
£49.49
Springer Nature Switzerland AG Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings
Book SynopsisThis book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.
£49.49
Springer Nature Switzerland AG Broadband Communications, Networks, and Systems: 12th EAI International Conference, BROADNETS 2021, Virtual Event, October 28–29, 2021, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 12th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 24 full papers presented were carefully reviewed and selected from 49 submissions. The papers are thematically grouped as a session on broadband communications, networks, and systems; 5G-enabled smart building: technology and challenge; and 5G: The advances in industry.Table of ContentsBroadband communications, Networks, and Systems: Theory and Applications.- A Machine Learning-based Elastic Strategy for Operator Parallelism in a Big Data Stream Computing System.- End-to-End Dynamic Pipelining Tuning Strategy for Small Files Transfer.- Containers’ Privacy and Data Protection via Runtime Scanning Methods.- Digital Twin For Cybersecurity: Towards Enhancing Cyber Resilience.- Differential Privacy-based Permissioned Blockchain for Private Data Sharing in Industrial IoT.- Efficient Privacy-Preserving User Matching with Intel SGX.- Developing an Online Examination Timetabling System Using Artificial Bee Colony Algorithm in Higher Education.- A Topology-Aware Scheduling Strategy for Distributed Stream Computing System.- Data Stream Prediction Strategy for Elastic Stream Computing Systems.- Blockchain Enabled Integrity Protection for Bodycam Video.- Road Rage Recognition System Based on Face Detection Emotion.- A Drip Irrigation Remote Control System using 5G-IoT Technology.- Multipath QUIC - Directions of the Improvements.- One New Adaptive Elliptical Weighting Model Combining with the Tikhonov-ffp-norm for image reconstruction.- Calculation and Numerical Simulation of Building Integrated Photovoltaic System Based on Connected Autonomous Vehicle Platoon Control through Multi-Agent Deep Reinforcement Learning.- 5G-enabled Smart Building: Technology and Challenge.- Accurate Estimation on the State-of-Charge of Lithium-ion Battery Packs.- Fire Simulation and Optimial Evaluation Based on BIM Technology.- Discrete Sliding Mode Control of PMSM with Network Transmission.- Smart Medical and Nursing Platform Based on 5G Technology.- Time-domain predictable trajectory planning for autonomous driving based on Internet of Vehicles.- 5G: The Advances in Industry.- Rate-compatible shortened polar codes based on RM code-aided.- Research on wheat impurity image recognition based on convolutional neural network.- Based on Energy Router Energy Management Control Strategy in micro-grid.
£62.99
Springer Nature Switzerland AG Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers
Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations. Table of ContentsSide-Channel Attacks.- Fault Attacks.- Public Key.- Secure Implementations.
£49.49
Springer Nature Switzerland AG Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.Table of ContentsNetwork Routing.- Analysis of Routing Attacks in FANET.- Context-Aware Routing and Forwarding Model for NDN-based VANET.- A Novel Adaptive Hello Mechanism based Geographic Routing Protocol for FANETs.- Network Security 4 Evaluation of Denial of Service Attacks in Software Defined-Cognitive Radio Networks.- The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack.- Investigating the effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad hoc Networks.- Active attack that exploits biometric similarity difference and basic countermeasures.- Network Protocols.- LEACH-S enhancement to ensure WSN stability.- M-ODD: A Standard Protocol for Reporting MANET Related Models, Simulations, and Findings.- Frame Design for Adaptability in Long-range Underwater Communication.- Adaptive Data Rate Based Congestion Control in Vehicular Ad Hoc Networks (VANET).- Network Applications.- Analyzing Aggregate User Behavior on a Large Multi-platform Content Distribution Service.- An AI-based Transmission Power-control Certificate Omission in Vehicular Ad-Hoc Networks.- Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids.- A Blockchain-Based Data-Sharing Scheme for Inter[1]Vehicular Safety Applications.- A Trust-based and Secure Real-Time Traffic Information Sharing Scheme.- TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach.- P-sharding: Streamline emergency medical transactions via priority sharding.- BiDKT: Deep Knowledge Tracing with BERT.- Vision - An innovative management system based on private DLT.- Value-aware Collaborative Data Pricing for Federated Learning in Vehicular Networks.- Dual Scheme Privacy-Preserving Approach for Location[1]Aware Application in Edge Computing.- Survey on Bridge Discovery in Tor.
£62.99
Springer Nature Switzerland AG Advanced Optical and Wireless Communications
Book SynopsisThe new edition of this popular textbook keeps its structure, introducing the advanced topics of: (i) wireless communications, (ii) free-space optical (FSO) communications, (iii) indoor optical wireless (IR) communications, and (iv) fiber-optics communications, but thoroughly updates the content for new technologies and practical applications. The author presents fundamental concepts, such as propagation principles, modulation formats, channel coding, diversity principles, MIMO signal processing, multicarrier modulation, equalization, adaptive modulation and coding, detection principles, and software defined transmission, first describing them and then following up with a detailed look at each particular system. The book is self-contained and structured to provide straightforward guidance to readers looking to capture fundamentals and gain theoretical and practical knowledge about wireless communications, free-space optical communications, and fiber-optics communications, all which can be readily applied in studies, research, and practical applications. The textbook is intended for an upper undergraduate or graduate level courses in fiber-optics communication, wireless communication, and free-space optical communication problems, an appendix with all background material needed, and homework problems. In the second edition, in addition to the existing chapters being updated and problems being inserted, one new chapter has been added, related to the physical-layer security thus covering both security and reliability issues. New material on 5G and 6G technologies has been added in corresponding chapters.Table of ContentsIntroduction.- Propagation Effects in Optical and Wireless Communications Channels, Noise Sources, and Channel Impairments.- Components, Modules, and Subsystems.- Wireless and Optical Channels Capacities.- Advanced Modulation and Multiplexing Techniques.- Advanced Detection Techniques and Compensation of Channel Impairments.- OFDM for Wireless and Optical Communications.- Diversity and MIMO Techniques.- Advanced Coding and Coded Modulation Techniques.- Spread Spectrum, CDMA, and Ultra-Wideband Communications.- 5G/6G Technologies.- Physical-layer Security.- Conclusion.
£56.99
Springer Nature Switzerland AG Cloud Computing: 11th EAI International Conference, CloudComp 2021, Virtual Event, December 9–10, 2021, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing, CloudComp 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 17 full papers were carefully reviewed and selected from 40 submissions and detail cloud computing technologies for efficient and intelligent computing in secure and smart environments with distributed devices. The theme of CloudComp 2021 was “Cloud Computing for Secure and Smart Applications”. The book is organized in three general areas of data analytics for cloud systems with distributed applications, cloud architecture and challenges in real-world use, and security in cloud/edge platforms.Table of ContentsData Analytics for Cloud Systems with Distributed Applications 1 Load quality analysis and forecasting for power data set on cloud platform.- A Survey of Traffic Prediction Based on Deep Neural Network: Data, Methods and Challenges.- A dynamic gesture recognition control file method based on deep learning.- A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment.- Triangle Coordinate Diagram Localization for Academic Literature Based on Line Segment Detection.- Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing.- A Survey of Face Image Inpainting Based on Deep Learning.- Cloud Architecture and Challenges in Real-World Use.- Layered Service Model Architecture for Cloud Computin.- KPG4Rec: Knowledge Property-aware Graph for Recommender Systems.- 10 ERP as Software-as-a-Service: Factors depicting large enterprises cloud adoption.- Design Of An Evaluation System Of Limb Motor Function Using Inertial Sensor.- Towards a GPU-accelerated Open Source VDI for OpenStack Manuel.- Security in Cloud/Edge Platforms.- Trustworthy IoT Computing Environment Based on Layered Blockchain Consensus Framework.- Heuristic Network Security Risk Assessment Based on Attack Graph.- Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System.- Energy- and Reliability-aware Computation Offloading with Security Constraints.- A Review of Cross-Blockchain Solutions.
£58.49
Springer Nature Switzerland AG Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers
Book SynopsisThis book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.* The 23 full papers presented in this volume were carefully reviewed and selected from 60 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions. *The conference was originally planned to take place at the University of Victoria, BC, Canada. Due to the COVID-19 pandemic, it was held virtually.
£62.99
Springer International Publishing AG Fundamentals of Object Databases
Book SynopsisObject-oriented databases were originally developed as an alternative to relational database technology for the representation, storage, and access of non-traditional data forms that were increasingly found in advanced applications of database technology. After much debate regarding object-oriented versus relational database technology, object-oriented extensions were eventually incorporated into relational technology to create object-relational databases. Both object-oriented databases and object-relational databases, collectively known as object databases, provide inherent support for object features, such as object identity, classes, inheritance hierarchies, and associations between classes using object references. This monograph presents the fundamentals of object databases, with a specific focus on conceptual modeling of object database designs. After an introduction to the fundamental concepts of object-oriented data, the monograph provides a review of object-oriented conceptual modeling techniques using side-by-side Enhanced Entity Relationship diagrams and Unified Modeling Language conceptual class diagrams that feature class hierarchies with specialization constraints and object associations. These object-oriented conceptual models provide the basis for introducing case studies that illustrate the use of object features within the design of object-oriented and object-relational databases. For the object-oriented database perspective, the Object Data Management Group data definition language provides a portable, language-independent specification of an object schema, together with an SQL-like object query language. LINQ (Language INtegrated Query) is presented as a case study of an object query language together with its use in the db4o open-source object-oriented database. For the object-relational perspective, the object-relational features of the SQL standard are presented together with an accompanying case study of the object-relational features of Oracle. For completeness of coverage, an appendix provides a mapping of object-oriented conceptual designs to the relational model and its associated constraints. Table of Contents: List of Figures / List of Tables / Introduction to Object Databases / Object-Oriented Databases / Object-Relational DatabasesTable of ContentsList of Figures.- List of Tables.- Introduction to Object Databases.- Object-Oriented Databases.- Object-Relational Databases.
£25.19
Springer International Publishing AG Perspectives on Business Intelligence
Book SynopsisIn the 1980s, traditional Business Intelligence (BI) systems focused on the delivery of reports that describe the state of business activities in the past, such as for questions like "How did our sales perform during the last quarter?" A decade later, there was a shift to more interactive content that presented how the business was performing at the present time, answering questions like "How are we doing right now?" Today the focus of BI users are looking into the future. "Given what I did before and how I am currently doing this quarter, how will I do next quarter?" Furthermore, fuelled by the demands of Big Data, BI systems are going through a time of incredible change. Predictive analytics, high volume data, unstructured data, social data, mobile, consumable analytics, and data visualization are all examples of demands and capabilities that have become critical within just the past few years, and are growing at an unprecedented pace. This book introduces research problems and solutions on various aspects central to next-generation BI systems. It begins with a chapter on an industry perspective on how BI has evolved, and discusses how game-changing trends have drastically reshaped the landscape of BI. One of the game changers is the shift toward the consumerization of BI tools. As a result, for BI tools to be successfully used by business users (rather than IT departments), the tools need a business model, rather than a data model. One chapter of the book surveys four different types of business modeling. However, even with the existence of a business model for users to express queries, the data that can meet the needs are still captured within a data model. The next chapter on vivification addresses the problem of closing the gap, which is often significant, between the business and the data models. Moreover, Big Data forces BI systems to integrate and consolidate multiple, and often wildly different, data sources. One chapter gives an overview of several integration architectures for dealing with the challenges that need to be overcome. While the book so far focuses on the usual structured relational data, the remaining chapters turn to unstructured data, an ever-increasing and important component of Big Data. One chapter on information extraction describes methods for dealing with the extraction of relations from free text and the web. Finally, BI users need tools to visualize and interpret new and complex types of information in a way that is compelling, intuitive, but accurate. The last chapter gives an overview of information visualization for decision support and text.Table of ContentsIntroduction and the Changing Landscape of Business Intelligence.- BI Game Changers: an Industry Viewpoint.- Business Modeling for BI.- Vivification in BI.- Information Integration in BI.- Information Extraction for BI.- Information Visualization for BI.
£25.19
Springer International Publishing AG Data Processing on FPGAs
Book SynopsisRoughly a decade ago, power consumption and heat dissipation concerns forced the semiconductor industry to radically change its course, shifting from sequential to parallel computing. Unfortunately, improving performance of applications has now become much more difficult than in the good old days of frequency scaling. This is also affecting databases and data processing applications in general, and has led to the popularity of so-called data appliances—specialized data processing engines, where software and hardware are sold together in a closed box. Field-programmable gate arrays (FPGAs) increasingly play an important role in such systems. FPGAs are attractive because the performance gains of specialized hardware can be significant, while power consumption is much less than that of commodity processors. On the other hand, FPGAs are way more flexible than hard-wired circuits (ASICs) and can be integrated into complex systems in many different ways, e.g., directly in the network for a high-frequency trading application. This book gives an introduction to FPGA technology targeted at a database audience. In the first few chapters, we explain in detail the inner workings of FPGAs. Then we discuss techniques and design patterns that help mapping algorithms to FPGA hardware so that the inherent parallelism of these devices can be leveraged in an optimal way. Finally, the book will illustrate a number of concrete examples that exploit different advantages of FPGAs for data processing. Table of Contents: Preface / Introduction / A Primer in Hardware Design / FPGAs / FPGA Programming Models / Data Stream Processing / Accelerated DB Operators / Secure Data Processing / Conclusions / Bibliography / Authors' Biographies / IndexTable of ContentsPreface.- Introduction.- A Primer in Hardware Design.- FPGAs.- FPGA Programming Models.- Data Stream Processing.- Accelerated DB Operators.- Secure Data Processing.- Conclusions.- Bibliography.- Authors' Biographies.- Index.
£25.19
Springer International Publishing AG Information and Influence Propagation in Social Networks
Book SynopsisResearch on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization. This book starts with a detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others. We delve deep into the key problem of influence maximization, which selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in classic diffusion models including both the independent cascade and the linear threshold models is computationally intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn this research into practice, such as learning the strength with which individuals in a network influence each other, as well as the practical aspects of this research including the availability of datasets and software tools for facilitating research. We conclude with a discussion of various research problems that remain open, both from a technical perspective and from the viewpoint of transferring the results of research into industry strength applications.Table of ContentsAcknowledgments.- Introduction.- Stochastic Diffusion Models.- Influence Maximization.- Extensions to Diffusion Modeling and Influence Maximization.- Learning Propagation Models.- Data and Software for Information/Influence: Propagation Research.- Conclusion and Challenges.- Bibliography.- Authors' Biographies.- Index.
£26.99
Springer International Publishing AG Similarity Joins in Relational Database Systems
Book SynopsisState-of-the-art database systems manage and process a variety of complex objects, including strings and trees. For such objects equality comparisons are often not meaningful and must be replaced by similarity comparisons. This book describes the concepts and techniques to incorporate similarity into database systems. We start out by discussing the properties of strings and trees, and identify the edit distance as the de facto standard for comparing complex objects. Since the edit distance is computationally expensive, token-based distances have been introduced to speed up edit distance computations. The basic idea is to decompose complex objects into sets of tokens that can be compared efficiently. Token-based distances are used to compute an approximation of the edit distance and prune expensive edit distance calculations. A key observation when computing similarity joins is that many of the object pairs, for which the similarity is computed, are very different from each other. Filters exploit this property to improve the performance of similarity joins. A filter preprocesses the input data sets and produces a set of candidate pairs. The distance function is evaluated on the candidate pairs only. We describe the essential query processing techniques for filters based on lower and upper bounds. For token equality joins we describe prefix, size, positional and partitioning filters, which can be used to avoid the computation of small intersections that are not needed since the similarity would be too low.Table of ContentsPreface.- Acknowledgments.- Introduction.- Data Types.- Edit-Based Distances.- Token-Based Distances.- Query Processing Techniques.- Filters for Token Equality Joins.- Conclusion.- Bibliography.- Authors' Biographies.- Index.
£25.19
Springer International Publishing AG Veracity of Data
Book SynopsisOn the Web, a massive amount of user-generated content is available through various channels (e.g., texts, tweets, Web tables, databases, multimedia-sharing platforms, etc.). Conflicting information, rumors, erroneous and fake content can be easily spread across multiple sources, making it hard to distinguish between what is true and what is not. This book gives an overview of fundamental issues and recent contributions for ascertaining the veracity of data in the era of Big Data. The text is organized into six chapters, focusing on structured data extracted from texts. Chapter 1 introduces the problem of ascertaining the veracity of data in a multi-source and evolving context. Issues related to information extraction are presented in Chapter 2. Current truth discovery computation algorithms are presented in details in Chapter 3. It is followed by practical techniques for evaluating data source reputation and authoritativeness in Chapter 4. The theoretical foundations and various approaches for modeling diffusion phenomenon of misinformation spreading in networked systems are studied in Chapter 5. Finally, truth discovery computation from extracted data in a dynamic context of misinformation propagation raises interesting challenges that are explored in Chapter 6. This text is intended for a seminar course at the graduate level. It is also to serve as a useful resource for researchers and practitioners who are interested in the study of fact-checking, truth discovery, or rumor spreading.Table of ContentsIntroduction to Data Veracity.- Information Extraction.- Truth Discovery Computation.- Trust Computation.- Misinformation Dynamics.- Transdisciplinary Challenges of Truth Discovery.- Bibliography.- Authors' Biographies.
£31.49
Springer International Publishing AG Instant Recovery with Write-Ahead Logging
Book SynopsisTraditional theory and practice of write-ahead logging and of database recovery focus on three failure classes: transaction failures (typically due to deadlocks) resolved by transaction rollback; system failures (typically power or software faults) resolved by restart with log analysis, "redo," and "undo" phases; and media failures (typically hardware faults) resolved by restore operations that combine multiple types of backups and log replay. The recent addition of single-page failures and single-page recovery has opened new opportunities far beyond the original aim of immediate, lossless repair of single-page wear-out in novel or traditional storage hardware. In the contexts of system and media failures, efficient single-page recovery enables on-demand incremental "redo" and "undo" as part of system restart or media restore operations. This can give the illusion of practically instantaneous restart and restore: instant restart permits processing new queries and updates seconds after system reboot and instant restore permits resuming queries and updates on empty replacement media as if those were already fully recovered. In the context of node and network failures, instant restart and instant restore combine to enable practically instant failover from a failing database node to one holding merely an out-of-date backup and a log archive, yet without loss of data, updates, or transactional integrity. In addition to these instant recovery techniques, the discussion introduces self-repairing indexes and much faster offline restore operations, which impose no slowdown in backup operations and hardly any slowdown in log archiving operations. The new restore techniques also render differential and incremental backups obsolete, complete backup commands on a database server practically instantly, and even permit taking full up-to-date backups without imposing any load on the database server. Compared to the first version of this book, this second edition adds sections on applications of single-page repair, instant restart, single-pass restore, and instant restore. Moreover, it adds sections on instant failover among nodes in a cluster, applications of instant failover, recovery for file systems and data files, and the performance of instant restart and instant restore.Table of ContentsPreface.- Acknowledgments.- Introduction.- Related Prior Work.- Single-Page Recovery.- Applications of Single-Page Recovery.- Instant Restart after a System Failure.- Applications of Instant Restart.- Single-Pass Restore.- Applications of Single-Pass Restore.- Instant Restore after a Media Failure.- Applications of Instant Restore.- Multiple Pate, System and Media Failures.- Instant Failover.- Applications of Instant Failover.- File Systems and Data Files.- Performance and Scalability.- Conclusions.- References.- Author Biographies .
£26.99
Springer International Publishing AG Databases on Modern Hardware
Book SynopsisData management systems enable various influential applications from high-performance online services (e.g., social networks like Twitter and Facebook or financial markets) to big data analytics (e.g., scientific exploration, sensor networks, business intelligence). As a result, data management systems have been one of the main drivers for innovations in the database and computer architecture communities for several decades. Recent hardware trends require software to take advantage of the abundant parallelism existing in modern and future hardware. The traditional design of the data management systems, however, faces inherent scalability problems due to its tightly coupled components. In addition, it cannot exploit the full capability of the aggressive micro-architectural features of modern processors. As a result, today's most commonly used server types remain largely underutilized leading to a huge waste of hardware resources and energy. In this book, we shed light on the challenges present while running DBMS on modern multicore hardware. We divide the material into two dimensions of scalability: implicit/vertical and explicit/horizontal. The first part of the book focuses on the vertical dimension: it describes the instruction- and data-level parallelism opportunities in a core coming from the hardware and software side. In addition, it examines the sources of under-utilization in a modern processor and presents insights and hardware/software techniques to better exploit the microarchitectural resources of a processor by improving cache locality at the right level of the memory hierarchy. The second part focuses on the horizontal dimension, i.e., scalability bottlenecks of database applications at the level of multicore and multisocket multicore architectures. It first presents a systematic way of eliminating such bottlenecks in online transaction processing workloads, which is based on minimizing unbounded communication, and shows several techniques that minimize bottlenecks in major components of database management systems. Then, it demonstrates the data and work sharing opportunities for analytical workloads, and reviews advanced scheduling mechanisms that are aware of nonuniform memory accesses and alleviate bandwidth saturation.Table of ContentsIntroduction.- Exploiting Resources of a Processor Core.- Minimizing Memory Stalls.- Scaling-up OLTP.- Scaling-up OLAP Workloads.- Outlook.- Summary.- Bibliography.- Authors' Biographies.
£25.19
Springer International Publishing AG Answering Queries Using Views, Second Edition
Book SynopsisThe topic of using views to answer queries has been popular for a few decades now, as it cuts across domains such as query optimization, information integration, data warehousing, website design and, recently, database-as-a-service and data placement in cloud systems. This book assembles foundational work on answering queries using views in a self-contained manner, with an effort to choose material that constitutes the backbone of the research. It presents efficient algorithms and covers the following problems: query containment; rewriting queries using views in various logical languages; equivalent rewritings and maximally contained rewritings; and computing certain answers in the data-integration and data-exchange settings. Query languages that are considered are fragments of SQL, in particular select-project-join queries, also called conjunctive queries (with or without arithmetic comparisons or negation), and aggregate SQL queries. This second edition includes two new chapters that refer to tree-like data and respective query languages. Chapter 8 presents the data model for XML documents and the XPath query language, and Chapter 9 provides a theoretical presentation of tree-like data model and query language where the tuples of a relation share a tree-structured schema for that relation and the query language is a dialect of SQL with evaluation techniques appropriately modified to fit the richer schema.Table of ContentsPreface to the First Edition.- Preface to the Second Edition.- Acknowledgments.- Queries and Views.- Query Containment and Equivalence.- Finding Equivalent Rewritings.- Maximally Contained Rewritings (MCRs).- Answering Queries in Presence of Dependencies.- Answering Queries in Data Exchange.- Answering Queries Using Views.- XPath Queries and Views.- Tree-Structured Records Queried with SQL Dialect.- Bibliographical Notes for Chapters 1--7.- Conclusion for Chapters 1--7.- Bibliography.- Authors' Biographies.
£62.99
Springer International Publishing AG Fault-Tolerant Distributed Transactions on Blockchain
Book SynopsisSince the introduction of Bitcoin—the first widespread application driven by blockchain—the interest of the public and private sectors in blockchain has skyrocketed. In recent years, blockchain-based fabrics have been used to address challenges in diverse fields such as trade, food production, property rights, identity-management, aid delivery, health care, and fraud prevention. This widespread interest follows from fundamental concepts on which blockchains are built that together embed the notion of trust, upon which blockchains are built. 1. Blockchains provide data transparancy. Data in a blockchain is stored in the form of a ledger, which contains an ordered history of all the transactions. This facilitates oversight and auditing. 2. Blockchains ensure data integrity by using strong cryptographic primitives. This guarantees that transactions accepted by the blockchain are authenticated by its issuer, are immutable, and cannot be repudiated by the issuer. This ensures accountability. 3. Blockchains are decentralized, democratic, and resilient. They use consensus-based replication to decentralize the ledger among many independent participants. Thus, it can operate completely decentralized and does not require trust in a single authority. Additions to the chain are performed by consensus, in which all participants have a democratic voice in maintaining the integrity of the blockchain. Due to the usage of replication and consensus, blockchains are also highly resilient to malicious attacks even when a significant portion of the participants are malicious. It further increases the opportunity for fairness and equity through democratization. These fundamental concepts and the technologies behind them—a generic ledger-based data model, cryptographically ensured data integrity, and consensus-based replication—prove to be a powerful and inspiring combination, a catalyst to promote computational trust. In this book, we present an in-depth study of blockchain, unraveling its revolutionary promise to instill computational trust in society, all carefully tailored to a broad audience including students, researchers, and practitioners. We offer a comprehensive overview of theoretical limitations and practical usability of consensus protocols while examining the diverse landscape of how blockchains are manifested in their permissioned and permissionless forms.Table of ContentsPreface.- Introduction.- Practical Byzantine Fault-Tolerant Consensus.- Beyond the Design of PBFT.- Toward Scalable Blockchains.- Permissioned Blockchains.- Permissionless Blockchains.- Bibliography.- Authors' Biographies.
£49.49
Springer International Publishing AG Probabilistic Databases
Book SynopsisProbabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of uncertain data, which are best modeled and processed by a probabilistic database. This book presents the state of the art in representation formalisms and query processing techniques for probabilistic data. It starts by discussing the basic principles for representing large probabilistic databases, by decomposing them into tuple-independent tables, block-independent-disjoint tables, or U-databases. Then it discusses two classes of techniques for query evaluation on probabilistic databases. In extensional query evaluation, the entire probabilistic inference can be pushed into the database engine and, therefore, processed as effectively as the evaluation of standard SQL queries. The relational queries that can be evaluated this way are called safe queries. In intensional query evaluation, the probabilistic inference is performed over a propositional formula called lineage expression: every relational query can be evaluated this way, but the data complexity dramatically depends on the query being evaluated, and can be #P-hard. The book also discusses some advanced topics in probabilistic data management such as top-k query processing, sequential probabilistic databases, indexing and materialized views, and Monte Carlo databases. Table of Contents: Overview / Data and Query Model / The Query Evaluation Problem / Extensional Query Evaluation / Intensional Query Evaluation / Advanced TechniquesTable of ContentsOverview.- Data and Query Model.- The Query Evaluation Problem.- Extensional Query Evaluation.- Intensional Query Evaluation.- Advanced Techniques.
£26.99
Springer International Publishing AG Methods for Mining and Summarizing Text Conversations
Book SynopsisDue to the Internet Revolution, human conversational data -- in written forms -- are accumulating at a phenomenal rate. At the same time, improvements in speech technology enable many spoken conversations to be transcribed. Individuals and organizations engage in email exchanges, face-to-face meetings, blogging, texting and other social media activities. The advances in natural language processing provide ample opportunities for these "informal documents" to be analyzed and mined, thus creating numerous new and valuable applications. This book presents a set of computational methods to extract information from conversational data, and to provide natural language summaries of the data. The book begins with an overview of basic concepts, such as the differences between extractive and abstractive summaries, and metrics for evaluating the effectiveness of summarization and various extraction tasks. It also describes some of the benchmark corpora used in the literature. The book introduces extraction and mining methods for performing subjectivity and sentiment detection, topic segmentation and modeling, and the extraction of conversational structure. It also describes frameworks for conducting dialogue act recognition, decision and action item detection, and extraction of thread structure. There is a specific focus on performing all these tasks on conversational data, such as meeting transcripts (which exemplify synchronous conversations) and emails (which exemplify asynchronous conversations). Very recent approaches to deal with blogs, discussion forums and microblogs (e.g., Twitter) are also discussed. The second half of this book focuses on natural language summarization of conversational data. It gives an overview of several extractive and abstractive summarizers developed for emails, meetings, blogs and forums. It also describes attempts for building multi-modal summarizers. Last but not least, the book concludes with thoughts on topics for further development. Table of Contents: Introduction / Background: Corpora and Evaluation Methods / Mining Text Conversations / Summarizing Text Conversations / Conclusions / Final ThoughtsTable of ContentsIntroduction.- Background: Corpora and Evaluation Methods.- Mining Text Conversations.- Summarizing Text Conversations.- Conclusions.- Final Thoughts.
£25.19
Springer International Publishing AG Fundamentals of Physical Design and Query Compilation
Book SynopsisQuery compilation is the problem of translating user requests formulated over purely conceptual and domain specific ways of understanding data, commonly called logical designs, to efficient executable programs called query plans. Such plans access various concrete data sources through their low-level often iterator-based interfaces. An appreciation of the concrete data sources, their interfaces and how such capabilities relate to logical design is commonly called a physical design. This book is an introduction to the fundamental methods underlying database technology that solves the problem of query compilation. The methods are presented in terms of first-order logic which serves as the vehicle for specifying physical design, expressing user requests and query plans, and understanding how query plans implement user requests. Table of Contents: Introduction / Logical Design and User Queries / Basic Physical Design and Query Plans / On Practical Physical Design / Query Compilation and Plan Synthesis / Updating DataTable of ContentsIntroduction.- Logical Design and User Queries.- Basic Physical Design and Query Plans.- On Practical Physical Design.- Query Compilation and Plan Synthesis.- Updating Data.
£25.19
Springer International Publishing AG Managing Event Information
Book SynopsisWith the proliferation of citizen reporting, smart mobile devices, and social media, an increasing number of people are beginning to generate information about events they observe and participate in. A significant fraction of this information contains multimedia data to share the experience with their audience. A systematic information modeling and management framework is necessary to capture this widely heterogeneous, schemaless, potentially humongous information produced by many different people. This book is an attempt to examine the modeling, storage, querying, and applications of such an event management system in a holistic manner. It uses a semantic-web style graph-based view of events, and shows how this event model, together with its query facility, can be used toward emerging applications like semi-automated storytelling. Table of Contents: Introduction / Event Data Models / Implementing an Event Data Model / Querying Events / Storytelling with Events / An Emerging Application / ConclusionTable of ContentsIntroduction.- Event Data Models.- Implementing an Event Data Model.- Querying Events.- Storytelling with Events.- An Emerging Application.- Conclusion.
£25.19
Springer International Publishing AG Database Repairing and Consistent Query Answering
Book SynopsisIntegrity constraints are semantic conditions that a database should satisfy in order to be an appropriate model of external reality. In practice, and for many reasons, a database may not satisfy those integrity constraints, and for that reason it is said to be inconsistent. However, and most likely, a large portion of the database is still semantically correct, in a sense that has to be made precise. After having provided a formal characterization of consistent data in an inconsistent database, the natural problem emerges of extracting that semantically correct data, as query answers. The consistent data in an inconsistent database is usually characterized as the data that persists across all the database instances that are consistent and minimally differ from the inconsistent instance. Those are the so-called repairs of the database. In particular, the consistent answers to a query posed to the inconsistent database are those answers that can be simultaneously obtained from all the database repairs. As expected, the notion of repair requires an adequate notion of distance that allows for the comparison of databases with respect to how much they differ from the inconsistent instance. On this basis, the minimality condition on repairs can be properly formulated. In this monograph we present and discuss these fundamental concepts, different repair semantics, algorithms for computing consistent answers to queries, and also complexity-theoretic results related to the computation of repairs and doing consistent query answering. Table of Contents: Introduction / The Notions of Repair and Consistent Answer / Tractable CQA and Query Rewriting / Logically Specifying Repairs / Decision Problems in CQA: Complexity and Algorithms / Repairs and Data CleaningTable of ContentsIntroduction.- The Notions of Repair and Consistent Answer.- Tractable CQA and Query Rewriting.- Logically Specifying Repairs.- Decision Problems in CQA: Complexity and Algorithms.- Repairs and Data Cleaning.
£25.19
Springer International Publishing AG Spatial Data Management
Book SynopsisSpatial database management deals with the storage, indexing, and querying of data with spatial features, such as location and geometric extent. Many applications require the efficient management of spatial data, including Geographic Information Systems, Computer Aided Design, and Location Based Services. The goal of this book is to provide the reader with an overview of spatial data management technology, with an emphasis on indexing and search techniques. It first introduces spatial data models and queries and discusses the main issues of extending a database system to support spatial data. It presents indexing approaches for spatial data, with a focus on the R-tree. Query evaluation and optimization techniques for the most popular spatial query types (selections, nearest neighbor search, and spatial joins) are portrayed for data in Euclidean spaces and spatial networks. The book concludes by demonstrating the ample application of spatial data management technology on a wide range of related application domains: management of spatio-temporal data and high-dimensional feature vectors, multi-criteria ranking, data mining and OLAP, privacy-preserving data publishing, and spatial keyword search. Table of Contents: Introduction / Spatial Data / Indexing / Spatial Query Evaluation / Spatial Networks / Applications of Spatial Data Management TechnologyTable of ContentsIntroduction.- Spatial Data.- Indexing.- Spatial Query Evaluation.- Spatial Networks.- Applications of Spatial Data Management Technology.
£26.99
Springer International Publishing AG Query Answer Authentication
Book SynopsisIn data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / ConclusionTable of ContentsIntroduction.- Cryptography Foundation.- Relational Queries.- Spatial Queries.- Text Search Queries.- Data Streams.- Conclusion.
£25.19
Springer International Publishing AG P2P Techniques for Decentralized Applications
Book SynopsisAs an alternative to traditional client-server systems, Peer-to-Peer (P2P) systems provide major advantages in terms of scalability, autonomy and dynamic behavior of peers, and decentralization of control. Thus, they are well suited for large-scale data sharing in distributed environments. Most of the existing P2P approaches for data sharing rely on either structured networks (e.g., DHTs) for efficient indexing, or unstructured networks for ease of deployment, or some combination. However, these approaches have some limitations, such as lack of freedom for data placement in DHTs, and high latency and high network traffic in unstructured networks. To address these limitations, gossip protocols which are easy to deploy and scale well, can be exploited. In this book, we will give an overview of these different P2P techniques and architectures, discuss their trade-offs, and illustrate their use for decentralizing several large-scale data sharing applications. Table of Contents: P2P Overlays, Query Routing, and Gossiping / Content Distribution in P2P Systems / Recommendation Systems / Top-k Query Processing in P2P SystemsTable of ContentsP2P Overlays, Query Routing, and Gossiping.- Content Distribution in P2P Systems.- Recommendation Systems.- Top-k Query Processing in P2P Systems.
£25.19
Springer International Publishing AG Deep Web Query Interface Understanding and Integration
Book SynopsisThere are millions of searchable data sources on the Web and to a large extent their contents can only be reached through their own query interfaces. There is an enormous interest in making the data in these sources easily accessible. There are primarily two general approaches to achieve this objective. The first is to surface the contents of these sources from the deep Web and add the contents to the index of regular search engines. The second is to integrate the searching capabilities of these sources and support integrated access to them. In this book, we introduce the state-of-the-art techniques for extracting, understanding, and integrating the query interfaces of deep Web data sources. These techniques are critical for producing an integrated query interface for each domain. The interface serves as the mediator for searching all data sources in the concerned domain. While query interface integration is only relevant for the deep Web integration approach, the extraction and understanding of query interfaces are critical for both deep Web exploration approaches. This book aims to provide in-depth and comprehensive coverage of the key technologies needed to create high quality integrated query interfaces automatically. The following technical issues are discussed in detail in this book: query interface modeling, query interface extraction, query interface clustering, query interface matching, query interface attribute integration, and query interface integration. Table of Contents: Introduction / Query Interface Representation and Extraction / Query Interface Clustering and Categorization / Query Interface Matching / Query Interface Attribute Integration / Query Interface Integration / Summary and Future ResearchTable of ContentsIntroduction.- Query Interface Representation and Extraction.- Query Interface Clustering and Categorization.- Query Interface Matching.- Query Interface Attribute Integration.- Query Interface Integration.- Summary and Future Research.
£26.99
Springer International Publishing AG Business Processes
Book SynopsisWhile classic data management focuses on the data itself, research on Business Processes also considers the context in which this data is generated and manipulated, namely the processes, users, and goals that this data serves. This provides the analysts a better perspective of the organizational needs centered around the data. As such, this research is of fundamental importance. Much of the success of database systems in the last decade is due to the beauty and elegance of the relational model and its declarative query languages, combined with a rich spectrum of underlying evaluation and optimization techniques, and efficient implementations. Much like the case for traditional database research, elegant modeling and rich underlying technology are likely to be highly beneficiary for the Business Process owners and their users; both can benefit from easy formulation and analysis of the processes. While there have been many important advances in this research in recent years, there is still much to be desired: specifically, there have been many works that focus on the processes behavior (flow), and many that focus on its data, but only very few works have dealt with both the state-of-the-art in a database approach to Business Process modeling and analysis, the progress towards a holistic flow-and-data framework for these tasks, and highlight the current gaps and research directions. Table of Contents: Introduction / Modeling / Querying Business Processes / Other Issues / ConclusionTable of ContentsIntroduction.- Modeling.- Querying Business Processes.- Other Issues.- Conclusion.
£25.19
Springer International Publishing AG Foundations of Data Quality Management
Book SynopsisData quality is one of the most important problems in data management. A database system typically aims to support the creation, maintenance, and use of large amount of data, focusing on the quantity of data. However, real-life data are often dirty: inconsistent, duplicated, inaccurate, incomplete, or stale. Dirty data in a database routinely generate misleading or biased analytical results and decisions, and lead to loss of revenues, credibility and customers. With this comes the need for data quality management. In contrast to traditional data management tasks, data quality management enables the detection and correction of errors in the data, syntactic or semantic, in order to improve the quality of the data and hence, add value to business processes. While data quality has been a longstanding problem for decades, the prevalent use of the Web has increased the risks, on an unprecedented scale, of creating and propagating dirty data. This monograph gives an overview of fundamental issues underlying central aspects of data quality, namely, data consistency, data deduplication, data accuracy, data currency, and information completeness. We promote a uniform logical framework for dealing with these issues, based on data quality rules. The text is organized into seven chapters, focusing on relational data. Chapter One introduces data quality issues. A conditional dependency theory is developed in Chapter Two, for capturing data inconsistencies. It is followed by practical techniques in Chapter 2b for discovering conditional dependencies, and for detecting inconsistencies and repairing data based on conditional dependencies. Matching dependencies are introduced in Chapter Three, as matching rules for data deduplication. A theory of relative information completeness is studied in Chapter Four, revising the classical Closed World Assumption and the Open World Assumption, to characterize incomplete information in the real world. A data currency model is presented in Chapter Five, to identify the current values of entities in a database and to answer queries with the current values, in the absence of reliable timestamps. Finally, interactions between these data quality issues are explored in Chapter Six. Important theoretical results and practical algorithms are covered, but formal proofs are omitted. The bibliographical notes contain pointers to papers in which the results were presented and proven, as well as references to materials for further reading. This text is intended for a seminar course at the graduate level. It is also to serve as a useful resource for researchers and practitioners who are interested in the study of data quality. The fundamental research on data quality draws on several areas, including mathematical logic, computational complexity and database theory. It has raised as many questions as it has answered, and is a rich source of questions and vitality. Table of Contents: Data Quality: An Overview / Conditional Dependencies / Cleaning Data with Conditional Dependencies / Data Deduplication / Information Completeness / Data Currency / Interactions between Data Quality IssuesTable of ContentsData Quality: An Overview.- Conditional Dependencies.- Cleaning Data with Conditional Dependencies.- Data Deduplication.- Information Completeness.- Data Currency.- Interactions between Data Quality Issues.
£25.19
Springer International Publishing AG Incomplete Data and Data Dependencies in Relational Databases
Book SynopsisThe chase has long been used as a central tool to analyze dependencies and their effect on queries. It has been applied to different relevant problems in database theory such as query optimization, query containment and equivalence, dependency implication, and database schema design. Recent years have seen a renewed interest in the chase as an important tool in several database applications, such as data exchange and integration, query answering in incomplete data, and many others. It is well known that the chase algorithm might be non-terminating and thus, in order for it to find practical applicability, it is crucial to identify cases where its termination is guaranteed. Another important aspect to consider when dealing with the chase is that it can introduce null values into the database, thereby leading to incomplete data. Thus, in several scenarios where the chase is used the problem of dealing with data dependencies and incomplete data arises. This book discusses fundamental issues concerning data dependencies and incomplete data with a particular focus on the chase and its applications in different database areas. We report recent results about the crucial issue of identifying conditions that guarantee the chase termination. Different database applications where the chase is a central tool are discussed with particular attention devoted to query answering in the presence of data dependencies and database schema design. Table of Contents: Introduction / Relational Databases / Incomplete Databases / The Chase Algorithm / Chase Termination / Data Dependencies and Normal Forms / Universal Repairs / Chase and Database ApplicationsTable of ContentsIntroduction.- Relational Databases.- Incomplete Databases.- The Chase Algorithm.- Chase Termination.- Data Dependencies and Normal Forms.- Universal Repairs.- Chase and Database Applications.
£31.49
Springer International Publishing AG Semantics Empowered Web 3.0
Book SynopsisAfter the traditional document-centric Web 1.0 and user-generated content focused Web 2.0, Web 3.0 has become a repository of an ever growing variety of Web resources that include data and services associated with enterprises, social networks, sensors, cloud, as well as mobile and other devices that constitute the Internet of Things. These pose unprecedented challenges in terms of heterogeneity (variety), scale (volume), and continuous changes (velocity), as well as present corresponding opportunities if they can be exploited. Just as semantics has played a critical role in dealing with data heterogeneity in the past to provide interoperability and integration, it is playing an even more critical role in dealing with the challenges and helping users and applications exploit all forms of Web 3.0 data. This book presents a unified approach to harness and exploit all forms of contemporary Web resources using the core principles of ability to associate meaning with data through conceptual or domain models and semantic descriptions including annotations, and through advanced semantic techniques for search, integration, and analysis. It discusses the use of Semantic Web standards and techniques when appropriate, but also advocates the use of lighter weight, easier to use, and more scalable options when they are more suitable. The authors' extensive experience spanning research and prototypes to development of operational applications and commercial technologies and products guide the treatment of the material. Table of Contents: Role of Semantics and Metadata / Types and Models of Semantics / Annotation -- Adding Semantics to Data / Semantics for Enterprise Data / Semantics for Services / Semantics for Sensor Data / Semantics for Social Data / Semantics for Cloud Computing / Semantics for Advanced ApplicationsTable of ContentsRole of Semantics and Metadata.- Types and Models of Semantics.- Annotation -- Adding Semantics to Data.- Semantics for Enterprise Data.- Semantics for Services.- Semantics for Sensor Data.- Semantics for Social Data.- Semantics for Cloud Computing.- Semantics for Advanced Applications.
£25.19
Springer International Publishing AG Data Management in the Cloud
Book SynopsisCloud computing has emerged as a successful paradigm of service-oriented computing and has revolutionized the way computing infrastructure is used. This success has seen a proliferation in the number of applications that are being deployed in various cloud platforms. There has also been an increase in the scale of the data generated as well as consumed by such applications. Scalable database management systems form a critical part of the cloud infrastructure. The attempt to address the challenges posed by the management of big data has led to a plethora of systems. This book aims to clarify some of the important concepts in the design space of scalable data management in cloud computing infrastructures. Some of the questions that this book aims to answer are: the appropriate systems for a specific set of application requirements, the research challenges in data management for the cloud, and what is novel in the cloud for database researchers? We also aim to address one basic question: whether cloud computing poses new challenges in scalable data management or it is just a reincarnation of old problems? We provide a comprehensive background study of state-of-the-art systems for scalable data management and analysis. We also identify important aspects in the design of different systems and the applicability and scope of these systems. A thorough understanding of current solutions and a precise characterization of the design space are essential for clearing the "cloudy skies of data management" and ensuring the success of DBMSs in the cloud, thus emulating the success enjoyed by relational databases in traditional enterprise settings. Table of Contents: Introduction / Distributed Data Management / Cloud Data Management: Early Trends / Transactions on Co-located Data / Transactions on Distributed Data / Multi-tenant Database Systems / Concluding RemarksTable of ContentsIntroduction.- Distributed Data Management.- Cloud Data Management: Early Trends.- Transactions on Co-located Data.- Transactions on Distributed Data.- Multi-tenant Database Systems.- Concluding Remarks.
£25.19
Springer International Publishing AG The Answer Machine
Book SynopsisThe Answer Machine is a practical, non-technical guide to the technologies behind information seeking and analysis. It introduces search and content analytics to software buyers, knowledge managers, and searchers who want to understand and design effective online environments. The book describes how search evolved from an expert-only to an end user tool. It provides an overview of search engines, categorization and clustering, natural language processing, content analytics, and visualization technologies. Detailed profiles for Web search, eCommerce search, eDiscovery, and enterprise search contrast the types of users, uses, tasks, technologies, and interaction designs for each. These variables shape each application, although the underlying technologies are the same. Types of information tasks and the trade-offs between precision and recall, time, volume and precision, and privacy vs. personalization are discussed within this context. The book examines trends toward convenient, context-aware computing, big data and analytics technologies, conversational systems, and answer machines. The Answer Machine explores IBM Watson's DeepQA technology and describes how it is used to answer health care and Jeopardy questions. The book concludes by discussing the implications of these advances: how they will change the way we run our businesses, practice medicine, govern, or conduct our lives in the digital age. Table of Contents: Introduction / The Query Process and Barriers to Finding Information Online / Online Search: An Evolution / Search and Discovery Technologies: An Overview / Information Access: A Spectrum of Needs and Uses / Future Tense: The Next Era in Information Access and Discovery / Answer MachinesTable of ContentsIntroduction.- The Query Process and Barriers to Finding Information Online.- Online Search: An Evolution.- Search and Discovery Technologies: An Overview.- Information Access: A Spectrum of Needs and Uses.- Future Tense: The Next Era in Information Access and Discovery.- Answer Machines.
£25.19
Springer International Publishing AG Key Issues Regarding Digital Libraries: Evaluation and Integration
Book SynopsisThis is the second book based on the 5S (Societies, Scenarios, Spaces, Structures, Streams) approach to digital libraries (DLs). Leveraging the first volume, on Theoretical Foundations, we focus on the key issues of evaluation and integration. These cross-cutting issues serve as a bridge for those interested in DLs, connecting the introduction and formal discussion in the first book, with the coverage of key technologies in the third book, and of illustrative applications in the fourth book. These two topics have central importance in the DL field, allowing it to be treated scientifically as well as practically. In the scholarly world, we only really understand something if we know how to measure and evaluate it. In the Internet era of distributed information systems, we only can be practical at scale if we integrate across both systems and their associated content. Evaluation of DLs must take place atmultiple levels,so we can address the different entities and their associated measures. Thus, for digital objects, we assess accessibility, pertinence, preservability, relevance, significance, similarity, and timeliness. Other measures are specific to higher-level constructs like metadata, collections, catalogs, repositories, and services.We tie these together through a case study of the 5SQual tool, which we designed and implemented to perform an automatic quantitative evaluation of DLs. Thus, across the Information Life Cycle, we describe metrics and software useful to assess the quality of DLs, and demonstrate utility with regard to representative application areas: archaeology and education. Though integration has been a challenge since the earliest work on DLs, we provide the first comprehensive 5S-based formal description of the DL integration problem, cast in the context of related work. Since archaeology is a fundamentally distributed enterprise, we describe ETANADL, for integrating Near Eastern Archeology sites and information. Thus, we show how 5S-based modeling can lead to integrated services and content. While the first book adopts a minimalist and formal approach to DLs, and provides a systematic and functional method to design and implement DL exploring services, here we broaden to practical DLs with richer metamodels, demonstrating the power of 5S for integration and evaluation.Table of ContentsEvaluation.- Integration.- Bibliography.
£25.19
Springer International Publishing AG Digital Libraries Applications
Book SynopsisDigital libraries (DLs) have evolved since their launch in 1991 into an important type of information system, with widespread application. This volume advances that trend further by describing new research and development in the DL field that builds upon the 5S (Societies, Scenarios, Spaces, Structures, Streams) framework, which is discussed in three other DL volumes in this series.While the 5S framework may be used to describe many types of information systems, and is likely to have even broader utility and appeal, we focus here on digital libraries. Drawing upon six (Akbar, Kozievitch, Leidig, Li, Murthy, Park) completed and two (Chen, Fouh) in-process dissertations, as well as the efforts of collaborating researchers, and scores of related publications, presentations, tutorials, and reports, this book demonstrates the applicability of 5S in five digital library application areas, that also have importance in the context of the WWW, Web 2.0, and innovative information systems. By integrating surveys of the state-of-the-art, newresearch, connections with formalization, case studies, and exercises/projects, this book can serve as a textbook for those interested in computing, information, and/or library science. Chapter 1 focuses on images, explaining how they connect with information retrieval, in the context of CBIR systems. Chapter 2 gives two case studies of DLs used in education, which is one of the most common applications of digital libraries. Chapter 3 covers social networks, which are at the heart of work onWeb 2.0, explaining the construction and use of deduced graphs, that can enhance retrieval and recommendation. Chapter 4 demonstrates the value of DLs in eScience, focusing, in particular, on cyber-infrastructure for simulation. Chapter 5 surveys geospatial information in DLs, with a case study on geocoding. Given this rich content, we trust that any interested in digital libraries, or in related systems, will find this volume to be motivating, intellectually satisfying, and useful. We hope it will help move digital libraries forward into a science as well as a practice. We hope it will help build community that will address the needs of the next generation of DLs.Table of ContentsContent-Based Image Retrieval.- Education.- Social Networks in Digital Libraries.- eScience and Simulation Digital Libraries.- Geospatial Information.- Bibliography.
£25.19