Network hardware Books

292 products


  • Computer Networks and the Internet: A Hands-On Approach

    Springer Nature Switzerland AG Computer Networks and the Internet: A Hands-On Approach

    1 in stock

    Book SynopsisThe goal of this textbook is to provide enough background into the inner workings of the Internet to allow a novice to understand how the various protocols on the Internet work together to accomplish simple tasks, such as a search. By building an Internet with all the various services a person uses every day, one will gain an appreciation not only of the work that goes on unseen, but also of the choices made by designers to make life easier for the user.Each chapter consists of background information on a specific topic or Internet service, and where appropriate a final section on how to configure a Raspberry Pi to provide that service.While mainly meant as an undergraduate textbook for a course on networking or Internet protocols and services, it can also be used by anyone interested in the Internet as a step–by–step guide to building one's own Intranet, or as a reference guide as to how things work on the global Internet Trade Review“The detailed coverage of networking topics together with practical hands-on illustrations of the principles using the Raspberry Pi laboratory network make this an excellent candidate for a course textbook. In addition, the detailed table of contents, good index, and extensive list of references also make it useful for reference … . If you want just one book in your technical library to cover the Internet and networking technology, then this is an ideal candidate.” (David B. Henderson, Computing Reviews, August 17, 2021)Table of Contents1. Introduction.- 2. The OSI Seven Layer Model.- 3. The Physical Layer, L1.- 4. The Data Layer, L2.- 5. The Network Layer, L3.- 6. The OSI Upper Layers.- 7. Flow Control.- 8. The Laboratory Network.- 9. Raspberry Pi Operating System.- 10. Routing.- 11. The Router.- 12. Populating and Maintaining the Route Table.- 13. Shortest Path Through the Network.- 14. Dynamic Host Configuration.- 15. Routing Protocols.- 16. Route Interchange Protocol.- 17. Open Shortest Path First.- 18. Service Provider Protocols.- 19. Babel.- 20. Domain Name Service.- 21. Hyper Text Transfer Protocol: The Web.- 22. Simple Mail Transfer Protocol: Email.- 23. Other Services.- Glossary.- References.- Index.

    1 in stock

    £44.99

  • Internet Computing: Principles of Distributed

    Springer Nature Switzerland AG Internet Computing: Principles of Distributed

    1 in stock

    Book SynopsisThis book introduces the reader to the fundamentals of contemporary, emerging and future technologies and services in Internet computing. It covers essential concepts such as distributed systems architectures and web technologies, contemporary paradigms such as cloud computing and the Internet of things, and emerging technologies like distributed ledger technologies and fog computing. The book also highlights the interconnection and recombination of these Internet-based technologies, which together form a critical information infrastructure with major impacts on individuals, organizations, governments, economies, and society as a whole.Intended as a textbook for upper undergraduate and graduate classes, it features a wealth of examples, learning goals and summaries for every chapter, numerous recommendations for further reading, and questions for checking students’ comprehension. A dedicated author website offers additional teaching material and more elaborate examples. Accordingly, the book enables students and young professionals in IT-related fields to familiarize themselves with the Internet’s basic mechanisms, and with the most promising Internet-based technologies of our time. Table of Contents1 Introduction to Internet Computing.- 2 Information Systems Architecture.- 3 Design of Good Information Systems Architectures.- 4 Internet Architectures.- 5 Middleware.- 6 Web services.- 7 Cloud Computing.- 8 Fog and Edge Computing.- 9 Distributed Ledger Technology.- 10 The Internet of Things.- 11 Critical Information Infrastructures.- 12 Emerging Technologies.- Glossary.

    1 in stock

    £56.99

  • Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings

    Springer Nature Switzerland AG Distributed Computing and Internet Technology: 16th International Conference, ICDCIT 2020, Bhubaneswar, India, January 9–12, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 16th International Conference on Distributed Computing and Internet Technology, ICDCIT 2020, held in Bhubaneswar, India, in January 2020. The 20 full and 3 short papers presented in this volume were carefully reviewed and selected from 110 submissions. In addition, the book included 6 invited papers. The contributions were organized in topical sections named: invited talks; concurrent and distributed systems modelling and verification; cloud and grid computing; social networks, machine learning and mobile networks; data processing and blockchain technology; and short papers. Table of ContentsInvited Talks.- Graph Analytics.- A distributed and trusted web of formal proofs.- Prosperos Books: A Distributed Architecture for AI.- Trust: Anthropomorphic Algorithmic.- A Very Gentle Introduction to Multiparty Session Types.- Constructing Knowledge Graph from Data Catalogues.- Concurrent and Distributed Systems Modelling and Verification.- Round-Message Trade-off in Distributed Steiner Tree Construction in the CON GEST model.- An Efficient Message Transmission and Verification Scheme for VANETs.- Generalised Dining Philosophers as Feedback Control.- Verifying Implicitly Quantified Modal Logic over dynamic networks of processes.- Cloud and Grid Computing.- Secure Content-based Image Retrieval using Combined Features in Cloud.- Design of a Scheduling Approach for Budget-deadline Constrained Applications in Heterogeneous Clouds.- Resource Scheduling for Tasks of a Workflow in Cloud Environment.- Bearing Fault Classification using Wavelet Energy and Autoencoder.- Social Networks, Machine Learning and Mobile Networks.- Community Detection in Social Networks using Deep Learning.- Multi-Winner Heterogeneous Spectrum Auction Mechanism for Channel Allocation in Cognitive Radio Networks.- A Hybrid Approach for Fake News Detection in Twitter based on User Features and Graph Embedding.- Online Context-Adaptive Energy-Aware Security Allocation in Mobile Devices: A Tale of Two Algorithms.- A Framework Towards Generalized Mid-term Energy Forecasting Model for Industrial Sector in Smart Grid.- An Online Low-Cost System for Air Quality Monitoring, Prediction, and Warning.-Word2vecs Distributed Word Representation for Hindi Word Sense Disambiguation.- Text Document Clustering using Community Discovery Approach.- Data Processing and Blockchain Technology.- An Efficient and Novel Buyer and Sellers Distributed Ledger Based Protocol Using Smart Contracts.- Distributed and Lazy Auditing of Outsourced Data HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- HealthChain: A Secure Scalable Health Care Data Management System Using Blockchain.- Transcript Management Using Blockchain enabled Smart Contracts.- Short Papers.- Identifying Reduced Features based on IG-Threshold for DoS Attack Detection using PART.- Uniform Circle Formation by Swarm Robots Under Limited Visibility.- Histopathological Image Classification by Optimized Neural Network using IGSA.

    1 in stock

    £62.99

  • Technology, Innovation, Entrepreneurship and Education: 3rd EAI International Conference, TIE 2019, Braga, Portugal, October 17–18, 2019, Proceedings

    Springer Nature Switzerland AG Technology, Innovation, Entrepreneurship and Education: 3rd EAI International Conference, TIE 2019, Braga, Portugal, October 17–18, 2019, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 3rd International Conference on Technology, Innovation, Entrepreneurship and Education, TIE 2019, held in Braga, Portugal, in October 2019. The 11 full and 2 short papers focus on emerging technologies for education, entertainment, well-being, creativity, arts and business development. In addition, it aims at promoting new venture creation opportunities that emerge from these innovations, as well as innovation methods that target these core subjects.Table of ContentsInnovating and Exploring Children´s Learning.- Reading to Level Up: Gamifying Reading Fluency.- Rethinking the Design of Hotspots in Children’s Digital Picturebooks: Insights from an Exploratory Study.- Children’s tinkering activity with Collapse Informatics: the Internalization of Environmental Consciousness.- ”Play and learn”: exploring CodeCubes Innovating Media Usage.- Question & Answering interface to improve the students’ experience in an e-learning course with a virtual tutor.- Exploring the Use of Augmented Reality Concepts to Enhance the TV Viewer Experience.- Design Experiments in Nonrepresentational VR and Symmetric Texture Generation in Real-Time Innovation for Special Needs.- Didactic toy for children with special needs.- Digitally-mediated Learning Environments and Information Literacy for Active Ageing: A Pilot Study.- European video game development and disability: Reflections on data, rights, decisions and assistance Innovating Methods.- From community datamining to enterprising villagers.- The transformational effect of a designerly approach within a research project.- Visual Quotes and Physical Activity Tracking: Can Aesthetic Pleasure Motivate Our Short-term Exercise Motivation?.- Raising the Odds of Success for Innovative Product by Experimentation and Utilizing Input of Future User.

    1 in stock

    £34.19

  • Linear Algebra and Optimization for Machine

    Springer Nature Switzerland AG Linear Algebra and Optimization for Machine

    Out of stock

    Book SynopsisThis textbook introduces linear algebra and optimization in the context of machine learning. Examples and exercises are provided throughout the book. A solution manual for the exercises at the end of each chapter is available to teaching instructors. This textbook targets graduate level students and professors in computer science, mathematics and data science. Advanced undergraduate students can also use this textbook. The chapters for this textbook are organized as follows:1. Linear algebra and its applications: The chapters focus on the basics of linear algebra together with their common applications to singular value decomposition, matrix factorization, similarity matrices (kernel methods), and graph analysis. Numerous machine learning applications have been used as examples, such as spectral clustering, kernel-based classification, and outlier detection. The tight integration of linear algebra methods with examples from machine learning differentiates this book from generic volumes on linear algebra. The focus is clearly on the most relevant aspects of linear algebra for machine learning and to teach readers how to apply these concepts.2. Optimization and its applications: Much of machine learning is posed as an optimization problem in which we try to maximize the accuracy of regression and classification models. The “parent problem” of optimization-centric machine learning is least-squares regression. Interestingly, this problem arises in both linear algebra and optimization, and is one of the key connecting problems of the two fields. Least-squares regression is also the starting point for support vector machines, logistic regression, and recommender systems. Furthermore, the methods for dimensionality reduction and matrix factorization also require the development of optimization methods. A general view of optimization in computational graphs is discussed together with its applications to back propagation in neural networks. A frequent challenge faced by beginners in machine learning is the extensive background required in linear algebra and optimization. One problem is that the existing linear algebra and optimization courses are not specific to machine learning; therefore, one would typically have to complete more course material than is necessary to pick up machine learning. Furthermore, certain types of ideas and tricks from optimization and linear algebra recur more frequently in machine learning than other application-centric settings. Therefore, there is significant value in developing a view of linear algebra and optimization that is better suited to the specific perspective of machine learning. Trade Review“Based on the topics covered and the excellent presentation, I would recommend Aggarwal's book over these other books for an advanced undergraduate or beginning graduate course on mathematics for data science.” (Brian Borchers, MAA Reviews, March 28, 2021)“This book should be of interest to graduate students in engineering, applied mathematics, and other fields requiring an understanding of the mathematical underpinnings of machine learning.” (IEEE Control Systems Magazine, Vol. 40 (6), December, 2020)Table of ContentsPreface.- 1 Linear Algebra and Optimization: An Introduction.- 2 Linear Transformations and Linear Systems.- 3 Eigenvectors and Diagonalizable Matrices.- 4 Optimization Basics: A Machine Learning View.- 5 Advanced Optimization Solutions.- 6 Constrained Optimization and Duality.- 7 Singular Value Decomposition.- 8 Matrix Factorization.- 9 The Linear Algebra of Similarity.- 10 The Linear Algebra of Graphs.- 11 Optimization in Computational Graphs.- Index.

    Out of stock

    £49.49

  • Linear Algebra and Optimization for Machine

    Springer Nature Switzerland AG Linear Algebra and Optimization for Machine

    15 in stock

    Book SynopsisThis textbook introduces linear algebra and optimization in the context of machine learning. Examples and exercises are provided throughout the book. A solution manual for the exercises at the end of each chapter is available to teaching instructors. This textbook targets graduate level students and professors in computer science, mathematics and data science. Advanced undergraduate students can also use this textbook. The chapters for this textbook are organized as follows:1. Linear algebra and its applications: The chapters focus on the basics of linear algebra together with their common applications to singular value decomposition, matrix factorization, similarity matrices (kernel methods), and graph analysis. Numerous machine learning applications have been used as examples, such as spectral clustering, kernel-based classification, and outlier detection. The tight integration of linear algebra methods with examples from machine learning differentiates this book from generic volumes on linear algebra. The focus is clearly on the most relevant aspects of linear algebra for machine learning and to teach readers how to apply these concepts.2. Optimization and its applications: Much of machine learning is posed as an optimization problem in which we try to maximize the accuracy of regression and classification models. The “parent problem” of optimization-centric machine learning is least-squares regression. Interestingly, this problem arises in both linear algebra and optimization, and is one of the key connecting problems of the two fields. Least-squares regression is also the starting point for support vector machines, logistic regression, and recommender systems. Furthermore, the methods for dimensionality reduction and matrix factorization also require the development of optimization methods. A general view of optimization in computational graphs is discussed together with its applications to back propagation in neural networks. A frequent challenge faced by beginners in machine learning is the extensive background required in linear algebra and optimization. One problem is that the existing linear algebra and optimization courses are not specific to machine learning; therefore, one would typically have to complete more course material than is necessary to pick up machine learning. Furthermore, certain types of ideas and tricks from optimization and linear algebra recur more frequently in machine learning than other application-centric settings. Therefore, there is significant value in developing a view of linear algebra and optimization that is better suited to the specific perspective of machine learning. Trade Review“Based on the topics covered and the excellent presentation, I would recommend Aggarwal's book over these other books for an advanced undergraduate or beginning graduate course on mathematics for data science.” (Brian Borchers, MAA Reviews, March 28, 2021)“This book should be of interest to graduate students in engineering, applied mathematics, and other fields requiring an understanding of the mathematical underpinnings of machine learning.” (IEEE Control Systems Magazine, Vol. 40 (6), December, 2020)Table of ContentsPreface.- 1 Linear Algebra and Optimization: An Introduction.- 2 Linear Transformations and Linear Systems.- 3 Eigenvectors and Diagonalizable Matrices.- 4 Optimization Basics: A Machine Learning View.- 5 Advanced Optimization Solutions.- 6 Constrained Optimization and Duality.- 7 Singular Value Decomposition.- 8 Matrix Factorization.- 9 The Linear Algebra of Similarity.- 10 The Linear Algebra of Graphs.- 11 Optimization in Computational Graphs.- Index.

    15 in stock

    £42.74

  • Artificial Intelligence in Economics and Finance

    Springer Nature Switzerland AG Artificial Intelligence in Economics and Finance

    1 in stock

    Book SynopsisAs Artificial Intelligence (AI) seizes all aspects of human life, there is a fundamental shift in the way in which humans are thinking of and doing things. Ordinarily, humans have relied on economics and finance theories to make sense of, and predict concepts such as comparative advantage, long run economic growth, lack or distortion of information and failures, role of labour as a factor of production and the decision making process for the purpose of allocating resources among other theories. Of interest though is that literature has not attempted to utilize these advances in technology in order to modernize economic and finance theories that are fundamental in the decision making process for the purpose of allocating scarce resources among other things. With the simulated intelligence in machines, which allows machines to act like humans and to some extent even anticipate events better than humans, thanks to their ability to handle massive data sets, this book will use artificial intelligence to explain what these economic and finance theories mean in the context of the agent wanting to make a decision. The main feature of finance and economic theories is that they try to eliminate the effects of uncertainties by attempting to bring the future to the present. The fundamentals of this statement is deeply rooted in risk and risk management. In behavioural sciences, economics as a discipline has always provided a well-established foundation for understanding uncertainties and what this means for decision making. Finance and economics have done this through different models which attempt to predict the future. On its part, risk management attempts to hedge or mitigate these uncertainties in order for “the planner” to reach the favourable outcome. This book focuses on how AI is to redefine certain important economic and financial theories that are specifically used for the purpose of eliminating uncertainties so as to allow agents to make informed decisions. In effect, certain aspects of finance and economic theories cannot be understood in their entirety without the incorporation of AI.Table of ContentsIntroduction to Artificial Intelligence in Economics and Finance Theories.- The Growth Model.- Comparative Advantage.- The Dual-Sector Model.- Dynamic Inconsistency Theory.- The Philipps Curve.- The Laffer Curve.- Adverse Selection.- Moral Hazard.- Creative Destruction.- The Agency Theory.- The Legitimacy Theory and the Legitimacy Gap.- Synopsis: Artificial Intelligence in Finance and Economics Theories.- Index

    1 in stock

    £116.99

  • Statistical Analysis of Network Data with R

    Springer Nature Switzerland AG Statistical Analysis of Network Data with R

    1 in stock

    Book SynopsisThe new edition of this book provides an easily accessible introduction to the statistical analysis of network data using R. It has been fully revised and can be used as a stand-alone resource in which multiple R packages are used to illustrate how to conduct a wide range of network analyses, from basic manipulation and visualization, to summary and characterization, to modeling of network data. The central package is igraph, which provides extensive capabilities for studying network graphs in R. The new edition of this book includes an overhaul to recent changes in igraph. The material in this book is organized to flow from descriptive statistical methods to topics centered on modeling and inference with networks, with the latter separated into two sub-areas, corresponding first to the modeling and inference of networks themselves, and then, to processes on networks. The book begins by covering tools for the manipulation of network data. Next, it addresses visualization and characterization of networks. The book then examines mathematical and statistical network modeling. This is followed by a special case of network modeling wherein the network topology must be inferred. Network processes, both static and dynamic are addressed in the subsequent chapters. The book concludes by featuring chapters on network flows, dynamic networks, and networked experiments. Statistical Analysis of Network Data with R, 2nd Ed. has been written at a level aimed at graduate students and researchers in quantitative disciplines engaged in the statistical analysis of network data, although advanced undergraduates already comfortable with R should find the book fairly accessible as well.Table of Contents1 Introduction.- 2 Manipulating Network Data.- 3 Visualizing Network Data.- 4 Descriptive Analysis of Network Graph Characteristics.- 5 Mathematical Models for Network Graphs.- 6 Statistical Models for Network Graphs.- 7 Network Topology Inference.- 8 Modeling and Prediction for Processes on Network Graphs.- 9 Analysis of Network Flow Data.- 10 Networked Experiments.- 11 Dynamic Networks.- Index.

    1 in stock

    £56.99

  • Blockchain and Distributed Ledger Technology Use

    Springer Nature Switzerland AG Blockchain and Distributed Ledger Technology Use

    15 in stock

    Book SynopsisBlockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community of computer scientists and cryptologists, to mainstream phenomena that are now considered powerful game changers for many industries. This book explores and assesses real-world use cases and case studies on blockchain and related technologies. The studies describe the respective applications and address how these technologies have been deployed, the rationale behind their application, and finally, their outcomes. The book shares a wealth of experiences and lessons learned regarding financial markets, energy, SCM, healthcare, law and compliance. Given its scope, it is chiefly intended for academics and practitioners who want to learn more about blockchain applications.Table of ContentsToward More Rigorous Blockchain Research: Recommendations for Writing Blockchain Case Studies.- From a Use Case Categorization Scheme Towards A Maturity Model for Engineering Distributed Ledgers.- What’s In The Box? Combating Counterfeit Medications in Pharmaceutical Supply Chains With Blockchain Vigilant Information Systems.- A Use Case of Blockchain in Healthcare: Allergy Card.- International Exchange Of Financial Information on Distributed Ledgers: Outlook and Design Blueprint.- A Blockchain Supported Solution for Compliant Digital Security Offerings.- A Blockchain-Driven Approach to Fulfill the GDPR Recording Requirements.- Wibson: A Case Study of a Decentralized, Privacy-Preserving Data Marketplace.- : Business Process Transformation in Natural Resources Development Using Blockchain: Indigenous Entrepreneurship, Trustless Technology, and Rebuilding Trust.- Smart City Applications on the Blockchain: Development of a Multi-Layer Taxonomy.- A Case Study of Blockchain-Induced Digital Transformation in the Public Sector.- Analyzing the Potential of DLT-Based Applications in Smart Factories.- Disrupting Platform Organizations with Blockchain Technology and the Internet of Things?.- Using Blockchain for Online Multimedia Management: Characteristics of Existing Platforms.- Supply Chain Visibility Ledger.

    15 in stock

    £151.99

  • Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405

    Springer Nature Switzerland AG Reversible Computation: Extending Horizons of Computing: Selected Results of the COST Action IC1405

    1 in stock

    Book SynopsisThis open access State-of-the-Art Survey presents the main recent scientific outcomes in the area of reversible computation, focusing on those that have emerged during COST Action IC1405 "Reversible Computation - Extending Horizons of Computing", a European research network that operated from May 2015 to April 2019.Reversible computation is a new paradigm that extends the traditional forwards-only mode of computation with the ability to execute in reverse, so that computation can run backwards as easily and naturally as forwards. It aims to deliver novel computing devices and software, and to enhance existing systems by equipping them with reversibility. There are many potential applications of reversible computation, including languages and software tools for reliable and recovery-oriented distributed systems and revolutionary reversible logic gates and circuits, but they can only be realized and have lasting effect if conceptual and firm theoretical foundations are established first. Table of ContentsFoundations of Reversible Computation.- Software and Reversible Systems: A Survey of Recent Activities.- Simulation and Design of Quantum Circuits.- Research on Reversible Functions Having Component Functions with Specified Properties - An Overview.- A Case Study for Reversible Computing: Reversible Debugging.- Towards Choreographic-Based Monitoring.- Reversibility in Chemical Reactions.- Reversible Control of Robots.- Reversible Languages and Incremental State Saving in Optimistic Parallel Discrete Event Simulation.- Reversible Computation in Wireless Communications.- Error Reconciliation in Quantum Key Distribution Protocols.

    1 in stock

    £31.49

  • Web Engineering: 20th International Conference, ICWE 2020, Helsinki, Finland, June 9–12, 2020, Proceedings

    Springer Nature Switzerland AG Web Engineering: 20th International Conference, ICWE 2020, Helsinki, Finland, June 9–12, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Web Engineering, ICWE 2020, which was planned to take place in Helsinki, Finland, during June 9-12, 2020. Due to the corona pandemic the conference changed to a virtual format. The total of 24 full and 10 short contributions presented in this volume were carefully reviewed and selected from 78 submissions. The book also contains 4 PhD and 7 demo papers. The papers were organized in topical sections named: User interface technologies; performance of Web technologies; machine learning; testing of Web applications; emotion detection; location-aware applications; sentiment analysis; open data; liquid Web applications; Web-based learning; PhD symposium; demos and posters.Table of ContentsUser Interface Technologies.- Detecting Responsive Design Bugs with Declarative Speci cations.- Layout as a Service (LaaS): A Service Platform for Self-Optimizing Web Layouts.- Structural Pro ling of Web Sites in the Wild.- Performance of Web Technologies.- Accelerating Web Start-up with Resource Preloading.- An Analysis of Throughput and Latency Behaviours under Microservice Decomposition.- W-ADE: Timing Performance Prediction in Web of Things.- Comparing a polling and push-based approach for live Open Data interfaces.- NuMessage: Providing Scalable and Reliable Messaging Service in Distributed Systems.- Machine Learning.- A Credit Scoring Model for SMEs Based on Social Media Data.- Who's Behind That Website? Classifying Websites by the Degree of Commercial Intent.- I Don't Have That Much Data! Reusing User Behavior Models for Websites from Different Domains.- Improving Detection Accuracy For Malicious JavaScript Using GAN.- VISH: Does Your Smart Home Dialogue System Also Need Training Data.- Neighborhood Aggregation Embedding Model for Link Prediction in Knowledge Graphs.- Testing of Web Applications.- Automatic Model Completion for Web Applications.- Almost Rerere: an approach for automating con ict resolution from similar resolved conflicts.- Generation of Realistic Navigation Paths for Web Site Testing using Recurrent Neural Networks and Generative Adversarial Neural Networks.- Emotion Detection.- Scalable Real-time Emotion Detection for Personalized Onboarding Guides.- Creating and Capturing Arti cial Emotions in Autonomous Robots and Software Agents.- On Emotions in Con ict Wikipedia Talk Pages Discussions.- Location-aware Applications.- Geospatial partitioning of open transit data.- Efficient Live Public Transport Data Sharing for Route Planning on the Web.- Web-Based Development and Visualization Dashboards for Smart City Applications.- Sentiment Analysis.- Detecting Rumor on Microblogging Platforms via a Heterogeneous Stance Attention Mechanism.- A Hybrid Approach for Aspect-Based Sentiment Analysis Using Deep Contextual Word Embeddings and Hierarchical Attention.- Just the Right Mood for HIT! Analyzing the Role of Worker Moods in Conversational Microtask Crowdsourcing.- Open Data.- SolidRDP: Applying Solid Data Containers for Research Data Publishing.- Applying Natural Language Processing Techniques to Generate Open Data Web APIs Documentation.- Liquid Web Applications.- WebDelta: Lightweight Migration of Web Applications with Modified Execution State.- User-side service synchronization in multiple devices environment.- An approach to build P2P Web Extensions.- Web-based Learning.- Blended or Distance Learning? Comparing Student Performance between University and Open University.- Teaching Web Stream Processing: Lessons Learned.- Teaching Container-based DevOps Practices.- PhD Symposium.- Predicting the outbreak of con ict in online discussions using emotion-based features.- An APIfication Approach to Facilitate the Access and Reuse of Open Data.- A Personal Health Trajectory API: addressing problems in health institution-oriented systems.- Context-Aware Encoding & Delivery in the Web.- Demos and posters.- An OpenAPI-based Testing Framework to Monitor Non-Functional Properties of REST APIs.- OpenAPI Bot: A Chatbot to Help You Understand REST APIs.- A different Web Analytics Perspective through Copy to Clipboard Heatmaps.- A Web Augmentation Framework for Accessibility based on Voice Interaction.- Annotated knowledge graphs for teaching in Higher Education: Supporting mentors and mentees by digital systems.- A Universal Application Programming Interface to access and reuse Linked Open Data.- OntoSemStats: an ontology to express the use of semantics in RDF-based knowledge graphs.

    1 in stock

    £62.99

  • Blended Learning. Education in a Smart Learning Environment: 13th International Conference, ICBL 2020, Bangkok, Thailand, August 24–27, 2020, Proceedings

    Springer Nature Switzerland AG Blended Learning. Education in a Smart Learning Environment: 13th International Conference, ICBL 2020, Bangkok, Thailand, August 24–27, 2020, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 13th International Conference on Blended Learning, ICBL 2020, held in Bangkok, in August 2020.The 33 papers presented were carefully reviewed and selected from 70 submissions. The conference theme of ICBL 2020 is Blended Learning : Education in a Smart Learning Environment. The papers are organized in topical sections named: Blended Learning, Hybrid Learning, Online Learning, Enriched and Smart Learning, Learning Management System and Content and Instructional Design. Table of Contents

    1 in stock

    £62.99

  • IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning: Second International Workshop, IoT Streams 2020, and First International Workshop, ITEM 2020, Co-located with ECML/PKDD 2020, Ghent,

    Springer Nature Switzerland AG IoT Streams for Data-Driven Predictive Maintenance and IoT, Edge, and Mobile for Embedded Machine Learning: Second International Workshop, IoT Streams 2020, and First International Workshop, ITEM 2020, Co-located with ECML/PKDD 2020, Ghent,

    1 in stock

    Book SynopsisThis book constitutes selected papers from the Second International Workshop on IoT Streams for Data-Driven Predictive Maintenance, IoT Streams 2020, and First International Workshop on IoT, Edge, and Mobile for Embedded Machine Learning, ITEM 2020, co-located with ECML/PKDD 2020 and held in September 2020. Due to the COVID-19 pandemic the workshops were held online. The 21 full papers and 3 short papers presented in this volume were thoroughly reviewed and selected from 35 submissions and are organized according to the workshops and their topics: IoT Streams 2020: Stream Learning; Feature Learning; ITEM 2020: Unsupervised Machine Learning; Hardware; Methods; Quantization.Table of ContentsStream Learning.- Feature Learning.- Unsupervised Machine Learning.- Hardware.- Methods.- Quantization.

    1 in stock

    £67.49

  • Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18,  2020, Revised Selected Papers

    Springer Nature Switzerland AG Cyber-Physical Security for Critical Infrastructures Protection: First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis.The book contains 6 chapters which are available open access under a CC-BY license. Table of ContentsSecurity Threat Intelligence.- Privacy-Preserving CCTV Analytics for Cyber-Physical Threat Intelligence.- TLSAssistant goes FINSEC: A Security Platform Integration Extending Threat Intelligence Language.- Cyber Threat Monitoring Systems - Comparing attack detection performance of ensemble algorithms.- FINSTIX: a Cyber-Physical Data Model for Financial Critical Infrastructures.- Data Anomaly Detection: Predict & Prevent.- Inferring anomaly situation from multiple data sources in CyberPhysical Systems.- Fusing RGB and Thermal Imagery with Channel State Information for Abnormal Activity Detection using Multimodal Bidirectional LSTM.- A Cloud-Based Anomaly Detection for IoT Big Data.- Computer Vision & Dataset for Security.- An advanced Framework for Critical Infrastructure Protection using computer vision technologies.- A Comprehensive Dataset from a Smart Grid Testbed for Machine Learning based CPS Security Research.- Security Management & Governance.- Cross-Domain Security Asset Management for Healthcare.- Towards a global CIs' cyber-physical security management and joint coordination approach.- Toward a Context-Aware Methodology for Information Security Governance Assessment Validation.- Impact Propagation & Power Traffic Analysis.- Impact Propagation in Airport Systems.- A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks.

    1 in stock

    £31.49

  • Simulation Gaming Through Times and Disciplines: 50th International Simulation and Gaming Association Conference, ISAGA 2019, Warsaw, Poland, August 26–30, 2019, Revised Selected Papers

    Springer Nature Switzerland AG Simulation Gaming Through Times and Disciplines: 50th International Simulation and Gaming Association Conference, ISAGA 2019, Warsaw, Poland, August 26–30, 2019, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes revised selected papers from the 50th International Simulation and Gaming Association Conference, ISAGA 2019, which took place in Warsaw, Poland, during August 26–30, 2019.The 38 papers presented in this volume were carefully reviewed and selected from 72 submissions. They were organized in topical sections named: simulation gaming in the science space; simulation gaming design and implementation; simulation games for current challenges; simulation games and gamification; and board perspective on simulation gaming.Table of ContentsSimulation gaming in the science space.- A Journey to the Role of Facilitator: Personal stories unfolding alongside world trends.- Differences between Facilitator-guided and Self-guided Debriefing on the Attitudes of University Students.- Evaluation of a pilot game to change civil servants’ willingness towards open data policy making.- Structuring game design with active learning benefits: insights from logistical skills training in managing an emergency department.- Playing (in) a Crisis Simulation: What is the playful engagement in a serious simulation made of.- Through a Mirror Darkly – On the Obscurity of Teaching Goals in Game-Based Learning in IT Security.- The Tacit Knowledge in Games: From Validation to Debriefing.- Educational Escape Room – Challenges and Obstacles.-Simulation gaming design and implementation.- Simulated Construction of State`s Intersubjective Reality in Virtual Games: An Emerging Tool of Social Power.- A Review of Game-Based Research for English Language Learning in S&G Interdiscipline Journal.- Accuracy in Business Simulations.- Group-based learning and group composition on the provision of public goods: Incorporating agent-based simulation and gaming.- Can the Veil of Ignorance Create Consensus? A Qualitative Analysis Using the Siting for a Contaminated Waste Landfill Game.- The Development of the 3D Role-Playing Game on PC with an Assistive System for Deuteranopia.- The Trust Game: The influence of Trust on: Collaboration in the light of Technological Innovations.- The funnel of game design - Proposing a new way to address a problem definition using the IDEAS approach.- Little Things Mean a Lot in Simulations.- Impact of Competition in Energy Market on Promotion of Renewables: an Agent-Based Model Approach.- The perception of business wargaming practices among strategic and competitive intelligence professionals.- Managing Competing Values in Sustainable Urban Tourism: a Simulation-Gaming Approach.- Simulation games as a framework to conduct scientific experiments – the example of prospect theory research.- Study on occurrence mechanism of quality scandal in enterprises by ”Sontaku”, ”air” and ”water” theory using business game.- Interpersonal Competitiveness in a Cohesive Team: Insights from a Business Simulation Game.- Simulation games for current challenges.- Review of Haptic and Computerized (Simulation) Games on Climate Change.- Food-web modeling in the Maritime Spatial Planning Challenge Simulation Platform: Results from the Baltic Sea Region.- Unpacking, Overconfidence, and Game Design.- Authentic Learning in Entrepreneurship Education.- Learning from a Business Simulation Game: A Factor-Analytic Study.- Gamification and gaming cultures.- Resolving Migrant Issues in Thailand Using the Framework of ‘Simulation Game – Project PAL’.- Gamification Design Strategies - summary of research project.- Fostering Adaptive Organizations: Some Practical Lessons From Space Pirates.- Comparison of Experience of Using Business Games in University of Lodz and Kaunas University of Technology.- Board perspective on simulation gaming.- Video game monetization mechanisms in triple A (AAA) video games.- Learning with Location-Based Gaming.- Methodological challenges of creating a next-generation machine learning-based game engine for generating maps and vehicle behavior.- Agent-based Simulation for Sustainable Management of Supply Chain and Natural Resources: Basic Model.- Wonders of the World Simulation Program by Virtual Reality.- Framework and application of live video streaming as a virtual reality gaming technology: a study of function and performance.

    1 in stock

    £67.49

  • Data-Driven Mining, Learning and Analytics for

    Springer Nature Switzerland AG Data-Driven Mining, Learning and Analytics for

    15 in stock

    Book SynopsisThis book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.Table of Contents1. Smart City Ecosystem – An Introduction.- 2. Datafication for secured smart cities.- 3. Secured big data infrastructure services.- 4. Intelligent infrastructure of secured smart cities.- 5. Cyber-physical systems for secured smart cities.- 6. Blockchain for smart cities.- 7. Context-aware security and privacy of smart cities.- 7. Privacy and social Issues in smart cities.- 8. Sensor and RFID applications of smart cities.- 9. Advanced data mining for secured smart cities.- 10. Big data for secured smart cities.- 11. Data analytics tools and technologies for smart cities.- 12. Machine learning and AI for secured smart cities.

    15 in stock

    £85.49

  • Graph Structures for Knowledge Representation and Reasoning: 6th International Workshop, GKR 2020, Virtual Event, September 5, 2020, Revised Selected Papers

    Springer Nature Switzerland AG Graph Structures for Knowledge Representation and Reasoning: 6th International Workshop, GKR 2020, Virtual Event, September 5, 2020, Revised Selected Papers

    1 in stock

    Book SynopsisThis open access book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Graph Structures for Knowledge Representation and Reasoning, GKR 2020, held virtually in September 2020, associated with ECAI 2020, the 24th European Conference on Artificial Intelligence.The 7 revised full papers presented together with 2 invited contributions were reviewed and selected from 9 submissions. The contributions address various issues for knowledge representation and reasoning and the common graph-theoretic background, which allows to bridge the gap between the different communities.Table of ContentsExtended Workshop Papers.- Active Semantic Relations in Layered Enterprise Architecture Development.- A Belief Update System Using an Event Model for Location of People in a Smart Home.- A Natural Language Generation Technique for Automated Psychotherapy.- Creative Composition Problem: A Knowledge Graph Logical-based AI Construction and Optimization Solution.- Set Visualisations with Euler and Hasse Diagrams.- Usage Patterns Identification Using Graphs and Machine Learning.- Collaborative Design and Manufacture: Information Structures for Team Formation and Coordination.- Invited Additional Contributions.- Approximate Knowledge Graph Query Answering: From Ranking to Binary Classification.- Galois Connections for Patterns: An Algebra of Labelled Graphs.

    1 in stock

    £31.49

  • Practical Channel-Aware Resource Allocation: With

    Springer Nature Switzerland AG Practical Channel-Aware Resource Allocation: With

    1 in stock

    Book SynopsisThis book dives into radio resource allocation optimizations, a research area for wireless communications, in a pragmatic way and not only includes wireless channel conditions but also incorporates the channel in a simple and practical fashion via well-understood equations. Most importantly, the book presents a practical perspective by modeling channel conditions using terrain-aware propagation which narrows the gap between purely theoretical work and that of industry methods. The provided propagation modeling reflects industry grade scenarios for radio environment map and hence makes the channel based resource allocation presented in the book a field-grade view. Also, the book provides large scale simulations that account for realistic locations with terrain conditions that can produce realistic scenarios applicable in the field. Most portions of the book are accompanied with MATLAB code and occasionally MATLAB/Python/C code. The book is intended for graduate students, academics, researchers of resource allocation in mathematics, computer science, and electrical engineering departments as well as working professionals/engineers in wireless industry.Table of ContentsIntroduction.- Utility Functions and Resource Allocation.- Resource Allocation without Channel.- Distributed or Centralized.- Channel Conditions and Resource Allocation.- Propagation Modeling .- Simulation.- Conclusion.

    1 in stock

    £71.24

  • Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings

    Springer Nature Switzerland AG Applied Cryptography in Computer and Communications: First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.

    1 in stock

    £58.49

  • A Holistic Solution for Smart Grids based on LINK– Paradigm: Architecture, Energy Systems Integration, Volt/var Chain Process

    Springer Nature Switzerland AG A Holistic Solution for Smart Grids based on LINK– Paradigm: Architecture, Energy Systems Integration, Volt/var Chain Process

    1 in stock

    Book SynopsisThis book presents a holistic solution for Smart Grids that includes the electricity: producers, electricity storages, grids, market and customer plants. The authors have derived the architectural paradigm for Smart Grids LINK from the signature of their fractal structure. The presented LINK-based holistic architecture enables the large-scale integration of distributed energy resources by minimising the data to be exchanged, thus considering privacy and cyber security by design. The straightforwardness of LINK-Solution is related to its standardised structures, enabling the coupling of energy and non-energy sectors and Energy Communities. The Volt/var chain control as one of the most challenging operation processes of Smart Grids is covered in detail in this edition. Chapter by chapter, the reader is smoothly introduced to this unique solution, facilitating its practical implementation. This book is a valuable resource for experts, consultants, engineers, scientists, and students in the Smart Grids area and actors of the electricity market and politicians.Table of ContentsIntroduction.- Holistic architecture.- Energy Systems Integration.- Volt/var chain process.

    1 in stock

    £60.95

  • Emerging Technologies and the Digital Transformation of Museums and Heritage Sites: First International Conference, RISE IMET 2021, Nicosia, Cyprus, June 2–4, 2021, Proceedings

    Springer Nature Switzerland AG Emerging Technologies and the Digital Transformation of Museums and Heritage Sites: First International Conference, RISE IMET 2021, Nicosia, Cyprus, June 2–4, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the post-conference proceedings of the First International Conference on Emerging Technologies and the Digital Transformation of Museums and Heritage Sites, RISE IMET 2020, held in Nicosia, Cyprus, in June 2021*.The 23 revised full papers were carefully reviewed and selected from 38 submissions. The papers are organized in the following topical sections: digital curation and visitor engagement in museums and heritage sites; VR, AR, MR, mobile applications and gamification in museums and heritage sites; digital storytelling and embodied characters for the interpretation of cultural heritage; emerging technologies, difficult heritage and affective practices; participatory approaches, crowdsourcing and new technologies; digitization, documentation and digital representation of cultural heritage.* The conference was held virtually due to the COVID-19 pandemic.Table of ContentsDigital curation and visitor engagement in museums and heritage sites.- VR, AR, MR, mobile applications and gamification in museums and heritage sites.- Digital storytelling and embodied characters for the interpretation of cultural heritage.- Emerging technologies, difficult heritage and affective practices.- Participatory approaches, crowdsourcing and new technologies.- Digitization, documentation and digital representation of cultural heritage.

    1 in stock

    £62.99

  • Optimal Localization of Internet of Things Nodes

    Springer Nature Switzerland AG Optimal Localization of Internet of Things Nodes

    1 in stock

    Book SynopsisThis book is a practical resource for designing Internet of Things (IoT) networks and implementing IoT applications from the localization perspective. With the emergence of IoT, machine to machine communication, Industrial IoT, and other societal applications, many applications require knowledge of the exact location of mobile IoT nodes in real-time. As the IoT nodes have computational and energy limitations, it is a crucial research challenge to optimize the network's performance with the highest localization accuracy. Many researchers are working towards such localization problems. However, there is no single book available for the detailed study on IoT node localization. This book provides one-stop multidisciplinary solutions for IoT node localization, design requirements, challenges, constraints, available techniques, comparison, related applications, and future directions. Special features included are theory supported by algorithmic development, treatment of optimization techniques, and applications.Table of ContentsChapter 1. Localization Techniques for IoT.- Chapter 2. Quantum based Metaheuristics for Localization in IoT.- Chapter 3. Optimal Node Deployment in Smart Parking.- Chapter 4. Assistance and Localization of Elderly persons.- Chapter 5. Social Distancing and Emergency Management in Smart Cities.- Chapter 6. Optimal Configuration in Heterogeneous Industrial IoT.

    1 in stock

    £49.49

  • High-Speed Networks: A Tutorial

    Springer Nature Switzerland AG High-Speed Networks: A Tutorial

    1 in stock

    Book SynopsisThis book provides practical knowledge and skills on high-speed networks, emphasizing on Science Demilitarized Zones (Science DMZs). The Science DMZ is a high-speed network designed to facilitate the transfer of big science data which is presented in this book. These networks are increasingly important, as large data sets are now often transferred across sites. This book starts by describing the limitations of general-purpose networks which are designed for transferring basic data but face numerous challenges when transferring terabyte- and petabyte-scale data. This book follows a bottom-up approach by presenting an overview of Science DMZs and how they overcome the limitations of general-purpose networks. It also covers topics that have considerable impact on the performance of large data transfers at all layers: link layer (layer-2) and network layer (layer-3) topics such as maximum transmission unit (MTU), switch architectures, and router’s buffer size; transport layer (layer-4) topics including TCP features, congestion control algorithms for high-throughput high-latency networks, flow control, and pacing; applications (layer-5) used for large data transfers and for maintenance and operation of Science DMZs; and security considerations. Most chapters incorporate virtual laboratory experiments, which are conducted using network appliances running real protocol stacks. Students in computer science, information technology and similar programs, who are interested in learning fundamental concepts related to high-speed networks and corresponding implementations will find this book useful as a textbook. This book assumes minimal familiarity with networking, typically covered in an introductory networking course. It is appropriate for an upper-level undergraduate course and for a first-year graduate course. Industry professionals working in this field will also want to purchase this book.Table of ContentsIntroduction to high-speed networks and science DMZ.- Network cyberinfrastructure aspects for big data transfers.- Data link and network layer considerations for large data transfers.- Impact of TCP on high-speed networks and advances in congestion control algorithms.- Application and security aspects for large flows.- Security aspects.- Challenges and open research issues.

    1 in stock

    £62.99

  • Internet Access in Vehicular Networks

    Springer Nature Switzerland AG Internet Access in Vehicular Networks

    1 in stock

    Book SynopsisThis book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme.This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book. Table of ContentsOverview of Internet Access of Vehicular Networks.- Internet Access Modeling of Vehicular Internet Access.- V2X Interworking via Vehicular Internet Access.- Intelligent Link Management for Vehicular Internet Access.- Intelligent Networking enabled Vehicular Distributed Learning.- Conclusion and Future Works.

    1 in stock

    £98.99

  • Towards Autonomous Robotic Systems: 22nd Annual Conference, TAROS 2021, Lincoln, UK, September 8–10, 2021, Proceedings

    Springer Nature Switzerland AG Towards Autonomous Robotic Systems: 22nd Annual Conference, TAROS 2021, Lincoln, UK, September 8–10, 2021, Proceedings

    1 in stock

    Book SynopsisThe volume LNAI 13054 constitutes the refereed proceedings of the 22th Annual Conference Towards Autonomous Robotic Systems, TAROS 2021, held in Lincoln, UK, in September 2021.*The 45 full papers were carefully reviewed and selected from 66 submissions. Organized in the topical sections "Algorithms" and "Systems", they discuss significant findings and advances in the following areas: artificial intelligence; mechatronics; image processing and computer vision; special purpose and application-based systems; user interfaces and human computer interaction.* The conference was held virtually due to the COVID-19 pandemic.Table of Contents​Algorithms.- A Study on Dense and Sparse (Visual) Rewards in Robot Policy Learning.- An Open-Source Multi-Goal Reinforcement Learning Environment for Robotic Manipulation with Pybullet.- CPG-Actor: Reinforcement Learning for Central Pattern Generators .- Deep semantic segmentation of 3D plant point clouds.- Grasp Stability Prediction for a Dexterous Robotic Hand combining RGB-D Vision and Haptic Bayesian Exploration.- Improving SLAM in Pipe Networks by Leveraging Cylindrical Regularity.- CRH*: A Deadlock Free Framework for Scalable Prioritised Path Planning in Multi-Robot Systems.- TASK-BASED AD-HOC TEAMWORK with ADVERSARY.- Human-Robot Cooperative Lifting using IMUs and Human Gestures.- Reinforcement Learning-based Mapless Navigation with Fail-safe Localisation.- Collaborative Coverage for a Network of Vacuum Cleaner Robots.- Network-Aware Genetic Algorithms for the Coordination of MALE UAV Networks.- Self-organised Flocking of Robotic Swarm in Cluttered Environments.- Exploring Feedback Modalities in a Mobile Robot for Telecare.- Demonstrating the Differential Impact of Flock Heterogeneity on Multi-Agent Herding.- Evaluation of an OpenCV Implementation of Structure from Motion on Open Source Data.- Benchmark of visual and 3D lidar SLAM systems in simulation environment for vineyards.- Lidar-only localization in 3D Pose-Feature Map.- Toward robust visual odometry using prior 2D map information.- Comparison of Concentrated and Distributed Compliant Elements in a 3D Printed Gripper.- Perception of a humanoid robot as an interface for auditory testing.- Deep Learning Traversability Estimator for Mobile Robots in Unstructured Environments.- Systems.- Predicting Artist Drawing Activity via Multi-Camera Inputs for Co-Creative Drawing.- 3D printed mechanically modular two-degree-of-freedom robotic segment utilizing variable-stiffness actuators.- Design of a Multimaterial 3D-printed Soft Actuator with Bi-directional Variable Stiffness.- Designing a Multi-Locomotion Modular Snake Robot.- Deep robot path planning from demonstrations for breast cancer examination.- Priors inspired by Speed-Accuracy Trade-Offs for Incremental Learning of Probabilistic Movement Primitives.- Tactile Dynamic Behaviour Prediction Based on Robot Action.- State space analysis of variable-stiffness tendon drive with non-back-drivable worm-gear motor actuation.- Development of a ROS Driver and Support Stack for the KMR iiwa Mobile Manipulator.- Collision Avoidance with Optimal Path Replanning for Mobile Robots.- An Autonomous Mapping Approach for Confined Spaces using Flying Robots.- Maximising availability of transportation robots through intelligent allocation of parking spaces.- A Minimalist Solution to the Multi-Robot Barrier Coverage Problem.- Scheduling Multi-robot Missions with JointTasks and Heterogeneous Robot Teams.- Area Coverage in Two-Dimensional Grid Worlds Using Computation-Free Agents.- Online Scene Visibility Estimation as a Complement to SLAM in UAVs.- Statics Optimization of a Hexapedal Robot Modelled as a Stewart Platform.- EtherCAT implementation of a variable-stiffness tendon drive with non-back-drivable worm-gear motor actuation.- Growing Robotic Endoscope for early Breast Cancer Detection: Robot Motion Control.- Design and Charachterisation of a Variable-Stiffness Soft Actuator Based on Tendon Twisting.- WhiskEye: A biomimetic model of multisensoryspatial memory based on sensory reconstruction.- Equipment Detection based Inspection Robot for Industrial Plants.- Inference of Mechanical Properties of Dynamic Objects through Active Perception.

    1 in stock

    £62.99

  • Fundamentals of Software Engineering: 9th International Conference, FSEN 2021, Virtual Event, May 19–21, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Fundamentals of Software Engineering: 9th International Conference, FSEN 2021, Virtual Event, May 19–21, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Fundamentals of Software Engineering, FSEN 2021, held virtually and hosted by IPM in May 2021.The 12 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. The topics of interest in FSEN span over all aspects of formal methods, especially those related to advancing the application of formal methods in the software industry and promoting their integration with practical engineering techniques. The papers are organized in topical sections on coordination, logic, networks, parallel computation, and testing.Table of ContentsCoordination.- Protocol Scheduling.- Automated Replication of Tuple Spaces via Static Analysis.- Incremental Refinement of Goal Models with Contracts.- Logic.- Proof Calculi for Epistemic Logics with Structured Knowledge.- Introducing Intervalar differential dynamic logic.- A Program Logic for Fresh Name Generation.- Event-Driven Temporal Logic Pattern for Control Software Requirements Specification.- Extending OCL with map and function types.- Networks.- Deadlock in packet switching networks.- Runtime Monitoring Processes Across Blockchains.- Solving Systems of Bilinear Equations for Transition Rate Reconstruction.- Parallel Computation.- Term Rewriting on GPUs.- Promise Plus: Flexible Synchronization for Parallel Computations on Arrays.- Testing.- Towards Test Case Generation for Industrial Software Systems Based on Functional Specifications.- Compressing Automatically Generated Unit Test Suites through Test Parameterization.- Systematic Extraction of Test Cases from Object-oriented Programs.

    1 in stock

    £53.99

  • Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings

    Springer Nature Switzerland AG Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th EAI International Conference, QShine 2021, Virtual Event, November 29–30, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2021, held in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.Table of ContentsMachine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A Usability Study of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.

    1 in stock

    £62.99

  • ICWE 2021 Workshops: ICWE 2021 International Workshops, BECS and Invited Papers, Biarritz, France, May 18–21, 2021, Revised Selected Papers

    Springer Nature Switzerland AG ICWE 2021 Workshops: ICWE 2021 International Workshops, BECS and Invited Papers, Biarritz, France, May 18–21, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the thoroughly refereed post-workshop proceedings of the 21th International Conference on Web Engineering, ICWE 2021, held in Biarritz, France, in May 2021.*The first international workshop on Big data-driven Edge Cloud Services (BECS 2021) was held to provide a venue in which scholars and practitioners can share their experiences and present on-going work on providing value-added Web services for users by utilizing big data in edge cloud environments. The 5 revised full papers and 1 revised short contribution selected from 11 submissions are presented with 2 invited papers.*The conference was held virtually due to the COVID-19 pandemic.Table of ContentsBECS 2021.- Putting Data Science Pipelines on the Edge.- DNN Model Deployment on Distributed Edges.- Towards Proactive Context-Aware IoT Environments by means of Federated Learning.- Real-time Deep Learning-based Anomaly Detection Approach for Multivariate Data Streams with Apache Flink.- A Novel Approach to Dynamic Pricing for Cloud Computing Through Price Band Prediction.- Learning-based Activation of Energy Harvesting Sensors for Fresh Data Acquisition.- Invited Papers.- Exploiting Triangle Patterns for Heterogeneous Graph Attention Network.- Towards Seamless IoT Device-Edge-Cloud Continuum: Software Architecture Options of IoT Devices Revisited.

    1 in stock

    £49.49

  • Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings

    Springer Nature Switzerland AG Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16–20, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 17th International Conference on Information Systems Security, ICISS 2021, held in Patna, India, during December 16-20, 2021. The 9 regular papers, 2 short papers and 4 work-in-progress papers included in this volume were carefully reviewed and selected from a total of 48 submissions. The papers were organized in topical sections named: attack detection, malware identification, data security in distributed systems, and applied cryptography.

    1 in stock

    £49.49

  • Broadband Communications, Networks, and Systems: 12th EAI International Conference, BROADNETS 2021, Virtual Event, October 28–29, 2021, Proceedings

    Springer Nature Switzerland AG Broadband Communications, Networks, and Systems: 12th EAI International Conference, BROADNETS 2021, Virtual Event, October 28–29, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 12th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2021, which took place in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 24 full papers presented were carefully reviewed and selected from 49 submissions. The papers are thematically grouped as a session on broadband communications, networks, and systems; 5G-enabled smart building: technology and challenge; and 5G: The advances in industry.Table of ContentsBroadband communications, Networks, and Systems: Theory and Applications.- A Machine Learning-based Elastic Strategy for Operator Parallelism in a Big Data Stream Computing System.- End-to-End Dynamic Pipelining Tuning Strategy for Small Files Transfer.- Containers’ Privacy and Data Protection via Runtime Scanning Methods.- Digital Twin For Cybersecurity: Towards Enhancing Cyber Resilience.- Differential Privacy-based Permissioned Blockchain for Private Data Sharing in Industrial IoT.- Efficient Privacy-Preserving User Matching with Intel SGX.- Developing an Online Examination Timetabling System Using Artificial Bee Colony Algorithm in Higher Education.- A Topology-Aware Scheduling Strategy for Distributed Stream Computing System.- Data Stream Prediction Strategy for Elastic Stream Computing Systems.- Blockchain Enabled Integrity Protection for Bodycam Video.- Road Rage Recognition System Based on Face Detection Emotion.- A Drip Irrigation Remote Control System using 5G-IoT Technology.- Multipath QUIC - Directions of the Improvements.- One New Adaptive Elliptical Weighting Model Combining with the Tikhonov-ffp-norm for image reconstruction.- Calculation and Numerical Simulation of Building Integrated Photovoltaic System Based on Connected Autonomous Vehicle Platoon Control through Multi-Agent Deep Reinforcement Learning.- 5G-enabled Smart Building: Technology and Challenge.- Accurate Estimation on the State-of-Charge of Lithium-ion Battery Packs.- Fire Simulation and Optimial Evaluation Based on BIM Technology.- Discrete Sliding Mode Control of PMSM with Network Transmission.- Smart Medical and Nursing Platform Based on 5G Technology.- Time-domain predictable trajectory planning for autonomous driving based on Internet of Vehicles.- 5G: The Advances in Industry.- Rate-compatible shortened polar codes based on RM code-aided.- Research on wheat impurity image recognition based on convolutional neural network.- Based on Energy Router Energy Management Control Strategy in micro-grid.

    1 in stock

    £62.99

  • Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Smart Card Research and Advanced Applications: 20th International Conference, CARDIS 2021, Lübeck, Germany, November 11–12, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the 20th International Conference on Smart Card Research and Advanced Applications, CARDIS 2021, which took place in November 2021. The conference took place in Lübeck, Germany, and changed to a hybrid format due to the COVID-19 pandemic.The 16 full papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named Side-Channel Attacks, Fault Attacks, Public Key and Secure Implementations. Table of ContentsSide-Channel Attacks.- Fault Attacks.- Public Key.- Secure Implementations.

    1 in stock

    £49.49

  • Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

    Springer Nature Switzerland AG Ad Hoc Networks and Tools for IT: 13th EAI International Conference, ADHOCNETS 2021, Virtual Event, December 6–7, 2021, and 16th EAI International Conference, TRIDENTCOM 2021, Virtual Event, November 24, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021. Both conferences were held virtually due to COVID 19 pandemic. The 15 full papers of ADHOCNETS 2021 were selected from 29 submissions and cover a variety of network paradigms including ad hoc networks (MANETs), wireless sensor networks (WSNs), vehicular ad hoc networks (Vanets), airborne networks, underwater networks, underground networks, personal area networks, and home networks, etc. It promises a wide range of applications in civilian, commercial, and military areas. The 18 full papers were selected from 47 submissions and deal the emerging technologies such as Industry 4.0, blockchain, deep learning, cloud/edge/fog computing, cyber physical systems, cybersecurity and computer communications.Table of ContentsNetwork Routing.- Analysis of Routing Attacks in FANET.- Context-Aware Routing and Forwarding Model for NDN-based VANET.- A Novel Adaptive Hello Mechanism based Geographic Routing Protocol for FANETs.- Network Security 4 Evaluation of Denial of Service Attacks in Software Defined-Cognitive Radio Networks.- The Evaluation of the Two Detection Algorithms for Distributed Denial of Service Attack.- Investigating the effectiveness of Spectrum Sensing Data Falsification Attacks Defense Mechanisms in Cognitive Radio Ad hoc Networks.- Active attack that exploits biometric similarity difference and basic countermeasures.- Network Protocols.- LEACH-S enhancement to ensure WSN stability.- M-ODD: A Standard Protocol for Reporting MANET Related Models, Simulations, and Findings.- Frame Design for Adaptability in Long-range Underwater Communication.- Adaptive Data Rate Based Congestion Control in Vehicular Ad Hoc Networks (VANET).- Network Applications.- Analyzing Aggregate User Behavior on a Large Multi-platform Content Distribution Service.- An AI-based Transmission Power-control Certificate Omission in Vehicular Ad-Hoc Networks.- Dynamic Ephemeral and Session Key Generation Protocol for Next Generation Smart Grids.- A Blockchain-Based Data-Sharing Scheme for Inter[1]Vehicular Safety Applications.- A Trust-based and Secure Real-Time Traffic Information Sharing Scheme.- TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach.- P-sharding: Streamline emergency medical transactions via priority sharding.- BiDKT: Deep Knowledge Tracing with BERT.- Vision - An innovative management system based on private DLT.- Value-aware Collaborative Data Pricing for Federated Learning in Vehicular Networks.- Dual Scheme Privacy-Preserving Approach for Location[1]Aware Application in Edge Computing.- Survey on Bridge Discovery in Tor.

    1 in stock

    £62.99

  • Advanced Optical and Wireless Communications

    Springer Nature Switzerland AG Advanced Optical and Wireless Communications

    1 in stock

    Book SynopsisThe new edition of this popular textbook keeps its structure, introducing the advanced topics of: (i) wireless communications, (ii) free-space optical (FSO) communications, (iii) indoor optical wireless (IR) communications, and (iv) fiber-optics communications, but thoroughly updates the content for new technologies and practical applications. The author presents fundamental concepts, such as propagation principles, modulation formats, channel coding, diversity principles, MIMO signal processing, multicarrier modulation, equalization, adaptive modulation and coding, detection principles, and software defined transmission, first describing them and then following up with a detailed look at each particular system. The book is self-contained and structured to provide straightforward guidance to readers looking to capture fundamentals and gain theoretical and practical knowledge about wireless communications, free-space optical communications, and fiber-optics communications, all which can be readily applied in studies, research, and practical applications. The textbook is intended for an upper undergraduate or graduate level courses in fiber-optics communication, wireless communication, and free-space optical communication problems, an appendix with all background material needed, and homework problems. In the second edition, in addition to the existing chapters being updated and problems being inserted, one new chapter has been added, related to the physical-layer security thus covering both security and reliability issues. New material on 5G and 6G technologies has been added in corresponding chapters.Table of ContentsIntroduction.- Propagation Effects in Optical and Wireless Communications Channels, Noise Sources, and Channel Impairments.- Components, Modules, and Subsystems.- Wireless and Optical Channels Capacities.- Advanced Modulation and Multiplexing Techniques.- Advanced Detection Techniques and Compensation of Channel Impairments.- OFDM for Wireless and Optical Communications.- Diversity and MIMO Techniques.- Advanced Coding and Coded Modulation Techniques.- Spread Spectrum, CDMA, and Ultra-Wideband Communications.- 5G/6G Technologies.- Physical-layer Security.- Conclusion.

    1 in stock

    £56.99

  • Cloud Computing: 11th EAI International Conference, CloudComp 2021, Virtual Event, December 9–10, 2021, Proceedings

    Springer Nature Switzerland AG Cloud Computing: 11th EAI International Conference, CloudComp 2021, Virtual Event, December 9–10, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Cloud Computing, CloudComp 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 17 full papers were carefully reviewed and selected from 40 submissions and detail cloud computing technologies for efficient and intelligent computing in secure and smart environments with distributed devices. The theme of CloudComp 2021 was “Cloud Computing for Secure and Smart Applications”. The book is organized in three general areas of data analytics for cloud systems with distributed applications, cloud architecture and challenges in real-world use, and security in cloud/edge platforms.Table of ContentsData Analytics for Cloud Systems with Distributed Applications 1 Load quality analysis and forecasting for power data set on cloud platform.- A Survey of Traffic Prediction Based on Deep Neural Network: Data, Methods and Challenges.- A dynamic gesture recognition control file method based on deep learning.- A Lightweight FCNN-Driven Approach to Concrete Composition Extraction in a Distributed Environment.- Triangle Coordinate Diagram Localization for Academic Literature Based on Line Segment Detection.- Optimizing Fund Allocation for Game-based Verifiable Computation Outsourcing.- A Survey of Face Image Inpainting Based on Deep Learning.- Cloud Architecture and Challenges in Real-World Use.- Layered Service Model Architecture for Cloud Computin.- KPG4Rec: Knowledge Property-aware Graph for Recommender Systems.- 10 ERP as Software-as-a-Service: Factors depicting large enterprises cloud adoption.- Design Of An Evaluation System Of Limb Motor Function Using Inertial Sensor.- Towards a GPU-accelerated Open Source VDI for OpenStack Manuel.- Security in Cloud/Edge Platforms.- Trustworthy IoT Computing Environment Based on Layered Blockchain Consensus Framework.- Heuristic Network Security Risk Assessment Based on Attack Graph.- Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System.- Energy- and Reliability-aware Computation Offloading with Security Constraints.- A Review of Cross-Blockchain Solutions.

    1 in stock

    £58.49

  • Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers

    Springer Nature Switzerland AG Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers

    1 in stock

    Book SynopsisThis book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.* The 23 full papers presented in this volume were carefully reviewed and selected from 60 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions. *The conference was originally planned to take place at the University of Victoria, BC, Canada. Due to the COVID-19 pandemic, it was held virtually.

    1 in stock

    £62.99

  • Fundamentals of Object Databases

    Springer International Publishing AG Fundamentals of Object Databases

    1 in stock

    Book SynopsisObject-oriented databases were originally developed as an alternative to relational database technology for the representation, storage, and access of non-traditional data forms that were increasingly found in advanced applications of database technology. After much debate regarding object-oriented versus relational database technology, object-oriented extensions were eventually incorporated into relational technology to create object-relational databases. Both object-oriented databases and object-relational databases, collectively known as object databases, provide inherent support for object features, such as object identity, classes, inheritance hierarchies, and associations between classes using object references. This monograph presents the fundamentals of object databases, with a specific focus on conceptual modeling of object database designs. After an introduction to the fundamental concepts of object-oriented data, the monograph provides a review of object-oriented conceptual modeling techniques using side-by-side Enhanced Entity Relationship diagrams and Unified Modeling Language conceptual class diagrams that feature class hierarchies with specialization constraints and object associations. These object-oriented conceptual models provide the basis for introducing case studies that illustrate the use of object features within the design of object-oriented and object-relational databases. For the object-oriented database perspective, the Object Data Management Group data definition language provides a portable, language-independent specification of an object schema, together with an SQL-like object query language. LINQ (Language INtegrated Query) is presented as a case study of an object query language together with its use in the db4o open-source object-oriented database. For the object-relational perspective, the object-relational features of the SQL standard are presented together with an accompanying case study of the object-relational features of Oracle. For completeness of coverage, an appendix provides a mapping of object-oriented conceptual designs to the relational model and its associated constraints. Table of Contents: List of Figures / List of Tables / Introduction to Object Databases / Object-Oriented Databases / Object-Relational DatabasesTable of ContentsList of Figures.- List of Tables.- Introduction to Object Databases.- Object-Oriented Databases.- Object-Relational Databases.

    1 in stock

    £26.59

  • Perspectives on Business Intelligence

    Springer International Publishing AG Perspectives on Business Intelligence

    1 in stock

    Book SynopsisIn the 1980s, traditional Business Intelligence (BI) systems focused on the delivery of reports that describe the state of business activities in the past, such as for questions like "How did our sales perform during the last quarter?" A decade later, there was a shift to more interactive content that presented how the business was performing at the present time, answering questions like "How are we doing right now?" Today the focus of BI users are looking into the future. "Given what I did before and how I am currently doing this quarter, how will I do next quarter?" Furthermore, fuelled by the demands of Big Data, BI systems are going through a time of incredible change. Predictive analytics, high volume data, unstructured data, social data, mobile, consumable analytics, and data visualization are all examples of demands and capabilities that have become critical within just the past few years, and are growing at an unprecedented pace. This book introduces research problems and solutions on various aspects central to next-generation BI systems. It begins with a chapter on an industry perspective on how BI has evolved, and discusses how game-changing trends have drastically reshaped the landscape of BI. One of the game changers is the shift toward the consumerization of BI tools. As a result, for BI tools to be successfully used by business users (rather than IT departments), the tools need a business model, rather than a data model. One chapter of the book surveys four different types of business modeling. However, even with the existence of a business model for users to express queries, the data that can meet the needs are still captured within a data model. The next chapter on vivification addresses the problem of closing the gap, which is often significant, between the business and the data models. Moreover, Big Data forces BI systems to integrate and consolidate multiple, and often wildly different, data sources. One chapter gives an overview of several integration architectures for dealing with the challenges that need to be overcome. While the book so far focuses on the usual structured relational data, the remaining chapters turn to unstructured data, an ever-increasing and important component of Big Data. One chapter on information extraction describes methods for dealing with the extraction of relations from free text and the web. Finally, BI users need tools to visualize and interpret new and complex types of information in a way that is compelling, intuitive, but accurate. The last chapter gives an overview of information visualization for decision support and text.Table of ContentsIntroduction and the Changing Landscape of Business Intelligence.- BI Game Changers: an Industry Viewpoint.- Business Modeling for BI.- Vivification in BI.- Information Integration in BI.- Information Extraction for BI.- Information Visualization for BI.

    1 in stock

    £26.59

  • Data Processing on FPGAs

    Springer International Publishing AG Data Processing on FPGAs

    1 in stock

    Book SynopsisRoughly a decade ago, power consumption and heat dissipation concerns forced the semiconductor industry to radically change its course, shifting from sequential to parallel computing. Unfortunately, improving performance of applications has now become much more difficult than in the good old days of frequency scaling. This is also affecting databases and data processing applications in general, and has led to the popularity of so-called data appliances—specialized data processing engines, where software and hardware are sold together in a closed box. Field-programmable gate arrays (FPGAs) increasingly play an important role in such systems. FPGAs are attractive because the performance gains of specialized hardware can be significant, while power consumption is much less than that of commodity processors. On the other hand, FPGAs are way more flexible than hard-wired circuits (ASICs) and can be integrated into complex systems in many different ways, e.g., directly in the network for a high-frequency trading application. This book gives an introduction to FPGA technology targeted at a database audience. In the first few chapters, we explain in detail the inner workings of FPGAs. Then we discuss techniques and design patterns that help mapping algorithms to FPGA hardware so that the inherent parallelism of these devices can be leveraged in an optimal way. Finally, the book will illustrate a number of concrete examples that exploit different advantages of FPGAs for data processing. Table of Contents: Preface / Introduction / A Primer in Hardware Design / FPGAs / FPGA Programming Models / Data Stream Processing / Accelerated DB Operators / Secure Data Processing / Conclusions / Bibliography / Authors' Biographies / IndexTable of ContentsPreface.- Introduction.- A Primer in Hardware Design.- FPGAs.- FPGA Programming Models.- Data Stream Processing.- Accelerated DB Operators.- Secure Data Processing.- Conclusions.- Bibliography.- Authors' Biographies.- Index.

    1 in stock

    £26.59

  • Information and Influence Propagation in Social Networks

    Springer International Publishing AG Information and Influence Propagation in Social Networks

    1 in stock

    Book SynopsisResearch on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization. This book starts with a detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others. We delve deep into the key problem of influence maximization, which selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in classic diffusion models including both the independent cascade and the linear threshold models is computationally intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn this research into practice, such as learning the strength with which individuals in a network influence each other, as well as the practical aspects of this research including the availability of datasets and software tools for facilitating research. We conclude with a discussion of various research problems that remain open, both from a technical perspective and from the viewpoint of transferring the results of research into industry strength applications.Table of ContentsAcknowledgments.- Introduction.- Stochastic Diffusion Models.- Influence Maximization.- Extensions to Diffusion Modeling and Influence Maximization.- Learning Propagation Models.- Data and Software for Information/Influence: Propagation Research.- Conclusion and Challenges.- Bibliography.- Authors' Biographies.- Index.

    1 in stock

    £26.99

  • Similarity Joins in Relational Database Systems

    Springer International Publishing AG Similarity Joins in Relational Database Systems

    1 in stock

    Book SynopsisState-of-the-art database systems manage and process a variety of complex objects, including strings and trees. For such objects equality comparisons are often not meaningful and must be replaced by similarity comparisons. This book describes the concepts and techniques to incorporate similarity into database systems. We start out by discussing the properties of strings and trees, and identify the edit distance as the de facto standard for comparing complex objects. Since the edit distance is computationally expensive, token-based distances have been introduced to speed up edit distance computations. The basic idea is to decompose complex objects into sets of tokens that can be compared efficiently. Token-based distances are used to compute an approximation of the edit distance and prune expensive edit distance calculations. A key observation when computing similarity joins is that many of the object pairs, for which the similarity is computed, are very different from each other. Filters exploit this property to improve the performance of similarity joins. A filter preprocesses the input data sets and produces a set of candidate pairs. The distance function is evaluated on the candidate pairs only. We describe the essential query processing techniques for filters based on lower and upper bounds. For token equality joins we describe prefix, size, positional and partitioning filters, which can be used to avoid the computation of small intersections that are not needed since the similarity would be too low.Table of ContentsPreface.- Acknowledgments.- Introduction.- Data Types.- Edit-Based Distances.- Token-Based Distances.- Query Processing Techniques.- Filters for Token Equality Joins.- Conclusion.- Bibliography.- Authors' Biographies.- Index.

    1 in stock

    £26.59

  • Veracity of Data

    Springer International Publishing AG Veracity of Data

    1 in stock

    Book SynopsisOn the Web, a massive amount of user-generated content is available through various channels (e.g., texts, tweets, Web tables, databases, multimedia-sharing platforms, etc.). Conflicting information, rumors, erroneous and fake content can be easily spread across multiple sources, making it hard to distinguish between what is true and what is not. This book gives an overview of fundamental issues and recent contributions for ascertaining the veracity of data in the era of Big Data. The text is organized into six chapters, focusing on structured data extracted from texts. Chapter 1 introduces the problem of ascertaining the veracity of data in a multi-source and evolving context. Issues related to information extraction are presented in Chapter 2. Current truth discovery computation algorithms are presented in details in Chapter 3. It is followed by practical techniques for evaluating data source reputation and authoritativeness in Chapter 4. The theoretical foundations and various approaches for modeling diffusion phenomenon of misinformation spreading in networked systems are studied in Chapter 5. Finally, truth discovery computation from extracted data in a dynamic context of misinformation propagation raises interesting challenges that are explored in Chapter 6. This text is intended for a seminar course at the graduate level. It is also to serve as a useful resource for researchers and practitioners who are interested in the study of fact-checking, truth discovery, or rumor spreading.Table of ContentsIntroduction to Data Veracity.- Information Extraction.- Truth Discovery Computation.- Trust Computation.- Misinformation Dynamics.- Transdisciplinary Challenges of Truth Discovery.- Bibliography.- Authors' Biographies.

    1 in stock

    £31.49

  • Instant Recovery with Write-Ahead Logging

    Springer International Publishing AG Instant Recovery with Write-Ahead Logging

    1 in stock

    Book SynopsisTraditional theory and practice of write-ahead logging and of database recovery focus on three failure classes: transaction failures (typically due to deadlocks) resolved by transaction rollback; system failures (typically power or software faults) resolved by restart with log analysis, "redo," and "undo" phases; and media failures (typically hardware faults) resolved by restore operations that combine multiple types of backups and log replay. The recent addition of single-page failures and single-page recovery has opened new opportunities far beyond the original aim of immediate, lossless repair of single-page wear-out in novel or traditional storage hardware. In the contexts of system and media failures, efficient single-page recovery enables on-demand incremental "redo" and "undo" as part of system restart or media restore operations. This can give the illusion of practically instantaneous restart and restore: instant restart permits processing new queries and updates seconds after system reboot and instant restore permits resuming queries and updates on empty replacement media as if those were already fully recovered. In the context of node and network failures, instant restart and instant restore combine to enable practically instant failover from a failing database node to one holding merely an out-of-date backup and a log archive, yet without loss of data, updates, or transactional integrity. In addition to these instant recovery techniques, the discussion introduces self-repairing indexes and much faster offline restore operations, which impose no slowdown in backup operations and hardly any slowdown in log archiving operations. The new restore techniques also render differential and incremental backups obsolete, complete backup commands on a database server practically instantly, and even permit taking full up-to-date backups without imposing any load on the database server. Compared to the first version of this book, this second edition adds sections on applications of single-page repair, instant restart, single-pass restore, and instant restore. Moreover, it adds sections on instant failover among nodes in a cluster, applications of instant failover, recovery for file systems and data files, and the performance of instant restart and instant restore.Table of ContentsPreface.- Acknowledgments.- Introduction.- Related Prior Work.- Single-Page Recovery.- Applications of Single-Page Recovery.- Instant Restart after a System Failure.- Applications of Instant Restart.- Single-Pass Restore.- Applications of Single-Pass Restore.- Instant Restore after a Media Failure.- Applications of Instant Restore.- Multiple Pate, System and Media Failures.- Instant Failover.- Applications of Instant Failover.- File Systems and Data Files.- Performance and Scalability.- Conclusions.- References.- Author Biographies .

    1 in stock

    £26.99

  • Databases on Modern Hardware

    Springer International Publishing AG Databases on Modern Hardware

    1 in stock

    Book SynopsisData management systems enable various influential applications from high-performance online services (e.g., social networks like Twitter and Facebook or financial markets) to big data analytics (e.g., scientific exploration, sensor networks, business intelligence). As a result, data management systems have been one of the main drivers for innovations in the database and computer architecture communities for several decades. Recent hardware trends require software to take advantage of the abundant parallelism existing in modern and future hardware. The traditional design of the data management systems, however, faces inherent scalability problems due to its tightly coupled components. In addition, it cannot exploit the full capability of the aggressive micro-architectural features of modern processors. As a result, today's most commonly used server types remain largely underutilized leading to a huge waste of hardware resources and energy. In this book, we shed light on the challenges present while running DBMS on modern multicore hardware. We divide the material into two dimensions of scalability: implicit/vertical and explicit/horizontal. The first part of the book focuses on the vertical dimension: it describes the instruction- and data-level parallelism opportunities in a core coming from the hardware and software side. In addition, it examines the sources of under-utilization in a modern processor and presents insights and hardware/software techniques to better exploit the microarchitectural resources of a processor by improving cache locality at the right level of the memory hierarchy. The second part focuses on the horizontal dimension, i.e., scalability bottlenecks of database applications at the level of multicore and multisocket multicore architectures. It first presents a systematic way of eliminating such bottlenecks in online transaction processing workloads, which is based on minimizing unbounded communication, and shows several techniques that minimize bottlenecks in major components of database management systems. Then, it demonstrates the data and work sharing opportunities for analytical workloads, and reviews advanced scheduling mechanisms that are aware of nonuniform memory accesses and alleviate bandwidth saturation.Table of ContentsIntroduction.- Exploiting Resources of a Processor Core.- Minimizing Memory Stalls.- Scaling-up OLTP.- Scaling-up OLAP Workloads.- Outlook.- Summary.- Bibliography.- Authors' Biographies.

    1 in stock

    £26.59

  • Answering Queries Using Views, Second Edition

    Springer International Publishing AG Answering Queries Using Views, Second Edition

    1 in stock

    Book SynopsisThe topic of using views to answer queries has been popular for a few decades now, as it cuts across domains such as query optimization, information integration, data warehousing, website design and, recently, database-as-a-service and data placement in cloud systems. This book assembles foundational work on answering queries using views in a self-contained manner, with an effort to choose material that constitutes the backbone of the research. It presents efficient algorithms and covers the following problems: query containment; rewriting queries using views in various logical languages; equivalent rewritings and maximally contained rewritings; and computing certain answers in the data-integration and data-exchange settings. Query languages that are considered are fragments of SQL, in particular select-project-join queries, also called conjunctive queries (with or without arithmetic comparisons or negation), and aggregate SQL queries. This second edition includes two new chapters that refer to tree-like data and respective query languages. Chapter 8 presents the data model for XML documents and the XPath query language, and Chapter 9 provides a theoretical presentation of tree-like data model and query language where the tuples of a relation share a tree-structured schema for that relation and the query language is a dialect of SQL with evaluation techniques appropriately modified to fit the richer schema.Table of ContentsPreface to the First Edition.- Preface to the Second Edition.- Acknowledgments.- Queries and Views.- Query Containment and Equivalence.- Finding Equivalent Rewritings.- Maximally Contained Rewritings (MCRs).- Answering Queries in Presence of Dependencies.- Answering Queries in Data Exchange.- Answering Queries Using Views.- XPath Queries and Views.- Tree-Structured Records Queried with SQL Dialect.- Bibliographical Notes for Chapters 1--7.- Conclusion for Chapters 1--7.- Bibliography.- Authors' Biographies.

    1 in stock

    £62.99

  • Fault-Tolerant Distributed Transactions on Blockchain

    Springer International Publishing AG Fault-Tolerant Distributed Transactions on Blockchain

    1 in stock

    Book SynopsisSince the introduction of Bitcoin—the first widespread application driven by blockchain—the interest of the public and private sectors in blockchain has skyrocketed. In recent years, blockchain-based fabrics have been used to address challenges in diverse fields such as trade, food production, property rights, identity-management, aid delivery, health care, and fraud prevention. This widespread interest follows from fundamental concepts on which blockchains are built that together embed the notion of trust, upon which blockchains are built. 1. Blockchains provide data transparancy. Data in a blockchain is stored in the form of a ledger, which contains an ordered history of all the transactions. This facilitates oversight and auditing. 2. Blockchains ensure data integrity by using strong cryptographic primitives. This guarantees that transactions accepted by the blockchain are authenticated by its issuer, are immutable, and cannot be repudiated by the issuer. This ensures accountability. 3. Blockchains are decentralized, democratic, and resilient. They use consensus-based replication to decentralize the ledger among many independent participants. Thus, it can operate completely decentralized and does not require trust in a single authority. Additions to the chain are performed by consensus, in which all participants have a democratic voice in maintaining the integrity of the blockchain. Due to the usage of replication and consensus, blockchains are also highly resilient to malicious attacks even when a significant portion of the participants are malicious. It further increases the opportunity for fairness and equity through democratization. These fundamental concepts and the technologies behind them—a generic ledger-based data model, cryptographically ensured data integrity, and consensus-based replication—prove to be a powerful and inspiring combination, a catalyst to promote computational trust. In this book, we present an in-depth study of blockchain, unraveling its revolutionary promise to instill computational trust in society, all carefully tailored to a broad audience including students, researchers, and practitioners. We offer a comprehensive overview of theoretical limitations and practical usability of consensus protocols while examining the diverse landscape of how blockchains are manifested in their permissioned and permissionless forms.Table of ContentsPreface.- Introduction.- Practical Byzantine Fault-Tolerant Consensus.- Beyond the Design of PBFT.- Toward Scalable Blockchains.- Permissioned Blockchains.- Permissionless Blockchains.- Bibliography.- Authors' Biographies.

    1 in stock

    £49.49

  • Probabilistic Databases

    Springer International Publishing AG Probabilistic Databases

    1 in stock

    Book SynopsisProbabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of uncertain data, which are best modeled and processed by a probabilistic database. This book presents the state of the art in representation formalisms and query processing techniques for probabilistic data. It starts by discussing the basic principles for representing large probabilistic databases, by decomposing them into tuple-independent tables, block-independent-disjoint tables, or U-databases. Then it discusses two classes of techniques for query evaluation on probabilistic databases. In extensional query evaluation, the entire probabilistic inference can be pushed into the database engine and, therefore, processed as effectively as the evaluation of standard SQL queries. The relational queries that can be evaluated this way are called safe queries. In intensional query evaluation, the probabilistic inference is performed over a propositional formula called lineage expression: every relational query can be evaluated this way, but the data complexity dramatically depends on the query being evaluated, and can be #P-hard. The book also discusses some advanced topics in probabilistic data management such as top-k query processing, sequential probabilistic databases, indexing and materialized views, and Monte Carlo databases. Table of Contents: Overview / Data and Query Model / The Query Evaluation Problem / Extensional Query Evaluation / Intensional Query Evaluation / Advanced TechniquesTable of ContentsOverview.- Data and Query Model.- The Query Evaluation Problem.- Extensional Query Evaluation.- Intensional Query Evaluation.- Advanced Techniques.

    1 in stock

    £26.99

  • Methods for Mining and Summarizing Text Conversations

    Springer International Publishing AG Methods for Mining and Summarizing Text Conversations

    1 in stock

    Book SynopsisDue to the Internet Revolution, human conversational data -- in written forms -- are accumulating at a phenomenal rate. At the same time, improvements in speech technology enable many spoken conversations to be transcribed. Individuals and organizations engage in email exchanges, face-to-face meetings, blogging, texting and other social media activities. The advances in natural language processing provide ample opportunities for these "informal documents" to be analyzed and mined, thus creating numerous new and valuable applications. This book presents a set of computational methods to extract information from conversational data, and to provide natural language summaries of the data. The book begins with an overview of basic concepts, such as the differences between extractive and abstractive summaries, and metrics for evaluating the effectiveness of summarization and various extraction tasks. It also describes some of the benchmark corpora used in the literature. The book introduces extraction and mining methods for performing subjectivity and sentiment detection, topic segmentation and modeling, and the extraction of conversational structure. It also describes frameworks for conducting dialogue act recognition, decision and action item detection, and extraction of thread structure. There is a specific focus on performing all these tasks on conversational data, such as meeting transcripts (which exemplify synchronous conversations) and emails (which exemplify asynchronous conversations). Very recent approaches to deal with blogs, discussion forums and microblogs (e.g., Twitter) are also discussed. The second half of this book focuses on natural language summarization of conversational data. It gives an overview of several extractive and abstractive summarizers developed for emails, meetings, blogs and forums. It also describes attempts for building multi-modal summarizers. Last but not least, the book concludes with thoughts on topics for further development. Table of Contents: Introduction / Background: Corpora and Evaluation Methods / Mining Text Conversations / Summarizing Text Conversations / Conclusions / Final ThoughtsTable of ContentsIntroduction.- Background: Corpora and Evaluation Methods.- Mining Text Conversations.- Summarizing Text Conversations.- Conclusions.- Final Thoughts.

    1 in stock

    £26.59

  • Fundamentals of Physical Design and Query Compilation

    Springer International Publishing AG Fundamentals of Physical Design and Query Compilation

    1 in stock

    Book SynopsisQuery compilation is the problem of translating user requests formulated over purely conceptual and domain specific ways of understanding data, commonly called logical designs, to efficient executable programs called query plans. Such plans access various concrete data sources through their low-level often iterator-based interfaces. An appreciation of the concrete data sources, their interfaces and how such capabilities relate to logical design is commonly called a physical design. This book is an introduction to the fundamental methods underlying database technology that solves the problem of query compilation. The methods are presented in terms of first-order logic which serves as the vehicle for specifying physical design, expressing user requests and query plans, and understanding how query plans implement user requests. Table of Contents: Introduction / Logical Design and User Queries / Basic Physical Design and Query Plans / On Practical Physical Design / Query Compilation and Plan Synthesis / Updating DataTable of ContentsIntroduction.- Logical Design and User Queries.- Basic Physical Design and Query Plans.- On Practical Physical Design.- Query Compilation and Plan Synthesis.- Updating Data.

    1 in stock

    £26.59

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account