Network hardware Books
Springer International Publishing AG Managing Event Information
Book SynopsisWith the proliferation of citizen reporting, smart mobile devices, and social media, an increasing number of people are beginning to generate information about events they observe and participate in. A significant fraction of this information contains multimedia data to share the experience with their audience. A systematic information modeling and management framework is necessary to capture this widely heterogeneous, schemaless, potentially humongous information produced by many different people. This book is an attempt to examine the modeling, storage, querying, and applications of such an event management system in a holistic manner. It uses a semantic-web style graph-based view of events, and shows how this event model, together with its query facility, can be used toward emerging applications like semi-automated storytelling. Table of Contents: Introduction / Event Data Models / Implementing an Event Data Model / Querying Events / Storytelling with Events / An Emerging Application / ConclusionTable of ContentsIntroduction.- Event Data Models.- Implementing an Event Data Model.- Querying Events.- Storytelling with Events.- An Emerging Application.- Conclusion.
£25.19
Springer International Publishing AG Database Repairing and Consistent Query Answering
Book SynopsisIntegrity constraints are semantic conditions that a database should satisfy in order to be an appropriate model of external reality. In practice, and for many reasons, a database may not satisfy those integrity constraints, and for that reason it is said to be inconsistent. However, and most likely, a large portion of the database is still semantically correct, in a sense that has to be made precise. After having provided a formal characterization of consistent data in an inconsistent database, the natural problem emerges of extracting that semantically correct data, as query answers. The consistent data in an inconsistent database is usually characterized as the data that persists across all the database instances that are consistent and minimally differ from the inconsistent instance. Those are the so-called repairs of the database. In particular, the consistent answers to a query posed to the inconsistent database are those answers that can be simultaneously obtained from all the database repairs. As expected, the notion of repair requires an adequate notion of distance that allows for the comparison of databases with respect to how much they differ from the inconsistent instance. On this basis, the minimality condition on repairs can be properly formulated. In this monograph we present and discuss these fundamental concepts, different repair semantics, algorithms for computing consistent answers to queries, and also complexity-theoretic results related to the computation of repairs and doing consistent query answering. Table of Contents: Introduction / The Notions of Repair and Consistent Answer / Tractable CQA and Query Rewriting / Logically Specifying Repairs / Decision Problems in CQA: Complexity and Algorithms / Repairs and Data CleaningTable of ContentsIntroduction.- The Notions of Repair and Consistent Answer.- Tractable CQA and Query Rewriting.- Logically Specifying Repairs.- Decision Problems in CQA: Complexity and Algorithms.- Repairs and Data Cleaning.
£25.19
Springer International Publishing AG Spatial Data Management
Book SynopsisSpatial database management deals with the storage, indexing, and querying of data with spatial features, such as location and geometric extent. Many applications require the efficient management of spatial data, including Geographic Information Systems, Computer Aided Design, and Location Based Services. The goal of this book is to provide the reader with an overview of spatial data management technology, with an emphasis on indexing and search techniques. It first introduces spatial data models and queries and discusses the main issues of extending a database system to support spatial data. It presents indexing approaches for spatial data, with a focus on the R-tree. Query evaluation and optimization techniques for the most popular spatial query types (selections, nearest neighbor search, and spatial joins) are portrayed for data in Euclidean spaces and spatial networks. The book concludes by demonstrating the ample application of spatial data management technology on a wide range of related application domains: management of spatio-temporal data and high-dimensional feature vectors, multi-criteria ranking, data mining and OLAP, privacy-preserving data publishing, and spatial keyword search. Table of Contents: Introduction / Spatial Data / Indexing / Spatial Query Evaluation / Spatial Networks / Applications of Spatial Data Management TechnologyTable of ContentsIntroduction.- Spatial Data.- Indexing.- Spatial Query Evaluation.- Spatial Networks.- Applications of Spatial Data Management Technology.
£26.99
Springer International Publishing AG Declarative Networking
Book SynopsisDeclarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, declarative networking serves as an important step towards an extensible, evolvable network architecture that can support flexible, secure and efficient deployment of new network protocols. This book provides an introduction to basic issues in declarative networking, including language design, optimization and dataflow execution. The methodology behind declarative programming of networks is presented, including roots in Datalog, extensions for networked environments, and the semantics of long-running queries over network state. The book focuses on a representative declarative networking language called Network Datalog (NDlog), which is based on extensions to the Datalog recursive query language. An overview of declarative network protocols written in NDlog is provided, and its usage is illustrated using examples from routing protocols and overlay networks. This book also describes the implementation of a declarative networking engine and NDlog execution strategies that provide eventual consistency semantics with significant flexibility in execution. Two representative declarative networking systems (P2 and its successor RapidNet) are presented. Finally, the book highlights recent advances in declarative networking, and new declarative approaches to related problems. Table of Contents: Introduction / Declarative Networking Language / Declarative Networking Overview / Distributed Recursive Query Processing / Declarative Routing / Declarative Overlays / Optimization of NDlog / Recent Advances in Declarative Networking / ConclusionTable of ContentsIntroduction.- Declarative Networking Language.- Declarative Networking Overview.- Distributed Recursive Query Processing.- Declarative Routing.- Declarative Overlays.- Optimization of NDlog.- Recent Advances in Declarative Networking.- Conclusion.
£25.19
Springer International Publishing AG Query Answer Authentication
Book SynopsisIn data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / ConclusionTable of ContentsIntroduction.- Cryptography Foundation.- Relational Queries.- Spatial Queries.- Text Search Queries.- Data Streams.- Conclusion.
£25.19
Springer International Publishing AG P2P Techniques for Decentralized Applications
Book SynopsisAs an alternative to traditional client-server systems, Peer-to-Peer (P2P) systems provide major advantages in terms of scalability, autonomy and dynamic behavior of peers, and decentralization of control. Thus, they are well suited for large-scale data sharing in distributed environments. Most of the existing P2P approaches for data sharing rely on either structured networks (e.g., DHTs) for efficient indexing, or unstructured networks for ease of deployment, or some combination. However, these approaches have some limitations, such as lack of freedom for data placement in DHTs, and high latency and high network traffic in unstructured networks. To address these limitations, gossip protocols which are easy to deploy and scale well, can be exploited. In this book, we will give an overview of these different P2P techniques and architectures, discuss their trade-offs, and illustrate their use for decentralizing several large-scale data sharing applications. Table of Contents: P2P Overlays, Query Routing, and Gossiping / Content Distribution in P2P Systems / Recommendation Systems / Top-k Query Processing in P2P SystemsTable of ContentsP2P Overlays, Query Routing, and Gossiping.- Content Distribution in P2P Systems.- Recommendation Systems.- Top-k Query Processing in P2P Systems.
£25.19
Springer International Publishing AG Deep Web Query Interface Understanding and Integration
Book SynopsisThere are millions of searchable data sources on the Web and to a large extent their contents can only be reached through their own query interfaces. There is an enormous interest in making the data in these sources easily accessible. There are primarily two general approaches to achieve this objective. The first is to surface the contents of these sources from the deep Web and add the contents to the index of regular search engines. The second is to integrate the searching capabilities of these sources and support integrated access to them. In this book, we introduce the state-of-the-art techniques for extracting, understanding, and integrating the query interfaces of deep Web data sources. These techniques are critical for producing an integrated query interface for each domain. The interface serves as the mediator for searching all data sources in the concerned domain. While query interface integration is only relevant for the deep Web integration approach, the extraction and understanding of query interfaces are critical for both deep Web exploration approaches. This book aims to provide in-depth and comprehensive coverage of the key technologies needed to create high quality integrated query interfaces automatically. The following technical issues are discussed in detail in this book: query interface modeling, query interface extraction, query interface clustering, query interface matching, query interface attribute integration, and query interface integration. Table of Contents: Introduction / Query Interface Representation and Extraction / Query Interface Clustering and Categorization / Query Interface Matching / Query Interface Attribute Integration / Query Interface Integration / Summary and Future ResearchTable of ContentsIntroduction.- Query Interface Representation and Extraction.- Query Interface Clustering and Categorization.- Query Interface Matching.- Query Interface Attribute Integration.- Query Interface Integration.- Summary and Future Research.
£26.99
Springer International Publishing AG Business Processes
Book SynopsisWhile classic data management focuses on the data itself, research on Business Processes also considers the context in which this data is generated and manipulated, namely the processes, users, and goals that this data serves. This provides the analysts a better perspective of the organizational needs centered around the data. As such, this research is of fundamental importance. Much of the success of database systems in the last decade is due to the beauty and elegance of the relational model and its declarative query languages, combined with a rich spectrum of underlying evaluation and optimization techniques, and efficient implementations. Much like the case for traditional database research, elegant modeling and rich underlying technology are likely to be highly beneficiary for the Business Process owners and their users; both can benefit from easy formulation and analysis of the processes. While there have been many important advances in this research in recent years, there is still much to be desired: specifically, there have been many works that focus on the processes behavior (flow), and many that focus on its data, but only very few works have dealt with both the state-of-the-art in a database approach to Business Process modeling and analysis, the progress towards a holistic flow-and-data framework for these tasks, and highlight the current gaps and research directions. Table of Contents: Introduction / Modeling / Querying Business Processes / Other Issues / ConclusionTable of ContentsIntroduction.- Modeling.- Querying Business Processes.- Other Issues.- Conclusion.
£25.19
Springer International Publishing AG Foundations of Data Quality Management
Book SynopsisData quality is one of the most important problems in data management. A database system typically aims to support the creation, maintenance, and use of large amount of data, focusing on the quantity of data. However, real-life data are often dirty: inconsistent, duplicated, inaccurate, incomplete, or stale. Dirty data in a database routinely generate misleading or biased analytical results and decisions, and lead to loss of revenues, credibility and customers. With this comes the need for data quality management. In contrast to traditional data management tasks, data quality management enables the detection and correction of errors in the data, syntactic or semantic, in order to improve the quality of the data and hence, add value to business processes. While data quality has been a longstanding problem for decades, the prevalent use of the Web has increased the risks, on an unprecedented scale, of creating and propagating dirty data. This monograph gives an overview of fundamental issues underlying central aspects of data quality, namely, data consistency, data deduplication, data accuracy, data currency, and information completeness. We promote a uniform logical framework for dealing with these issues, based on data quality rules. The text is organized into seven chapters, focusing on relational data. Chapter One introduces data quality issues. A conditional dependency theory is developed in Chapter Two, for capturing data inconsistencies. It is followed by practical techniques in Chapter 2b for discovering conditional dependencies, and for detecting inconsistencies and repairing data based on conditional dependencies. Matching dependencies are introduced in Chapter Three, as matching rules for data deduplication. A theory of relative information completeness is studied in Chapter Four, revising the classical Closed World Assumption and the Open World Assumption, to characterize incomplete information in the real world. A data currency model is presented in Chapter Five, to identify the current values of entities in a database and to answer queries with the current values, in the absence of reliable timestamps. Finally, interactions between these data quality issues are explored in Chapter Six. Important theoretical results and practical algorithms are covered, but formal proofs are omitted. The bibliographical notes contain pointers to papers in which the results were presented and proven, as well as references to materials for further reading. This text is intended for a seminar course at the graduate level. It is also to serve as a useful resource for researchers and practitioners who are interested in the study of data quality. The fundamental research on data quality draws on several areas, including mathematical logic, computational complexity and database theory. It has raised as many questions as it has answered, and is a rich source of questions and vitality. Table of Contents: Data Quality: An Overview / Conditional Dependencies / Cleaning Data with Conditional Dependencies / Data Deduplication / Information Completeness / Data Currency / Interactions between Data Quality IssuesTable of ContentsData Quality: An Overview.- Conditional Dependencies.- Cleaning Data with Conditional Dependencies.- Data Deduplication.- Information Completeness.- Data Currency.- Interactions between Data Quality Issues.
£25.19
Springer International Publishing AG Incomplete Data and Data Dependencies in Relational Databases
Book SynopsisThe chase has long been used as a central tool to analyze dependencies and their effect on queries. It has been applied to different relevant problems in database theory such as query optimization, query containment and equivalence, dependency implication, and database schema design. Recent years have seen a renewed interest in the chase as an important tool in several database applications, such as data exchange and integration, query answering in incomplete data, and many others. It is well known that the chase algorithm might be non-terminating and thus, in order for it to find practical applicability, it is crucial to identify cases where its termination is guaranteed. Another important aspect to consider when dealing with the chase is that it can introduce null values into the database, thereby leading to incomplete data. Thus, in several scenarios where the chase is used the problem of dealing with data dependencies and incomplete data arises. This book discusses fundamental issues concerning data dependencies and incomplete data with a particular focus on the chase and its applications in different database areas. We report recent results about the crucial issue of identifying conditions that guarantee the chase termination. Different database applications where the chase is a central tool are discussed with particular attention devoted to query answering in the presence of data dependencies and database schema design. Table of Contents: Introduction / Relational Databases / Incomplete Databases / The Chase Algorithm / Chase Termination / Data Dependencies and Normal Forms / Universal Repairs / Chase and Database ApplicationsTable of ContentsIntroduction.- Relational Databases.- Incomplete Databases.- The Chase Algorithm.- Chase Termination.- Data Dependencies and Normal Forms.- Universal Repairs.- Chase and Database Applications.
£31.49
Springer International Publishing AG Semantics Empowered Web 3.0
Book SynopsisAfter the traditional document-centric Web 1.0 and user-generated content focused Web 2.0, Web 3.0 has become a repository of an ever growing variety of Web resources that include data and services associated with enterprises, social networks, sensors, cloud, as well as mobile and other devices that constitute the Internet of Things. These pose unprecedented challenges in terms of heterogeneity (variety), scale (volume), and continuous changes (velocity), as well as present corresponding opportunities if they can be exploited. Just as semantics has played a critical role in dealing with data heterogeneity in the past to provide interoperability and integration, it is playing an even more critical role in dealing with the challenges and helping users and applications exploit all forms of Web 3.0 data. This book presents a unified approach to harness and exploit all forms of contemporary Web resources using the core principles of ability to associate meaning with data through conceptual or domain models and semantic descriptions including annotations, and through advanced semantic techniques for search, integration, and analysis. It discusses the use of Semantic Web standards and techniques when appropriate, but also advocates the use of lighter weight, easier to use, and more scalable options when they are more suitable. The authors' extensive experience spanning research and prototypes to development of operational applications and commercial technologies and products guide the treatment of the material. Table of Contents: Role of Semantics and Metadata / Types and Models of Semantics / Annotation -- Adding Semantics to Data / Semantics for Enterprise Data / Semantics for Services / Semantics for Sensor Data / Semantics for Social Data / Semantics for Cloud Computing / Semantics for Advanced ApplicationsTable of ContentsRole of Semantics and Metadata.- Types and Models of Semantics.- Annotation -- Adding Semantics to Data.- Semantics for Enterprise Data.- Semantics for Services.- Semantics for Sensor Data.- Semantics for Social Data.- Semantics for Cloud Computing.- Semantics for Advanced Applications.
£25.19
Springer International Publishing AG Data Management in the Cloud
Book SynopsisCloud computing has emerged as a successful paradigm of service-oriented computing and has revolutionized the way computing infrastructure is used. This success has seen a proliferation in the number of applications that are being deployed in various cloud platforms. There has also been an increase in the scale of the data generated as well as consumed by such applications. Scalable database management systems form a critical part of the cloud infrastructure. The attempt to address the challenges posed by the management of big data has led to a plethora of systems. This book aims to clarify some of the important concepts in the design space of scalable data management in cloud computing infrastructures. Some of the questions that this book aims to answer are: the appropriate systems for a specific set of application requirements, the research challenges in data management for the cloud, and what is novel in the cloud for database researchers? We also aim to address one basic question: whether cloud computing poses new challenges in scalable data management or it is just a reincarnation of old problems? We provide a comprehensive background study of state-of-the-art systems for scalable data management and analysis. We also identify important aspects in the design of different systems and the applicability and scope of these systems. A thorough understanding of current solutions and a precise characterization of the design space are essential for clearing the "cloudy skies of data management" and ensuring the success of DBMSs in the cloud, thus emulating the success enjoyed by relational databases in traditional enterprise settings. Table of Contents: Introduction / Distributed Data Management / Cloud Data Management: Early Trends / Transactions on Co-located Data / Transactions on Distributed Data / Multi-tenant Database Systems / Concluding RemarksTable of ContentsIntroduction.- Distributed Data Management.- Cloud Data Management: Early Trends.- Transactions on Co-located Data.- Transactions on Distributed Data.- Multi-tenant Database Systems.- Concluding Remarks.
£25.19
Springer International Publishing AG The Answer Machine
Book SynopsisThe Answer Machine is a practical, non-technical guide to the technologies behind information seeking and analysis. It introduces search and content analytics to software buyers, knowledge managers, and searchers who want to understand and design effective online environments. The book describes how search evolved from an expert-only to an end user tool. It provides an overview of search engines, categorization and clustering, natural language processing, content analytics, and visualization technologies. Detailed profiles for Web search, eCommerce search, eDiscovery, and enterprise search contrast the types of users, uses, tasks, technologies, and interaction designs for each. These variables shape each application, although the underlying technologies are the same. Types of information tasks and the trade-offs between precision and recall, time, volume and precision, and privacy vs. personalization are discussed within this context. The book examines trends toward convenient, context-aware computing, big data and analytics technologies, conversational systems, and answer machines. The Answer Machine explores IBM Watson's DeepQA technology and describes how it is used to answer health care and Jeopardy questions. The book concludes by discussing the implications of these advances: how they will change the way we run our businesses, practice medicine, govern, or conduct our lives in the digital age. Table of Contents: Introduction / The Query Process and Barriers to Finding Information Online / Online Search: An Evolution / Search and Discovery Technologies: An Overview / Information Access: A Spectrum of Needs and Uses / Future Tense: The Next Era in Information Access and Discovery / Answer MachinesTable of ContentsIntroduction.- The Query Process and Barriers to Finding Information Online.- Online Search: An Evolution.- Search and Discovery Technologies: An Overview.- Information Access: A Spectrum of Needs and Uses.- Future Tense: The Next Era in Information Access and Discovery.- Answer Machines.
£25.19
Springer International Publishing AG Key Issues Regarding Digital Libraries: Evaluation and Integration
Book SynopsisThis is the second book based on the 5S (Societies, Scenarios, Spaces, Structures, Streams) approach to digital libraries (DLs). Leveraging the first volume, on Theoretical Foundations, we focus on the key issues of evaluation and integration. These cross-cutting issues serve as a bridge for those interested in DLs, connecting the introduction and formal discussion in the first book, with the coverage of key technologies in the third book, and of illustrative applications in the fourth book. These two topics have central importance in the DL field, allowing it to be treated scientifically as well as practically. In the scholarly world, we only really understand something if we know how to measure and evaluate it. In the Internet era of distributed information systems, we only can be practical at scale if we integrate across both systems and their associated content. Evaluation of DLs must take place atmultiple levels,so we can address the different entities and their associated measures. Thus, for digital objects, we assess accessibility, pertinence, preservability, relevance, significance, similarity, and timeliness. Other measures are specific to higher-level constructs like metadata, collections, catalogs, repositories, and services.We tie these together through a case study of the 5SQual tool, which we designed and implemented to perform an automatic quantitative evaluation of DLs. Thus, across the Information Life Cycle, we describe metrics and software useful to assess the quality of DLs, and demonstrate utility with regard to representative application areas: archaeology and education. Though integration has been a challenge since the earliest work on DLs, we provide the first comprehensive 5S-based formal description of the DL integration problem, cast in the context of related work. Since archaeology is a fundamentally distributed enterprise, we describe ETANADL, for integrating Near Eastern Archeology sites and information. Thus, we show how 5S-based modeling can lead to integrated services and content. While the first book adopts a minimalist and formal approach to DLs, and provides a systematic and functional method to design and implement DL exploring services, here we broaden to practical DLs with richer metamodels, demonstrating the power of 5S for integration and evaluation.Table of ContentsEvaluation.- Integration.- Bibliography.
£25.19
Springer International Publishing AG Digital Libraries Applications
Book SynopsisDigital libraries (DLs) have evolved since their launch in 1991 into an important type of information system, with widespread application. This volume advances that trend further by describing new research and development in the DL field that builds upon the 5S (Societies, Scenarios, Spaces, Structures, Streams) framework, which is discussed in three other DL volumes in this series.While the 5S framework may be used to describe many types of information systems, and is likely to have even broader utility and appeal, we focus here on digital libraries. Drawing upon six (Akbar, Kozievitch, Leidig, Li, Murthy, Park) completed and two (Chen, Fouh) in-process dissertations, as well as the efforts of collaborating researchers, and scores of related publications, presentations, tutorials, and reports, this book demonstrates the applicability of 5S in five digital library application areas, that also have importance in the context of the WWW, Web 2.0, and innovative information systems. By integrating surveys of the state-of-the-art, newresearch, connections with formalization, case studies, and exercises/projects, this book can serve as a textbook for those interested in computing, information, and/or library science. Chapter 1 focuses on images, explaining how they connect with information retrieval, in the context of CBIR systems. Chapter 2 gives two case studies of DLs used in education, which is one of the most common applications of digital libraries. Chapter 3 covers social networks, which are at the heart of work onWeb 2.0, explaining the construction and use of deduced graphs, that can enhance retrieval and recommendation. Chapter 4 demonstrates the value of DLs in eScience, focusing, in particular, on cyber-infrastructure for simulation. Chapter 5 surveys geospatial information in DLs, with a case study on geocoding. Given this rich content, we trust that any interested in digital libraries, or in related systems, will find this volume to be motivating, intellectually satisfying, and useful. We hope it will help move digital libraries forward into a science as well as a practice. We hope it will help build community that will address the needs of the next generation of DLs.Table of ContentsContent-Based Image Retrieval.- Education.- Social Networks in Digital Libraries.- eScience and Simulation Digital Libraries.- Geospatial Information.- Bibliography.
£25.19
Springer International Publishing AG Information Communication
Book SynopsisThis book introduces fundamentals of information communication. At first, concepts and characteristics of information and information communication are summarized. And then five classic models of information communication are introduced. The mechanisms and fundamental laws of the information transmission process are also discussed. In order to realize information communication, impediments in information communication process are identified and analyzed. For the purpose of investigating implications of Internet information communication, patterns and characteristics of information communication in the Internet and Web 2.0 environment are also analyzed. In the end, case studies are provided for readers to understand the theory.Table of ContentsPreface.- Acknowledgments.- On Information.- Basic Concepts of Information Communication.- Models of Information Communication.- Mechanisms of Information Communication.- The Law of Information Transmission: Conservation and Diffusion.- The Realization and Impediments of Information Communication.- Application: Internet Information Communication.- Case 1: “Six Degrees of Separation” and “Small World”.- Case 2: Appearance and Development of Social Network Site.- Case 3: Wikipedia: Collaborative Communication.- Case 4: A New Network Communication Tool: The Microblog.- Bibliography.- Author Biography.
£25.19
Springer International Publishing AG Social Informatics Evolving
Book SynopsisThe study of people, information, and communication technologies and the contexts in which these technologies are designed, implemented, and used has long interested scholars in a wide range of disciplines, including the social study of computing, science and technology studies, the sociology of technology, and management information systems. As ICT use has spread from organizations into the larger world, these devices have become routine information appliances in our social lives, researchers have begun to ask deeper and more profound questions about how our lives have become bound up with technologies. A common theme running through this research is that the relationships among people, technology, and context are dynamic, complex, and critically important to understand. This book explores social informatics (SI), one important and dynamic approach that researchers have used to study these complex relationships. SI is "the interdisciplinary study of the design, uses and consequences of information technology that takes into account their interaction with institutional and cultural contexts" (Kling 1998, p. 52; 1999). SI provides flexible frameworks to explore complex and dynamic socio-technical interactions. As a domain of study related largely by common vocabulary and conclusions, SI critically examines common conceptions of and expectations for technology, by providing contextual evidence. This book describes the evolution of SI research and identifies challenges and opportunities for future research. In what might be seen as an example of socio-technical "natural selection," SI emerged in six different locations during the 1980s and 1990s: Norway, Slovenia, Japan, the former Soviet Union, the UK and, last, the U.S. As SI evolved, the version popularized in the US became globally dominant. The evolution of SI is presented in five stages: emergence, foundational, expansion, coherence, and transformation. Thus, we divide SI research into five major periods: an emergence stage, when various forms of SI emerged around the globe, an early period of foundational work which grounds SI (Pre-1990s), a period of expansion (1990s), a robust period of coherence and influence by Rob Kling (2000–2005), and a period of transformation (2006–present). Following the description of the five periods we discuss the evolution throughout the periods under five sections: principles, concepts, approaches, topics, and findings. Principles refer to the overarching motivations and labels employed to describe scholarly work. Approaches describe the theories, frameworks, and models employed in analysis, emphasizing the multi-disciplinary and interdisciplinary nature of SI. Concepts include specific processes, entities, themes, and elements of discourse within a given context, revealing a shared SI language surrounding change, complexity, consequences, and social elements of technology. Topics label the issues and general domains studied within social informatics, ranging from scholarly communication to online communities to information systems. Findings from seminal SI works illustrate growing insights over time and demonstrate how repeatable explanations unify SI. In the concluding remarks, we raise questions about the possible futures of SI research.Table of ContentsAcknowledgments.- Introduction.- Emergence of Competing Sources of Social Informatics.- The Evolution of Social Informatics.- Principles.- Approaches and Methods.- Concepts.- Topics.- Findings.- Conclusion.- Bibliography.- Author Biographies.
£25.19
Springer International Publishing AG Learning from Multiple Social Networks
Book SynopsisWith the proliferation of social network services, more and more social users, such as individuals and organizations, are simultaneously involved in multiple social networks for various purposes. In fact, multiple social networks characterize the same social users from different perspectives, and their contexts are usually consistent or complementary rather than independent. Hence, as compared to using information from a single social network, appropriate aggregation of multiple social networks offers us a better way to comprehensively understand the given social users. Learning across multiple social networks brings opportunities to new services and applications as well as new insights on user online behaviors, yet it raises tough challenges: (1) How can we map different social network accounts to the same social users? (2) How can we complete the item-wise and block-wise missing data? (3) How can we leverage the relatedness among sources to strengthen the learning performance? And (4) How can we jointly model the dual-heterogeneities: multiple tasks exist for the given application and each task has various features from multiple sources? These questions have been largely unexplored to date. We noticed this timely opportunity, and in this book we present some state-of-the-art theories and novel practical applications on aggregation of multiple social networks. In particular, we first introduce multi-source dataset construction. We then introduce how to effectively and efficiently complete the item-wise and block-wise missing data, which are caused by the inactive social users in some social networks. We next detail the proposed multi-source mono-task learning model and its application in volunteerism tendency prediction. As a counterpart, we also present a mono-source multi-task learning model and apply it to user interest inference. We seamlessly unify these models with the so-called multi-source multi-task learning, and demonstrate several application scenarios, such as occupation prediction. Finally, we conclude the book and figure out the future research directions in multiple social network learning, including the privacy issues and source complementarity modeling. This is preliminary research on learning from multiple social networks, and we hope it can inspire more active researchers to work on this exciting area. If we have seen further it is by standing on the shoulders of giants.Table of ContentsAcknowledgments.- Introduction.- Data Gathering and Completion.- Multi-source Mono-task Learning.- Mono-source Multi-task Learning.- Multi-source Multi-task Learning.- Multi-source Multi-task Learning with Feature Selection.- Research Frontiers.- Bibliography.- Authors' Biographies .
£26.99
Springer International Publishing AG Dynamic Information Retrieval Modeling
Book Synopsis Big data and human-computer information retrieval (HCIR) are changing IR. They capture the dynamic changes in the data and dynamic interactions of users with IR systems. A dynamic system is one which changes or adapts over time or a sequence of events. Many modern IR systems and data exhibit these characteristics which are largely ignored by conventional techniques. What is missing is an ability for the model to change over time and be responsive to stimulus. Documents, relevance, users and tasks all exhibit dynamic behavior that is captured in data sets typically collected over long time spans and models need to respond to these changes. Additionally, the size of modern datasets enforces limits on the amount of learning a system can achieve. Further to this, advances in IR interface, personalization and ad display demand models that can react to users in real time and in an intelligent, contextual way. In this book we provide a comprehensive and up-to-date introduction to Dynamic Information Retrieval Modeling, the statistical modeling of IR systems that can adapt to change. We define dynamics, what it means within the context of IR and highlight examples of problems where dynamics play an important role. We cover techniques ranging from classic relevance feedback to the latest applications of partially observable Markov decision processes (POMDPs) and a handful of useful algorithms and tools for solving IR problems incorporating dynamics. The theoretical component is based around the Markov Decision Process (MDP), a mathematical framework taken from the field of Artificial Intelligence (AI) that enables us to construct models that change according to sequential inputs. We define the framework and the algorithms commonly used to optimize over it and generalize it to the case where the inputs aren't reliable. We explore the topic of reinforcement learning more broadly and introduce another tool known as a Multi-Armed Bandit which is useful for cases where exploring model parameters is beneficial. Following this we introduce theories and algorithms which can be used to incorporate dynamics into an IR model before presenting an array of state-of-the-art research that already does, such as in the areas of session search and online advertising. Change is at the heart of modern Information Retrieval systems and this book will help equip the reader with the tools and knowledge needed to understand Dynamic Information Retrieval Modeling. Table of ContentsAcknowledgments.- Introduction.- Information Retrieval Frameworks.- Dynamic IR for a Single Query.- Dynamic IR for Sessions.- Dynamic IR for Recommender Systems.- Evaluating Dynamic IR Systems.- Conclusion.- Bibliography.- Authors' Biographies.
£31.49
Springer International Publishing AG The Notion of Relevance in Information Science: Everybody knows what relevance is. But, what is it really?
Book SynopsisEverybody knows what relevance is. It is a "ya'know" notion, concept, idea–no need to explain whatsoever. Searching for relevant information using information technology (IT) became a ubiquitous activity in contemporary information society. Relevant information means information that pertains to the matter or problem at hand—it is directly connected with effective communication. The purpose of this book is to trace the evolution and with it the history of thinking and research on relevance in information science and related fields from the human point of view. The objective is to synthesize what we have learned about relevance in several decades of investigation about the notion in information science. This book deals with how people deal with relevance—it does not cover how systems deal with relevance; it does not deal with algorithms. Spurred by advances in information retrieval (IR) and information systems of various kinds in handling of relevance, a number of basic questions are raised: But what is relevance to start with? What are some of its properties and manifestations? How do people treat relevance? What affects relevance assessments? What are the effects of inconsistent human relevance judgments on tests of relative performance of different IR algorithms or approaches? These general questions are discussed in detail.Table of ContentsAcknowledgments.- Preface.- Introduction.- A Bit of History.- Understanding, Manifestations, and Attributes.- Models of Relevance.- Theories of Relevance.- Experimental Studies on Behavior of Relevance.- Experimental Studies on Effects of Relevance.- Effects of Inconsistent Relevance Judgments on Information Retrieval Test Results.- Conclusions.- References.- Author Biography.
£25.19
Springer International Publishing AG Information Retrieval Models: Foundations & Relationships
Book SynopsisInformation Retrieval (IR) models are a core component of IR research and IR systems. The past decade brought a consolidation of the family of IR models, which by 2000 consisted of relatively isolated views on TF-IDF (Term-Frequency times Inverse-Document-Frequency) as the weighting scheme in the vector-space model (VSM), the probabilistic relevance framework (PRF), the binary independence retrieval (BIR) model, BM25 (Best-Match Version 25, the main instantiation of the PRF/BIR), and language modelling (LM). Also, the early 2000s saw the arrival of divergence from randomness (DFR). Regarding intuition and simplicity, though LM is clear from a probabilistic point of view, several people stated: "It is easy to understand TF-IDF and BM25. For LM, however, we understand the math, but we do not fully understand why it works." This book takes a horizontal approach gathering the foundations of TF-IDF, PRF, BIR, Poisson, BM25, LM, probabilistic inference networks (PIN's), and divergence-based models. The aim is to create a consolidated and balanced view on the main models. A particular focus of this book is on the "relationships between models." This includes an overview over the main frameworks (PRF, logical IR, VSM, generalized VSM) and a pairing of TF-IDF with other models. It becomes evident that TF-IDF and LM measure the same, namely the dependence (overlap) between document and query. The Poisson probability helps to establish probabilistic, non-heuristic roots for TF-IDF, and the Poisson parameter, average term frequency, is a binding link between several retrieval models and model parameters. Table of Contents: List of Figures / Preface / Acknowledgments / Introduction / Foundations of IR Models / Relationships Between IR Models / Summary & Research Outlook / Bibliography / Author's Biography / IndexTable of ContentsList of Figures.- Preface.- Acknowledgments.- Introduction.- Foundations of IR Models.- Relationships Between IR Models.- Summary & Research Outlook.- Bibliography.- Author's Biography.- Index.
£25.19
Springer International Publishing AG Cybersecurity of Digital Service Chains:
Book SynopsisThis open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architectures, algorithms, and non-technical aspects developed during three years of investigation; the description of the Smart Mobility use case developed at the end of the project gives a practical example of how the GUARD platform and related technologies can be deployed in practical scenarios. We expect the book to be interesting for the broad group of researchers, engineers, and professionals daily experiencing the inadequacy of outdated cybersecurity models for modern computing environments and cyber-physical systems. Table of ContentsA Reference Architecture for Management of Security Operations in Digital Service Chains.- Efficient flow monitoring in digital services.- Intelligent Transportation Systems -- models, challenges, security aspects.- NAD: Machine Learning based Component for Unknown Attack Detection in Network Traffic.- Detecting unknown attacks through system behavior analysis.- Signature-based detection of botnet DDoS attacks.- Automatic Attack Pattern Mining for Generating Actionable CTI Applying Alert Aggregation.- Blockchain-based task and information management in computational cloud systems.
£31.49
Springer International Publishing AG Edge Computing and IoT: Systems, Management and
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 2nd International Conference on Edge Computing and IoT, ICECI 2021, held in December 2021 in Shenzhen, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 12 full papers of ICECI 2021 were selected from 26 submissions and present results and ideas in the area of edge computing and IoT.Table of ContentsAn Improved Audio Processing Method for Campus Broadcast System.- Committee Selection Based on Game Theory in Sharding Blockchain.- Green Transition Driven Carbon Trading Mechanism and Design Based on Urban Vehicle Trajectory Data.- Matching with Externalities for Device Assignment in IoT Sharding Blockchain.- Openflow-extended Queue Scheduling for Multi-tenants in Access Network.- Research and Improvement on detection algorithm of SCMA System.- A Survey of Adversarial Attacks on Wireless Communications.- Adversarial Examples in Wireless Networks: A Comprehensive Survey.- Headmotion: Human-machine interaction requires only your head movement.- Implementation of the bone grid reconstruction based on CT data.- Intelligent Vocal Training Assistant System.- Wearable-based Human Emotion Inference System..
£49.49
Springer International Publishing AG Service-Oriented and Cloud Computing: 9th IFIP WG 6.12 European Conference, ESOCC 2022, Wittenberg, Germany, March 22–24, 2022, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 8th IFIP WG 2.14 European Conference on Service-Oriented and Cloud Computing, ESOCC 2022, held in Wittenberg, Germany, in March 2022. The 6 full and 2 short papers presented in this volume were carefully reviewed and selected from 17 submissions. Table of ContentsInvited Talk.- Sniffbots to the Rescue – Fog Services for a Gas-Sniffng Immersive Robot Collective.-Support for Cloud Applications Dynamic Threshold Setting for VM Migration.- Secure Partitioning of Composite Cloud Applications.- A Decentralized Service Control framework for Decentralized Applications in Cloud Environments.- Service Design and Development.- A Systematic Comparison of IoT Middleware.- Pattern-Based Resolution of Integration Mismatches in Enterprise Applications.- Towards a Quality Model for Cloud-native Applications.- Serverless.- Upilio: Leveraging the Serverless Paradigm for Building a Versatile IoT Application.- MAAF: Self-Adaptive Memory Optimization for Serverless Functions.
£67.49
Springer International Publishing AG Distributed, Ambient and Pervasive Interactions. Smart Living, Learning, Well-being and Health, Art and Creativity: 10th International Conference, DAPI 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, J
Book SynopsisThe two-volume set, LNCS 13325 and 13326, are conference proceedings that constitutes the refereed proceedings of the 10th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2022, held as part of the 24th International Conference, HCI International 2022, which took place during June-July 2022. The conference was held virtually due to the COVID-19 pandemic. The 58 papers of DAPI 2022 are organized in topical sections named for each volume: Part I: User Experience and Interaction Design for Smart Ecosystems; Smart Cities, Smart Islands, and Intelligent Urban Living; Smart Artifacts in Smart Environments; and Opportunities and Challenges for the Near Future Smart EnvironmentsPart II: Smart Living in Pervasive IoT Ecosystems; Distributed, Ambient, and Pervasive Education and Learning; Distributed, Ambient, and Pervasive Well-being and Healthcare; and Smart Creativity and Art.
£62.99
Springer International Publishing AG Augmented Cognition: 16th International
Book SynopsisThis book constitutes the refereed proceedings of the 16th International Conference on Augmented Cognition, AC 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022.The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The AC 2022 proceedings aims to develop adaptive systems capable of extending the information management capacity of individuals through computing technologies and offers a broad range of theoretical and applied issues related to Augmented Cognition and its applications.Table of ContentsUnderstanding Human Cognition and Behavior.- Brain Activity Measurement and Electroencephalography.- Human and Machine Learning.- Extended Reality and Augmented Cognition.
£66.49
Springer International Publishing AG Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities: 10th International Conference, DAPI 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 – July 1, 2022,
Book SynopsisThe two-volume set, LNCS 13325 and 13326, are conference proceedings that constitutes the refereed proceedings of the 10th International Conference on Distributed, Ambient and Pervasive Interactions, DAPI 2022, held as part of the 24th International Conference, HCI International 2022, which took place during June-July 2022. The conference was held virtually due to the COVID-19 pandemic. The 58 papers of DAPI 2022 are organized in topical sections named for each volume: Part I: User Experience and Interaction Design for Smart Ecosystems; Smart Cities, Smart Islands, and Intelligent Urban Living; Smart Artifacts in Smart Environments; and Opportunities and Challenges for the Near Future Smart EnvironmentsPart II: Smart Living in Pervasive IoT Ecosystems; Distributed, Ambient, and Pervasive Education and Learning; Distributed, Ambient, and Pervasive Well-being and Healthcare; and Smart Creativity and Art.
£62.99
Springer International Publishing AG Application and Theory of Petri Nets and Concurrency: 43rd International Conference, PETRI NETS 2022, Bergen, Norway, June 19–24, 2022, Proceedings
Book SynopsisThis book constitutes the proceedings of the 43rd International Conference on Application and Theory of Petri Nets and Concurrency, PETRI NETS 2022, which was held virtually in June 2021. The 19 full papers presented in this volume were carefully reviewed and selected from 35 submissions. The papers are categorized into the following topical sub-headings: application of concurrency to system design; timed models; tools; applications; synthesis; petri nets architecture; and process mining.
£58.49
Springer International Publishing AG Innovations for Community Services: 22nd
Book SynopsisThis book constitutes the refereed proceedings of the 22nd International Conference on Innovations for Community Services, I4CS 2022, held in Delft, The Netherlands, in June 2022. The 15 full papers and 5 short papers presented in this volume were carefully reviewed and selected from 43 submissions. Three invited papers were also included in the volume. The papers focus on topics such as services for critical infrastructure; network architecture for communities; applications and services supporting work and life; community data and visualization; technology empowers industry processes; and future community support.Table of ContentsInvited Papers.- Energy Harvesting and Environment Protection.- Applied Security and Privacy.- eHealth and Infrastructure.- Smart Mobility and Routing.- Smart Cities and Standardization.- Applied Machine Learning.- Quantum Computing.
£62.99
Springer International Publishing AG Privacy Technologies and Policy: 10th Annual
Book SynopsisThis book constitutes the refereed conference proceedings of the 10th Annual Privacy Forum, APF 2022 in Warsaw, Poland in June 2022. The 8 full papers were carefully reviewed and selected from 38 submissions. The papers are organized in the area of privacy and data protection while focusing on privacy related application areas. A large focus of the 2022 conference was on the General Data Protection Regulation (GDPR).Table of ContentsUsers’ Rights.- Security of Personal Data.- Privacy Enhancing Technologies.- Privacy Engineering.
£44.99
Springer International Publishing AG Gaming, Simulation and Innovations: Challenges and Opportunities: 52nd International Simulation and Gaming Association Conference, ISAGA 2021, Indore, India, September 6–10, 2021, Revised Selected Papers
Book SynopsisThis book constitutes the refereed proceedings of the 52nd International Simulation and Gaming Association Conference, ISAGA 2021, held in Indore, India, during September 6–10, 2021. The 24 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: game design and facilitation; gaming in education; player experience in simulations; and policy formulation and serious games.Table of ContentsGame Design and Facilitation.- Bring Joy to Gamers: Adding Renewable Energy Alternative through Sustainable Development Indicators.- The Effects of Structured Instruction on Team Performance.- Facilitated Tabletop Games in a Mediated Environment.- Facilitating Training Simulations for Health Emergency.- Factors and Attributes of Team Players: A Study of Engineering Students in India.- Intercultural Dialogue through Simulation and Virtual Exchange in Education.- Gaming in Education.- The Co-Design of Educational Video Games.- Reframing the Boundaries of Experiential Education Using Cynefin Domains.- Experimental Research: Simulations and Serious Games for Sustainability.- Frame Game as Teaching Methodology in Higher Education: the case of RElastiCity.- “Risk Management can actually be Fun” - Using the Serious Cards for Biosafety Game to Stimulate Proper Discussions about Biosafety.- Social Economy: A Simulation Game in Model Social Enterprises.
£58.49
Springer International Publishing AG Intelligent Technologies and Applications: 4th
Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on Intelligent Technologies and Applications, INTAP 2021, held in Grimstad, Norway, October 11–13, 2021.The 33 full papers included in this book were carefully reviewed and selected from 243 submissions. They were organized in topical sections as follows: Intelligence, Decision support systems, IoT; Robotics; ML and AI for Intelligent Health, Applications of intelligent technologies in Emergency Management; Smart Electrical Energy Systems, AI and ML in Security; ML and AI for sensing technologies, Social Media Analytics; ML in energy sectors and materials; and Miscellaneous.Table of ContentsIntelligence, Decision support systems, IoT.- Dense Nearest Neighborhood Query.- Explainable nonlinear modelling of multiple time series with invertible neural networks.- Iterative Learning for Semi-automatic Annotation Using User Feedback.- Residual Stress Prediction of Welded Joints Using Gradient Boosting Regression.- A Novel Group Teaching Optimization Algorithm based Artificial Neural Network for Classification.- On the Effects of Properties of the Minibatch in Reinforcement Learning.- A novel migration simulation and prediction tool.- Development Environment for Software-defined Smart City Networks.- Robotics.- Branch-Manoeuvring Capable Pipe Cleaning Robot for Aquaponic Systems.- A Multi-Modal Auditory-Visual-Tactile e-Learning Framework.- A Perspective on Intervention Approaches for Children with Autism Spectrum Disorder.- framework for hazard identification of a collaborative Plug&Produce system.- ML and AI for Intelligent Health, Applications of intelligent technologies in Emergency Management.- Future Perspectives on Automated Machine Learning in Biomedical Signal Processing.- DeepFireNet - A Light-Weight Model for Fire-Smoke Classification.- Smart Electrical Energy Systems, AI and ML in Security.- THD Reduction Comparison of Three Phase SPPS via Conventional RC and Novel PRESH Controller.- Artificial Neural Network (ANN) trained by a Novel Arithmetic Optimization Algorithm (AOA) for Short Term Forecasting of Wind Power.- Bode Plot Analysis of PRES and Novel PRESH controller interfaced with three phase GTSPPS.- Energy tracing and blockchain technology: a primary review.- Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations.- ML and AI for sensing technologies, Social Media Analytics.- Point Cloud Instance Segmentation for Automatic Electric Vehicle Battery Disassembly.- Radar-Based Passive Step Counter and its Comparison with a Wrist-Worn Physical Activity Tracker.- Principles for the Arrangement of Social Media Listening Practices in Crisis Management.- AMUSED: An Annotation Framework of Multi-modal Social Media Data.- ML in energy sectors and materials.- An evaluation of predictor variables for photovoltaic power forecasting.- Smart Meter Data Anomaly Detection using Variational Recurrent Autoencoders with Attention.- Detecting the linear and non-linear causal links for disturbances in the power grid.- Machine Learning for PV System Operational Fault Analysis: Literature Review.- Miscellaneous.- An overview of Data Based Predictive Modeling Techniques used in Analysis of Vehicle Crash Severity.- An Evaluation of Autonomous Car Simulators and their applicability for Supervised and Reinforcement Learning.- Classification of Mechanical Fault-Excited Events based on Frequency.- Intelligent Technologies in the Process of Recovering Historical, Cultural, and Heritage Value in Native Communities.- Tensile Experiments on Adhesion between Aluminium Profiles and Glass.- Machine learning for capacity utilization along the routes of an urban freight service.
£75.99
Springer International Publishing AG Quality of Information and Communications Technology: 15th International Conference, QUATIC 2022, Talavera de la Reina, Spain, September 12–14, 2022, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 15th International Conference on the Quality of Information and Communications Technology, QUATIC 2022, held in Talavera de la Reina, Spain, in September 2022.The 18 full papers and 3 short papers were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections: smart and advanced systems; verification and validation; skills and education; industrial experiences and applications; safety, security and privacy.Table of ContentsSmart and Advanced Systems.- Verification and Validation.- Skills and Education.- Industrial Experiences and Applications.- Safety, Security and Privacy.
£58.49
Springer International Publishing AG Mobile Web and Intelligent Information Systems: 18th International Conference, MobiWIS 2022, Rome, Italy, August 22–24, 2022, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 18th International Conference on Mobile Web and Intelligent Information Systems, MobiWIS 2022, held in Rome, Italy, in August 2022.The 18 full papers and 1 short paper presented in this book were carefully reviewed and selected from 51 submissions. The papers of MobiWIS 2022 deal focus on topics such as security and privacy; web and mobile applications; networking and communication; intelligent information systems; and IoT and ubiquitous computing.Table of ContentsSession 1: Mobile Applications and Technologies.- Knowledge Behavior Gap Model: An Application for Technology Acceptance.- UI-Re-Engineering of a Mobile Documentation Software in the Care Sector.- GUI Element Detection from Mobile UI Images Using YOLOv5.- Session 2: Mobile Devices and Automous Vehicles.- Active Federated YOLOR Model for Enhancing Autonomous Vehicles Safety.- Neural Network for Public Transport Mode Inference on Mobile Devices.- Data-Driven Federated Autonomous Driving.- Session 3: Security in Healthcare and Smart Cities Environment.- Case Study on a Session Hijacking Attack: The 2021 CVS Health Data Breach.- Blockchain for Cybersecure Healthcare.- Design of a Method for Setting IoT Security Standards in Smart Cities.- Session 4: Software-Defined Networks.- Mathematical Models for Minimizing Latency in Software-Defined Networks.- Analyzing the Impact of DNN Hardware Accelerators-Oriented Compression Techniques on General-Purpose Low-End Boards.- Spatial Dependency in Software-Defined Networking In-Band Monitoring: Challenges and Future Perspective.- Session 5: Smart Systems and Applications.- What is a Smart Service?.- SSSB: An Approach to Insurance for Cross-Border Exchange by using Smart Contracts.- A Review: Sensors Used in Tool Wear Monitoring and Prediction.- Session 6: Advanced Information Systems.- Towards the use of IT technologies for health literacy and health information competences – a case study.- A Systematic Literature Review on Relationship between Internet Usage Behavior and Internet QoS in Campus.- Model Checking Intelligent Information Systems with 3-Valued Timed Commitments.
£52.24
Springer International Publishing AG Well-Being in the Information Society: When the Mind Breaks: 9th International Conference, WIS 2022, Turku, Finland, August 25–26, 2022, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 9th International Conference on Well-Being in the Information Society, WIS 2022, held in Turku, Finland, in August 2022. The 14 revised full papers presented were carefully reviewed and selected from 17 submissions. The proceedings are structured in four sections as follows: mental well-being and e-health; social media and well-being; innovative solution for well-being in the information society; driving well-being in the information society.Table of ContentsMental Well-being and E-Health.- Social Media and Well-being.- Innovative Solution for Well-being in the Information Society.- Driving Well-being in the Information Society.
£53.99
Springer International Publishing AG Model-Based Safety and Assessment: 8th
Book SynopsisThis book constitutes the proceedings of the 8th International Symposium on Model-Based Safety and Assessment, IMBSA 2022, held in Munich, Germany, in September 2022. The 15 revised full papers and 3 short papers presented were carefully reviewed and selected from 27 initial submissions. The papers focus on model-based and automated ways of assessing safety and other attributes of dependability of complex systems. They are organized in topical sections on safety analysis automation, MBSA practices, causal models and failure modeling strategies, designing mitigations of faults and attacks, data based safety analysis, dynamic risk assessment.Table of ContentsSafety analysis automation.- An AEBS use case for Model-Based System Design integrating Safety Analyses and Simulation.- COMPASTA: Extending TASTE with formal design and verification functionality.- MBSA practices.- MBSA in aeronautics: a way to support safety activities.- Modeling the Variability of System Safety Analysis using State-Machine Diagrams.- Model-Based Safety Analysis: a Practical Experience.- Practical application of Model-Based Safety Analysis to the Design of Global Operating System of new rolling stock on automatic metro lines.- Plug-and-Produce... safely! End-to-End Model-Based Safety Assurance for Reconfigurable Industry 4.0.- Causal models and failure modeling strategies.- Strategies for modelling failure propagation in dynamic systems with AltaRica.- Towards Causal Model-based Engineering in Automotive System Safety.- Performance assessment of an offshore windmill farm using AltaRica 3.0.- Component Fault and Deficiency Tree (CFDT): Combining functional safety and SOTIF Analysis.- Designing mitigations of Faults and Attacks.- A Capella-based Tool for the Early Assessment of Nano/Micro Satellites Availability.- Data based safety analysis.- A Deep Learning Framework for Wind Turbine Repair Action Prediction Using Alarm Sequences and Long Short Term Memory Algorithms.- Tool Paper: Time Series Anomaly Detection Platform for MATLAB Simulink.- Keep your Distance: Determining Sampling and Distance Thresholds in Machine Learning Monitoring.- Dynamic risk assessment.- Engineering Dynamic Risk and Capability Models to Improve Cooperation Efficiency Between Human Workers and Autonomous Mobile Robots in Shared Spaces.- SafeDrones: Real-Time Reliability Evaluation of UAVs using Executable Digital Dependable Identities.
£42.74
Springer International Publishing AG Computer Science and Education in Computer Science: 18th EAI International Conference, CSECS 2022, On-Site and Virtual Event, June 24-27, 2022, Proceedings
Book SynopsisThis book constitutes the refereed post-conference proceedings of the 18th EAI International Conference on Computer Science and Education in Computer Science, CSECS 2022, held in June 2022 in Sofia, Bulgaria. Due to COVID-19 pandemic the conference was held On-Site and virtually.The 15 full papers and 9 short papers were carefully reviewed and selected from 53 submissions. The papers present are grouped into 2 tracks, i.e., computer science implementations and education in computer science. CSECS conference presents research in software engineering and information systems design, cryptography, the theoretical foundation of the algorithms, and implementation of machine learning and big data technologies. Another important topic of the conference is the education in computer science which includes the introduction and evaluation of computing programs, curricula, and online courses, to syllabus, laboratories, teaching, and pedagogy aspects. The technical and education topics evolved multiple existing and emerging technologies, solutions, and services for design and training providing a heterogeneous approach towards delivering Software 4.0 and Education 4.0 to a broad range of citizens and societies.Table of ContentsComputer Science Implementations.- A Clustering Approach to Analyzing NHL Goaltenders’ Performance.- Synopsis of Video Files Using Neural Networks: Component Analysis.- Computing methodologies.- Artificial intelligence.- Machine learning.- Theory of computation.- Models of computation .- Computational complexity and cryptography.- Logic, Design, and analysis of algorithms.- Networks, Network architectures, performance evaluation, Network services.- Software and its engineering.- Software creation and management.- Applied Computing, Education.- Image Decluttering Techniques and its Impact on YOLOv4 Performance.- Context-switching neural network for constrained-space hardware.- Region-based Multiple Object Tracking with LSTM supported Trajectories.- An Approach to Software Assets Reusing.- Methodological creation of HDRI from 360-degree camera - case study.- Bioinformatics: model selection and scientific visualization.- Estimating COVID case fatality rate in Bulgaria for 2020-2021.- Pregnancy outcomes in women with pregestational diabetes.- Real-Time and Near-Real-Time Services in Distributed Environment for IoT – Edge – Cloud Computing Implementation in Agriculture and Well-Being.- On a Class of Minihypers in the Geometries.- Integer Sequences in the HP Model of Dill Slav Angelov.- Challenges and Opportunities in ESG Investments.- Education in Computer Science.- A Visual Tool to Study Sorting Algorithms and Their Complexity.- Database Schemas used in SQL University Courses –State of the art.- Are Research Universities Meeting the Educational Challenge of the New Economy?.
£61.74
Springer International Publishing AG The Evolution of Pervasive Information Systems
Book SynopsisThis book covers several aspects related the evolution of Information Systems into Pervasive Information Systems. New IT trends have an important impact on IT infrastructures, which become increasingly heterogeneous, flexible, and dynamic. These new trends are transforming Information Systems into what we call Pervasive Information Systems. The purpose of this book is to combine “state-of-the-art” solutions from various research communities (such as Information Systems Engineering, Cloud Computing, Fog/Edge Computing, Pervasive systems, Distributed systems, and Middleware systems) related to the Pervasive Information Systems emergence as a common point of view. Through these multiple contributions, this book tackles important challenges concerning Information Systems evolution, promoting a holistic view of Pervasive Information System.Pervasive Information Systems (PIS) can be defined as a new class of Information Systems. It can be characterized by an IT that is gradually embedded in the physical environment and can accommodate the user’s requirements and desires when necessary. This evolution implies considering Information Systems beyond the organization's physical environment to integrate new technologies transparently, leading to a pervasive environment whose behavior should be more and more reactive & proactive. It corresponds to an important change in Information Systems Engineering. Pervasive Information Systems are deeply multidisciplinary systems, demanding a holistic view in which multiple domains are invited to contribute.Table of ContentsChapter. 1. What is a “Pervasive Information System” (PIS)?Chapter. 2. Design and Modeling in Pervasive Information SystemsChapter. 3. The context awareness challenges for PISChapter. 4. Middleware supporting PIS: Requirements,solutions, and challengesChapter. 5. Edge Computing and LearningChapter. 6. PIS: IoT & Industry 4.0 challengesChapter. 7. PIS: Interoperability and Decision-Making Process – A Review
£123.49
Springer International Publishing AG Advances in Computing: 15th Colombian Congress, CCC 2021, Bogotá, Colombia, November 22–26, 2021, Revised Selected Papers
Book SynopsisThis book constitutes revised selected papers from the refereed proceedings of the 15th Colombian Congress on Advances in Computing, CCC 2021, held in Bogotá, Colombia, during November 22–26, 2021.The 8 full papers and 2 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: Artificial intelligence; educational informatics; and information systems.Table of ContentsArtificial Intelligence.- SIMALL: Emotional BDI Model for Customer Simulation in a Mall.- Classification of Depression Based on Audio with Artificial Intelligence.- Analytical model of recommendations for the mitigation of theft risks.- Implementing a Deep Learning Algorithm for Detection of Denial of Service Attacks.- Correlations and cross-correlations in temperature and relative humidity temporal series from Manizales, Colombia.- Educational Informatics.- ALPY PLUS – Adaptive Model Oriented to Pathway Planning in Virtual Learning System.- Problem-based learning and virtual platforms process in education for civil engineers: An experiment carried out by the University of Medellin, Colombia.- Information Systems.- Cost Estimate Migration for Crystal Reports.- Evaluation of Work Stealing Algorithms.- Analysis of the user experience for an application proposal oriented to the general medical consultation service.
£49.49
Springer International Publishing AG Engineering Software for Modern Challenges: First International Conference, ESMoC 2021, Johor, Malaysia, October 20–21, 2021, Revised Selected Papers
Book SynopsisThis volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021.The 17 papers presented were thoroughly reviewed and selected from the 167 submissions. They are organized in the topical sections on software engineering; intelligent systems; software quality. Table of ContentsSoftware Engineering.- Intelligent Systems.- Software Quality.
£49.49
Springer International Publishing AG Smart Grid and Internet of Things: 5th EAI
Book SynopsisThis book constitutes the refereed proceedings of the 5th EAI International Conference on Smart Grid and Internet of Things, SGIoT 2021, held in TaiChung, Taiwan, in December 2021.The 9 regular papers and 4 short papers presented were carefully reviewed and selected from 57 submissions. The papers cover a broad range of topics in wireless sensor, vehicular ad hoc networks, security, deep learning and big data. The papers are organized in two subject areas: applications on internet of things, and communication security, big data, neural networks and machine learning.Table of ContentsApplications on Internet of Things.- Intellectual Property Protection of Zhuang Nationality Funeral Culture on Internet of Things.- China IoT UBI Car Insurance Regulatory Development Trend.- Constructing a violence recognition technique for elderly patients with lower limb disability.- Aquaculture Monitoring Systems based on Lightweight Kubernetes and Rancher.- Design and Implementation of Water Monitoring Using LoRa and NB-IoT.- InterWorking Function for Mission Critical Push To Talk Services.- Communication Security, Big Data, Neural Networks and Machine Learning.- Lightweight Privacy-Preserving Data Aggregation Scheme Based on Elliptic Curve Cryptography for Smart Grid Communications.- Design and Implementation of Distributed Image Recognition App with Federal Learning Techniques.- Improving Vision Clarity and Object Detection Accuracy in Heavy Rain Base on Neural Network.- An Enhanced Location-data Differential Privacy Protection Method Based on Filter.- Big data grave register information management system outside cemeteries under Internet of Things.- Machine Learning-based Models for Monofacial and Bifacial PV Module and Critical Model Feature Selection.- Study on the discovery of personal information on the network of people diagnosed with COVID-19.
£49.49
Springer International Publishing AG Provable and Practical Security: 16th
Book SynopsisThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.Table of ContentsEncryption.- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search.- More Efficient Verifiable Functional Encryption.- Subverting Deniability.- Epoch Confidentiality in Updatable Encryption.- Lattice Based Cryptography.- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices.- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask.- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems.- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices.- Information Security.- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks.- Construction of a New UAV Management System based on UMIA Technology.- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.- Practical Federated Learning for Samples with Different IDs.- Blockchain.- Reinforcement-Mining: Protecting Reward in Selfish Mining.- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks.- Secure Collaboration between Consortiums in Permissioned Blockchains.- Foundations.- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge.- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model.- Cryptographic Role-Based Access Control, Reconsidered.
£47.49
Springer International Publishing AG Internet of Things: 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20–23, 2022, Revised Selected Papers
Book SynopsisThis book constitutes revised selected papers from the refereed proceedings of the 5th The Global IoT Summit, GIoTS 2022, which took place in Dublin, Ireland, in June 20–23, 2022. The 33 full papers included in this book were carefully reviewed andselected from 75 submissions. They were organized in topical sections as follows: ioT enabling technologies; ioT applications, services and real implementations; ioT security, privacy and data protection; and ioT pilots, testbeds and experimentation results.Table of ContentsIoT Enabling Technologies.- Overview of Drone Communication Requirements in 5G.- Accurate indoor positioning based on beacon weighting using RSSI.- Adaptive Data-Driven Routing for Edge-to-Cloud Continuum: a Content-Based Publish/Subscribe Approach.- Online Decentralized Frank-Wolfe: From theoretical bound to applications in smart-building.- IntellIoT: Intelligent IoT Environments.- An Interoperable Framework for Heterogeneous IoT Infrastructure to Unlock Data Value.- Task offloading in Computing Continuum using collaborative reinforcement learning.- Assessing Efficiency Benefits of Edge Intelligence.- IoT Applications, Services and Real Implementations.- A Smart IoT Gateway capable of Prescreening for Atrial Fibrillation.- Internet of Things with web technologies solution for flood notification in S~ao Paulo.- Wi-Monitor: Wi-Fi Channel State Information-based Crowd Counting with Lightweight and Low-cost IoT Devices.- Design of a next-generation interoperable Cognitive Port Solution.- Conceptual Framework of Contact-less Consumer Products Industry during and Post-Pandemic Era.- Blockchain for economy of scale in wind industry: A Demo Case.- Sleep Stage detection on a Wearable Headband using Deep Neural Networks.- A Comparative Study on Energy Consumption Models for Drones.- ConQeng: A Middleware for Quality of Context Aware Selection, Measurement and Validation.- Automating Heterogeneous IoT Device Networks from Multiple Brokers with Multiple Data Models.- A Persuasive system for Stress Detection and Management in an Educational Environment.- Domain Generalization on Constrained Platforms: on the Compatibility with Pruning Techniques.- IoT Security, Privacy and Data Protection.- A low-overhead approach for self-sovereign identity in IoT.- An Analysis of Process Parameters for the Optimization of Specific Emitter Identification Under Rayleigh Fading.- Secure Image Data Storage And Transmission Using ESP32-Cam And Raspberry Pi With Steganography.- Modelling of Resource-aware Information Exchange for Resource Constraint IoT Devices.- IRIS Advanced Threat Intelligence Orchestrator- A way to manage cybersecurity challenges of IoT ecosystems in Smart Cities.- Federated learning-based IoT intrusion detection on non-IID data.- A holistic approach for IoT networks' identity and trust management - The ERATOSTHENES project.- A holistic approach for IoT networks' identity and trust management - The ERATOSTHENES project.- ARCADIAN-IoT - Enabling Autonomous Trust, Security and PrivacyManagement for IoT.- IoT Pilots, Testbeds and Experimentation Results.- GAIA 5G: A Multi-Access Smart-Campus Architecture.- IoT Device for Reduction of Roe Deer Fawn Mortality During Haymaking.- Latency and Energy Consumption of Convolutional Neural Network Models from IoT Edge Perspective.- Industry-Academia Cooperation: Applied IoT Research for SMEs in South-East Sweden.- Experiment to scope Low Carbon Electricity based Additive Manufacturing with IoT.
£58.49
Springer International Publishing AG Stabilization, Safety, and Security of Distributed Systems: 24th International Symposium, SSS 2022, Clermont-Ferrand, France, November 15–17, 2022, Proceedings
Book SynopsisThis book constitutes the proceedings of 24th International Symposium, SSS 2022, which took place in Clermont-Ferrand, France, in November 2022.The 17 regular papers together with 4 invited papers and 7 brief announcements, included in this volume were carefully reviewed and selected from 58 submissions. The SSS 2022 focus on systems built such that they are able to provide on their own guarantees on their structure, performance, and/or security in the face of an adverse environment. The Symposium presents three tracks reflecting major trends related to the conference: (i) Self-stabilizing Systems: Theory and Practice, (ii) Concurrent and Distributed Computing: Foundations, Faulttolerance, and Security, and (iii) Dynamic, Mobile, and Nature-Inspired Computing.Table of ContentsPlateau: A Secure and Scalable Overlay Network for Large Distributed Trust Applications.- The Limits of Helping in Non-Volatile Memory Data Structures Treasure Hunt in Graph using Pebbles.- Blockchain in Dynamic Networks.- Improving the Efficiency of Report and Trace Ring Signatures.- Flexible Scheduling of Transactional Memory on Trees.- Invited Paper: Simple, strict, proper, happy: A study of reachability in temporal graphs.- Brief Announcement: Dynamic graph models for the Bitcoin P2P network: simulation analysis for expansion and flooding time.- Brief Announcement: Self Masking for Hardening Inversions.- Perpetual Torus Exploration by Myopic Luminous Robots.- Optimal Algorithms for Synchronous Byzantine k-Set Agreement.- Reaching Consensus in the Presence of Contention-Related Crash Failures.- Self-stabilizing Byzantine Fault-tolerant Repeated Reliable Broadcast.- Capacity Planning for Dependable Services.- Lower bound for constant-size local certification.- Collaborative Dispersion by Silent Robots.- Time Optimal Gathering of Myopic Robots on an Infinite Triangular Grid.- Brief Announcement: Lattice Linear Algorithms.- Brief Announcement: Distributed Reconfiguration of Spanning Trees.- Brief Announcement: Mutually-visible Uniform Circle Formation by Asynchronous Mobile Robots on Grid Plane.- Brief Announcement: Self-stabilizing Total-order Broadcast.- Brief Announcement: Secure And Efficient Participant Authentication — Application to Mobile E-voting.- Card-Based ZKP Protocol for Nurimisaki.- Invited Paper: One Bit Agent Memory is Enough for Snap-stabilizing Perpetual Exploration of Cactus Graphs with Distinguishable Cycles Consensus on Demand.- Better Incentives for Proof-of-Work.- Invited Paper: Towards Practical Atomic Distributed Shared Memory: An Experimental Evaluation.- Invited Paper: Cross-Chain State Machine Replication.
£53.99
Springer International Publishing AG Information Technologies and Intelligent Decision Making Systems: First International Conference, ITIDMS 2021, Virtual Event, January 25, 2021, Revised Selected Papers
Book SynopsisThis book constitutes selected papers presented at the First International Scientific and Practical Conference on Information Technologies and Intelligent Decision Making Systems, ITIDMS 2021, held as Virtual Event in January, 2021.The 13 presented papers were thoroughly reviewed and selected from the 41 submissions. The conference was held with the aim of summarizing international experience in the field of information, digital and intellectual development, within which proposals were formulated for digital and information transformation, the development of computer models, information technologies, automated and computing processes. A distinctive feature of the conference is that it presented reports of authors from China, Uzbekistan, Lebanon, Poland, Kazakhstan, Bulgaria and Russia. Researchers from different countries presented the process of transition of the information and digital path of development, presented the main directions and developments that can improve the efficiency and development.Table of ContentsAnalysis of Domain Name Resolution Strategy of Local DNS Server in the Transition from IPv4 to IPv6.- Experimental Evaluation of the Efficiency of Compression of Files by Fractal-Spectral Codec.- An Intelligent Decision Support System for Solving Complex Territorial Planning Problems.- Fault tolerance of distributed worker processes in corporate information systems and technologies.- Functioning of the Thermal Memory Cell.- Using Data mining technology in monitoring and modeling the epidemiological situation of the human immunodeficiency virus in Kazakhstan.- Information Technology and Artificial Intelligence in Improving of Center Pivot Irrigation Control.- KOA Pathology Screening using Multi-channel VAG Signal Fusion Method.- Prioritization of Distributed Worker Processes Based on Etcd Locks.- Analysis of Methods for Classifying and Segmenting 3D Images.- Tone Image Processing with Discrete Data Structure.- The Concept of Client-Server Architecture for Remote Control of a Distributed Knowledge Base.- Experimental Study of Russian-language News Text Categorization Performance Using Machine Learning Algorithms.
£49.49
Springer International Publishing AG Product-Focused Software Process Improvement:
Book SynopsisThis book constitutes the refereed proceedings of the 23rd International Conference on Product-Focused Software Process Improvement, PROFES 2022, which took place in Jyväskylä, Finland in November 2022.The 24 full technical papers, 9 short papers, and 6 poster papers presented in this volume were carefully reviewed and selected from 75 submissions. The book also contains and 8 doctoral symposium papers and 7 tutorial and workshop papers.The contributions were organized in topical sections as follows: Keynote; Cloud and AI; Empirical Studies; Process Management; Refactoring and Technical Dept; Software Business and Digital Innovation; Testing and Bug Prediction; Posters; Tutorials; Workshop on Engineering Processes and Practices for Quantum Software (PPQS’22); 1st Workshop on Computational Intelligence and Software Engineering (CISE 2022); Doctoral Symposium.Table of Contents Keynote.- The End-users of Software Systems deserve better.- Cloud and AI.- Managing the Root Causes of "Internal API Hell": An Experience Report.- Requirements for Anomaly Detection Techniques for Microservices.- Requirements for Anomaly Detection Techniques for Microservices.- Requirements for Anomaly Detection Techniques for Microservices.- Empirical Studies.- Defining Requirements Strategies in Agile: A Design Science Research.- Analysing the Relationship between Dependency Definition and Updating Practice when Using Third-Party Libraries.- On the Limitations of Combining Sentiment Analysis Tools in a Cross-Platform Setting.- Marine Data Sharing: Challenges, Technology Drivers and Quality Attributes.- Marine Data Sharing: Challenges, Technology Drivers and Quality Attributes.- Data-Driven Improvement of Static Application Security Testing Service: An Experience Report in Visma.- Near Failure Analysis using Dynamic Behavioural Data.- Process Management.- A Process Model of Product Strategy Development: A Case of B2B SaaS Product.- A Process Model of Product Strategy Development: A Case of B2B SaaS Product.- Benefit Considerations in Project Decisions.- Towards Situational Process Management for Professional Education Programmes.- Change Management in Cloud-Based Offshore Software Development: A Client-Vendor Perspective.- Half-Empty Offices in Flexible Work Arrangements: Why are Employees Not Returning?.- Refactoring and Technical Dept.- Technical Debt in Service-Oriented Software Systems.- An Investigation of Entropy and Refactoring in Software Evolution.- "To Clean Code or Not To Clean Code" A Survey among Practitioners.- Software Business and Digital Innovation.- Counter the Uncertainties in a Dynamic World: Approach for Creating Outcome-Driven Product Roadmaps.- Designing Platforms for Crowd-based Software Prototype Validation: A Design Science Study.- Rapid delivery of software: The effect of alignment on time to market.- Exploring the “Why,” “How,” and “What” of Continuous Digital Service Innovation.- Why Traditional Product Roadmaps Fail in Dynamic Markets: Global Insights.- Why Traditional Product Roadmaps Fail in Dynamic Markets: Global Insights.- Why Traditional Product Roadmaps Fail in Dynamic Markets: Global Insights.- Testing and Bug Prediction.- Test Case Selection with Incremental ML.- Inferring Metamorphic Relations from JavaDocs: A Deep Dive Into the MeMo Approach.- An Evaluation of Cross-Project Defect Prediction Approaches on Cross-Personalized Defect Prediction.- A/B Testing in the Small: an Empirical Exploration of Controlled Experimentation on Internal Tools.- TEP-GNN: Accurate Execution Time Prediction of Functional Tests using Graph Neural Networks.- Improving Software Regression Testing Using a Machine Learning-based Method For Test Type Selection.- Early Identification of Invalid Bug Reports in Industrial Settings - A Case Study.- Posters.- RESEM: Searching Regular Expression Patterns with Semantics and Input/Output Examples.- Linking User Stories and Behavior Driven Development Concepts: Ontology, Preliminary Validation and Further Perspectives.- Quality Metrics for Software Development Management and Decision Making: An Analysis of Attitudes and Decisions.- Are NLP Metrics Suitable for Evaluating Generated Code?.- Are NLP Metrics Suitable for Evaluating Generated Code?.- Can the requirements coverage be satisfied with code coverage? User story test coverage.- Tidy Up Your Source Code! Eliminating Wasteful Statements in Automatically Repaired Source Code.- Tutorials- Utilizing User Stories to Bring AI Ethics into Practice in Software Engineering.- Workshop on Engineering Processes and Practices for Quantum Software (PPQS’22).- Classical to Quantum Software Migration Journey Begins: A Conceptual Readiness Model.- 1st Workshop on Computational Intelligence and Software Engineering (CISE 2022).- Technical Debt Forecasting from Source Code using Temporal Convolutional Networks.- Adagio: a bot for AuDio processing AGainst vIOlence.- End Users’Perspective of Performance Issues in Google Play Store .- Predicting Bug-Fixing Time: DistilBERT versus Google BERT.- Proposing Isomorphic Microservices based Architecture for IoT.- Doctoral Symposium.- Ethical Tools, Methods and Principles in Software Engineering and Development: Case Ethical User Stories.- Architectural Degradation and Technical Debt Dashboards (PROFES Doctoral Symposium).- The Impact of Business Design in Improving the Offering of Professional Software Services.- Applications of MLOps in the Cognitive Cloud Continuum "PROFES Doctoral Symposium".- Implementing Artificial Intelligence Ethics in Trustworthy System Development- Ethical Requirements for Software Development.- Developing a Critical Success Factor model for DevOps.- Strategic ICT procurement in Finland: Tensions and Opportunities.- Leverage Software Containers Adoption By decreasing Cyber Risks and systemizing the refactoring of monolithic applications.
£75.99
Springer International Publishing AG Model and Data Engineering: 11th International Conference, MEDI 2022, Cairo, Egypt, November 21–24, 2022, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Model and Data Engineering, MEDI 2022, held in Cairo, Egypt, in November 2022. The 18 full papers presented in this book were carefully reviewed and selected from 65 submissions. The papers cover topics such as database systems, data stream analysis, knowledge-graphs, machine learning, model-driven engineering, image processing, diagnosis, natural language processing, optimization, and advanced applications such as the internet of things and healthcare.Table of ContentsImage processing and diagnosis.- Machine Learning and Optimization.- Natural Language Processing.- Modelling.- Database systems.
£47.49
Springer International Publishing AG Intelligent Information and Database Systems:
Book SynopsisThis book constitutes the refereed proceedings of the 14th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2022, held Ho Chi Minh City, Vietnam in November 2022.The 113 full papers accepted for publication in these proceedings were carefully reviewed and selected from 406 submissions. The papers of the 2 volume-set are organized in the following topical sections: data mining and machine learning methods, advanced data mining techniques and applications, intelligent and contextual systems, natural language processing, network systems and applications, computational imaging and vision, decision support and control systems, and data modeling and processing for industry 4.0. The accepted and presented papers focus on new trends and challenges facing the intelligent information and database systems community.Table of ContentsAdvanced Data Mining Techniques and Applications.- Decision Support and Control Systems.- Deep Learning Models.- Internet of Things and Sensor Networks.- Natural Language Processing.- Social Networks and Recommender Systems.- Machine Learning and Data Mining.- Computer Vision Techniques.- Innovations in Intelligent Systems.
£80.74