Synthesis


Quantifying Research Integrity Quantifying Research Integrity
Michael Seadle
Institutions typically treat research integrity violations as black and white, right or wrong. The result is that the wide range of grayscale nuances that separate accident, carelessness, and bad practice from deliberate fraud and malpractice often g...
Publication Date: December, 2016

Read More


Node Localization in Wireless Sensor Networks Node Localization in Wireless Sensor Networks
Xue Zhang, Cihan Tepedelenlioglu, Mahesh Banavar, Andreas Spanias
In sensor network applications, measured data are often meaningful only when the location is accurately known. In this booklet, we study research problems associated with node localization in wireless sensor networks. We describe sensor network local...
Publication Date: December, 2016

Read More


Natural Language Processing for the Semantic Web Natural Language Processing for the Semantic Web
Diana Maynard, Kalina Bontcheva, Isabelle Augenstein
This book introduces core natural language processing (NLP) technologies to non-experts in an easily accessible way, as a series of building blocks that lead the user to understand key technologies, why they are required, and how to integrate them in...
Publication Date: December, 2016

Read More


Digital Heritage Reconstruction Using Super-resolution and Inpainting Digital Heritage Reconstruction Using Super-resolution and Inpainting
Milind G. Padalkar, Manjunath V. Joshi, Nilay L. Khatri
Heritage sites across the world have witnessed a number of natural calamities, sabotage and damage from visitors, resulting in their present ruined condition. Many sites are now restricted to reduce the risk of further damage. Yet these masterpieces ...
Publication Date: December, 2016

Read More


Incidental Exposure to Online News Incidental Exposure to Online News
Borchuluun Yadamsuren, Sanda Erdelez
Rapid technological changes and availability of news anywhere and at any moment have changed how people seek out news. Increasingly, consumers no longer take deliberate actions to read the news, instead stumbling upon news online. While the emergence...
Publication Date: December, 2016

Read More


Non-Volatile In-Memory Computing by Spintronics Non-Volatile In-Memory Computing by Spintronics
Hao Yu, Leibin Ni, Yuhao Wang
Exa-scale computing needs to re-examine the existing hardware platform that can support intensive data-oriented computing. Since the main bottleneck is from memory, we aim to develop an energy-efficient in-memory computing platform in this book. Firs...
Publication Date: December, 2016

Read More


Advances in Multi-Channel Resource Allocation Advances in Multi-Channel Resource Allocation
Bo Ji, Xiaojun Lin, Ness B. Shroff
The last decade has seen an unprecedented growth in the demand for wireless services. These services are fueled by applications that often require not only high data rates, but also very low latency to function as desired. However, as wireless networ...
Publication Date: November, 2016

Read More


Introduction to Logic, Third Edition Introduction to Logic, Third Edition
Michael Genesereth, Eric J. Kao
This book is a gentle but rigorous introduction to Formal Logic. It is intended primarily for use at the college level. However, it can also be used for advanced secondary school students, and it can be used at the start of graduate school for those ...
Publication Date: November, 2016

Read More


Lifelong Machine Learning Lifelong Machine Learning
Zhiyuan Chen, Bing Liu
Lifelong Machine Learning (or Lifelong Learning) is an advanced machine learning paradigm that learns continuously, accumulates the knowledge learned in previous tasks, and uses it to help future learning. In the process, the learner becomes more and...
Publication Date: November, 2016

Read More


Embedded Systems Design with the Texas Instruments MSP432 32-bit Processor Embedded Systems Design with the Texas Instruments MSP432 32-bit Processor
Dung Dang, Daniel J. Pack, Steven F. Barrett
This book provides a thorough introduction to the Texas Instruments MPS432 microcontroller. The MPS432 is a 32-bit processor with the ARM Cortex M4F architecture and a built-in floating point unit. At the core, the MSP432 features a 32-bit ARM Cortex...
Publication Date: October, 2016

Read More


Differential Privacy Differential Privacy
Ninghui Li, Min Lyu, Dong Su, Weining Yang
Over the last decade, differential privacy (DP) has emerged as the de facto standard privacy notion for research in privacy-preserving data analysis and publishing. The DP notion offers strong privacy guarantee and has been applied to many data analy...
Publication Date: October, 2016

Read More


Anywhere-Anytime Signals and Systems Laboratory Anywhere-Anytime Signals and Systems Laboratory
Nasser Kehtarnavaz, Fatemeh Saki
A typical undergraduate electrical engineering curriculum incorporates a signals and systems course. The widely used approach for the laboratory component of such courses involves the utilization of MATLAB to implement signals and systems concepts. T...
Publication Date: October, 2016

Read More


Data Association for Multi-Object Visual Tracking Data Association for Multi-Object Visual Tracking
Margrit Betke, Zheng Wu
In the human quest for scientific knowledge, empirical evidence is collected by visual perception. Tracking with computer vision takes on the important role to reveal complex patterns of motion that exist in the world we live in. Multi-object trackin...
Publication Date: October, 2016

Read More


Web Indicators for Research Evaluation Web Indicators for Research Evaluation
Michael Thelwall
This book describes and evaluates a range of web indicators (altmetrics, webometrics, web metrics) for aspects of societal or scholarly impact. The recent increasing demand for research evaluation within universities and other research organizations...
Publication Date: October, 2016

Read More


Geometric Continuity of Curves and Surfaces Geometric Continuity of Curves and Surfaces
Przemyslaw Kiciak
This book is written for students, CAD system users and software developers who are interested in geometric continuity - a notion needed in everyday practice of Computer-Aided Design and also a hot subject of research. It contains a description of th...
Publication Date: October, 2016

Read More


Interactive GPU-based Visualization of Large Dynamic Particle Data Interactive GPU-based Visualization of Large Dynamic Particle Data
Martin Falk, Sebastian Grottel, Michael Krone, Guido Reina
With increasing data set sizes in terms of particle numbers, interactive high-quality visualization is a challenging task. This is especially true for dynamic data or abstract representations that are based on the raw particle data. This book cover...
Publication Date: October, 2016

Read More


Semantic Interaction for Visual Analytics Semantic Interaction for Visual Analytics
Alex Endert
This book discusses semantic interaction, a user interaction methodology for visual analytic applications that more closely couples the visual reasoning processes of people with the computation. This methodology affords user interact...
Publication Date: September, 2016

Read More


Trustworthy Policies for Distributed Repositories Trustworthy Policies for Distributed Repositories
Reagan W. Moore, Hao Xu, Mike Conway, Arcot Rajasekar, Jonathan Crabtree and Helen R. Tibbo
A trustworthy repository provides assurance in the form of management documents, event logs, and audit trails that digital objects are being managed correctly. The assurance includes plans for the sustainability of the repository, the accession of di...
Publication Date: September, 2016

Read More


The Notion of Relevance in Information Science The Notion of Relevance in Information Science
Tefko Saracevic
Everybody knows what relevance is. It is a "ya'know" notion, concept, idea - no need to explain whatsoever. Searching for relevant information using information technology (IT) became a ubiquitous activity in contemporary information society. Relevan...
Publication Date: September, 2016

Read More


Privacy Risk Analysis Privacy Risk Analysis
Sourya Joyee De, Daniel Le Metayer
Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.

The deployment of new information technologies can l...
Publication Date: September, 2016

Read More



Result Pages: [<< Prev]   1  2  3  4  5 ...  [Next >>]  Displaying 61 to 80 (of 773 products)
Browse by Subject
Case Studies in Engineering
ACM Books
IOP Concise Physics
SEM Books
0 items
LATEST NEWS

Newsletter
Note: Registered customers go to: Your Account to subscribe.

E-Mail Address:

Your Name: