Résultats de recherche de titre
Articles 161 à 180 sur 2914
Securing Systems: Applied Security Architecture and Threat Models
Par Brook S. Schoenfield. 2015
Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight…
hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect's job to prevent attacks by securing computer systems. This book describes both the process and the practice of asSecurity De-Engineering: Solving the Problems in Information Risk Management
Par Ian Tibble. 2012
As hacker organizations surpass drug cartels in terms of revenue generation, it is clear that the good guys are doing…
something wrong in information security. Providing a simple foundational remedy for our security ills, Security De-Engineering: Solving the Problems in Information Risk Management is a definitive guide to the current problems iHuman-Computer Etiquette: Cultural Expectations and the Design Implications They Place on Computers and Technology (Supply Chain Integration Modeling, Optimization and Application)
Par Caroline C. Hayes, Christopher A. Miller. 2011
Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke…
human social expectations. The book illustrates how socially acceptable conventions can strongly impact the effectiveness of human-computer interactions and how to consider such norms in the design of human-computer interGame Design: From Blue Sky to Green Light
Par Deborah Todd. 2007
This book takes a real-world, in-depth journey through the game-design process, from the initial blue sky sessions to pitching for…
a green light. The author discusses the decision and brainstorming phase, character development and story wrap, creation of content and context outlines, flowcharting game play, and creating design documents. Special feThe Tao of Computing (Chapman & Hall/CRC Textbooks in Computing)
Par Henry M. Walker. 2013
Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao…
of Computing, Second Edition presents a comprehensive introduction to computers and computer technology. This edition updates its popular predecessor with new research exercises and expanded discussion questionsRisk-based operational audits and performance audits require a broad array of competencies. This book provides auditors and risk professionals with…
the understanding required to improve results during risk-based audits.Mastering the Five Tiers of Audit Competency: The Essence of Effective Auditing is an anthology of powerful risk-based auditing praIntroduction to Corrections
Par David H. McElreath, Linda Keena, Greg Etter, Ellis Stuart Jr.. 2012
Millions in our nation are under some type of judicial sanction, with some individuals behind bars but the majority serving…
their sentences while living and working among us. Introduction to Corrections examines predominant issues related to the system of administering to offenders in the United States. Written in a simple, concise style and enhancReal Time Cameras: A Guide for Game Designers and Developers
Par Mark Haigh-Hutchinson. 2009
The control of cameras is as important in games as it is in cinema. How the camera tracks and moves…
determines our point of view and influences our attitude towards the content. A poorly designed camera system in a game can disrupt a users experience, while a well-designed one can make a good game into a great one. Breaks down the algorithms behind contemporary game camera systems, written by a leading expert in the area.The Rise of the Intelligent Health System (Intelligent Health Series)
Par Paul H. Frisch, Harry P. Pappas. 2024
"I recommend that all members of the health community read this book to obtain a real snapshot of how the…
Intelligent Health System is being transformed via new technologies." Chris Landon MD FAAP, FCCP, FRSM Clinical Associate Professor USC Keck School of Medicine Technology Development Center Laboratory and Studio The "Intelligent Health Pavilion" as demonstrated at the annual HIMSS Conference by the Intelligent Health Association is the impetus for this book. This book documents the remarkable journey of "Intelligent Health System" and the adoption of Innovative technologies. Many showcased in real time on the trade show floor and now in this book: "The Rise of the Intelligent Health System". In each chapter of this book, authors are expressing the immense potential of merging cutting-edge technology with the complex realm of patient care and safety. The informative chapters in this book delve deep into the unfolding story of how hospitals have evolved into interactive, intelligent environments, driven by real-time data and powered by artificial intelligence. In what seems like the blink of an eye, technology has completely transformed the way we live, work, and interact with the world around us. From smartphones to self-driving cars, ChatGPT, wireless technologies, wearables, and many other innovations are reshaping our society, pushing the boundaries of what was once considered impossible. However, nowhere is the impact of technology more profound than in the field of healthcare.Image Processing and Machine Learning, Volume 1: Foundations of Image Processing
Par Erik Cuevas, Alma Nayeli Rodríguez. 2024
Image processing and machine learning are used in conjunction to analyze and understand images. Where image processing is used to…
pre-process images using techniques such as filtering, segmentation, and feature extraction, machine learning algorithms are used to interpret the processed data through classification, clustering, and object detection. This book serves as a textbook for students and instructors of image processing, covering the theoretical foundations and practical applications of some of the most prevalent image processing methods and approaches. Divided into two volumes, this first installment explores the fundamental concepts and techniques in image processing, starting with pixel operations and their properties and exploring spatial filtering, edge detection, image segmentation, corner detection, and geometric transformations. It provides a solid foundation for readers interested in understanding the core principles and practical applications of image processing, establishing the essential groundwork necessary for further explorations covered in Volume 2. Written with instructors and students of image processing in mind, this book’s intuitive organization also contains appeal for app developers and engineers.Image Processing and Machine Learning, Volume 2: Advanced Topics in Image Analysis and Machine Learning
Par Erik Cuevas, Alma Nayeli Rodríguez. 2024
Image processing and machine learning are used in conjunction to analyze and understand images. Where image processing is used to…
pre-process images using techniques such as filtering, segmentation, and feature extraction, machine learning algorithms are used to interpret the processed data through classification, clustering, and object detection. This book serves as a textbook for students and instructors of image processing, covering the theoretical foundations and practical applications of some of the most prevalent image processing methods and approaches. Divided into two volumes, this second installment explores the more advanced concepts and techniques in image processing, including morphological filters, color image processing, image matching, feature-based segmentation utilizing the mean shift algorithm, and the application of singular value decomposition for image compression. This second volume also incorporates several important machine learning techniques applied to image processing, building on the foundational knowledge introduced in Volume 1. Written with instructors and students of image processing in mind, this book’s intuitive organization also contains appeal for app developers and engineers.Cellular Automata and Groups (Springer Monographs in Mathematics)
Par Tullio Ceccherini-Silberstein, Michel Coornaert. 2023
This unique book provides a self-contained exposition of the theory of cellular automata on groups and explores its deep connections…
with recent developments in geometric and combinatorial group theory, amenability, symbolic dynamics, the algebraic theory of group rings, and other branches of mathematics and theoretical computer science. The topics treated include the Garden of Eden theorem for amenable groups, the Gromov–Weiss surjunctivity theorem, and the solution of the Kaplansky conjecture on the stable finiteness of group rings for sofic groups. Entirely self-contained and now in its second edition, the volume includes 10 appendices and more than 600 exercises, the solutions of which are presented in the companion book Exercises in Cellular Automata and Groups (2023) by the same authors. It will appeal to a large audience, including specialists and newcomers to the field.Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, December 6-8, 2018, Volume 1 (Advances in Intelligent Systems and Computing #940)
Par Ajith Abraham, Aswani Kumar Cherukuri, Patricia Melin, Niketa Gandhi. 2020
This book highlights recent research on Intelligent Systems and Nature Inspired Computing. It presents 212 selected papers from the 18th…
International Conference on Intelligent Systems Design and Applications (ISDA 2018) and the 10th World Congress on Nature and Biologically Inspired Computing (NaBIC), which was held at VIT University, India. ISDA-NaBIC 2018 was a premier conference in the field of Computational Intelligence and brought together researchers, engineers and practitioners whose work involved intelligent systems and their applications in industry and the “real world.” Including contributions by authors from over 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.Information Systems and Technologies: WorldCIST 2023, Volume 1 (Lecture Notes in Networks and Systems #799)
Par Alvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira, Valentina Colla. 2024
This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held…
between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences, and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main and distinctive topics covered are: A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications, and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility, and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human–Computer Interaction; J) Ethics, Computers, and Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications.Just Ordinary Robots: Automation from Love to War
Par Lamber Royakkers, Rinie Van Est. 2016
A social robot is a robot that interacts and communicates with humans or other autonomous physical agents by following social…
behaviors and rules attached to its role. We seem to accept the use of robots that perform dull, dirty, and dangerous jobs. But how far do we want to go with the automation of care for children and the elderly, or the killinCreative, Efficient, and Effective Project Management
Par Ralph L. Kliem. 2014
Creative companies are distinguished by their ability to adapt and thrive in a dynamic, changing economy. Their products and services…
stand out in the market, and these companies' ability to be agile and innovative is key to their success.Creative, Efficient, and Effective Project Management supplies an in-depth discussion of creativity and its relIn the competitive business arena organizations must continually strive to create new and better products faster, more efficiently, and more…
cost effectively than competitors to gain and keep the competitive advantage. Computer-aided design (CAD), computer-aided engineering (CAE), and computer-aided manufacturing (CAM) are now the industry standard, in all major industries. The seven volumes in Computer-Aided Design, Engineering, and Manufacturing: Systems Techniques, and Manufacturing provide a comprehensive treatment of the techniques and applications of CAD, CAE, and CAM.Introduction to Computer and Network Security: Navigating Shades of Gray
Par Richard R. Brooks. 2014
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "learn-by-doing" approach to teaching, Introduction…
to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer securiBig Data, Mining, and Analytics: Components of Strategic Decision Making
Par Stephan Kudyba. 2014
There is an ongoing data explosion transpiring that will make previous creations, collections, and storage of data look trivial. Big…
Data, Mining, and Analytics: Components of Strategic Decision Making ties together big data, data mining, and analytics to explain how readers can leverage them to extract valuable insights from their data. FacilitatiCoding Theory and Cryptography: The Essentials, Second Edition (Chapman & Hall/CRC Pure and Applied Mathematics)
Par D. C. Hankerson, Gary Hoffman, D. A. Leonard, Charles C. Lindner, K. T. Phelps, C. A. Rodger, J. R. Wall. 2000
Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a…
popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students with only a basic background in mathematics offerin