Udvidet returret til d. 31. januar 2025

Bøger i SpringerBriefs in Computer Science serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - Improving Communication and Memory Accesses
    af Eduardo H. M. Cruz, Matthias Diener & Philippe O. A. Navaux
    560,95 kr.

    This book presents a study on how thread and data mapping techniques can be used to improve the performance of multi-core architectures.It describes how the memory hierarchy introduces non-uniform memory access, and how mapping can be used to reduce the memory access latency in current hardware architectures.On the software side, this book describes the characteristics present in parallel applications that are used by mapping techniques to improve memory access.Several state-of-the-art methods are analyzed, and the benefits and drawbacks of each one are identified.

  • af Pedro Mejia Alvarez
    508,95 kr.

    This book presents the fundamentals of exception handling with examples written in C++ and Python. Starting with its history and evolution, it explores the many facets of exception handling, such as its syntax, semantics, challenges, best practices, and implementation patterns.The book is composed of five chapters: Chapter 1 provides an introduction, covering the history, various definitions, and challenges of exception handling. Chapter 2 then delves into the basics, offering insights into the foundational concepts and techniques. Subsequently, chapter 3 touches upon the best practices for exception handling, including the differences between errors and exceptions, the use of assertions, and how to provide meaningful error messages. Chapter 4 takes a deep dive into advanced exception-handling techniques, exploring e.g. patterns, guard clauses, and hierarchical exception handling. Eventually, chapter 5 focuses on the complexities of exception handling in real-time and embedded systems.This book is mainly written for both students and professionals. Its readers will understand the nuances between syntax and semantic errors, learn how to employ try-catch blocks effectively, grasp the importance of logging exceptions, and delve into advanced exception-handling techniques. This way, they will be enabled to handle exceptions effectively and thus write more robust, reliable, and resilient code.

  • af Adriano Veloso & Wagner Meira Jr.
    557,95 kr.

    The ultimate goal of machines is to help humans to solve problems. Such problems range between two extremes: structured problems for which the solution is totally defined (and thus are easily programmed by humans), and random problems for which the solution is completely undefined (and thus cannot be programmed).

  • af Rodrigo C. Barros, Alex A. Freitas & Andre C.P.L.F de Carvalho
    762,95 kr.

  • - The Amazon Rainforest study case
    af Viviane Todt, Thiago Nunes Kehl, Mauricio Roberto Veronez & mfl.
    631,95 kr.

    The foremost aim of the present study was the development of a tool to detect daily deforestation in the Amazon rainforest, using satellite images from the MODIS/TERRA sensor and Artificial Neural Networks.

  • - with an Illustration from the Railway Safety Domain
    af Stefan Gruner
    571,95 kr.

    This book focuses on the clarification of what actually a handbook is, the systematic identification of what ought to be considered as ¿settled knowledge¿ (extracted from historic repositories) for inclusion into such a handbook, and the ¿assembly¿ of such identified knowledge into a form which is fit for the purpose and conforms to the formal characteristics of handbooks as a ¿literary genre¿. For many newly emerging domains or disciplines, for which no handbook with normative authority has yet been defined, the question arises of how to do this systematically and in a non-arbitrary manner. This book is the first to reflect upon the question of how to construct a desktop handbook. It is demonstrated how concept analysis can be used for identifying settled knowledge as the key ingredient by utilizing the assembled data for classification; a presentation scheme for handbook articles is developed and demonstrated to be suitable. The sketched approachis then illustrated by an example from the railway safety domain. Finally, the limitations of the presented methods are discussed. The key contribution of this book is the (example illustrated) construction method itself, not the handbook, which would result from a highly detailed and thoroughly comprehensive application of the method.

  • - Sensing, Communication and Computation
    af Deze Zeng
    571,95 kr.

    This book introduces the software defined system concept, architecture, and its enabling technologies such as software defined sensor networks (SDSN), software defined radio, cloud/fog radio access networks (C/F-RAN), software defined networking (SDN), network function virtualization (NFV), software defined storage, virtualization and docker.

  • af Tingting Yang
    571,95 kr.

    This book shares valuable insights into high-efficiency data transmission scheduling and into a group intelligent search and rescue approach for artificial intelligence (AI)-powered maritime networks.

  • - Methods for Controllability and Observability Analysis, and Optimal Sensor Placement
    af Daniel Leitold
    571,95 kr.

    This book explores the key idea that the dynamical properties of complex systems can be determined by effectively calculating specific structural features using network science-based analysis.

  •  
    571,95 kr.

    This book provides the readers with retrospective and prospective views with detailed explanations of component technologies, speech recognition, language translation and speech synthesis.Speech-to-speech translation system (S2S) enables to break language barriers, i.e., communicate each other between any pair of person on the glove, which is one of extreme dreams of humankind.People, society, and economy connected by S2S will demonstrate explosive growth without exception.In 1986, Japan initiated basic research of S2S, then the idea spread world-wide and were explored deeply by researchers during three decades.Now, we see S2S application on smartphone/tablet around the world.Computational resources such as processors, memories, wireless communication accelerate this computation-intensive systems and accumulation of digital data of speech and language encourage recent approaches based on machine learning.Through field experiments after long research in laboratories, S2S systems are being well-developed and now ready to utilized in daily life.Unique chapter of this book is end-2-end evaluation by comparing system's performance and human competence. The effectiveness of the system would be understood by the score of this evaluation.The book will end with one of the next focus of S2S will be technology of simultaneous interpretation for lecture, broadcast news and so on.

  • af Xin Wei
    571,95 kr.

    This SpringerBrief discusses the most recent research in the field of multimedia QoE evaluation, with a focus on how to evaluate subjective multimedia QoE problems from objective techniques.

  • af Hassan Ugail
    571,95 kr.

    By way of applications, they discuss how genuine and non-genuine smiles can be inferred, how gender is encoded in a smile and how it is possible to use the dynamics of a smile itself as a biometric feature.It is often said that the face is a window to the soul.

  • af Grigori Sidorov
    571,95 kr.

    dfgds

  • af Serghei Mangul
    439,95 kr.

    Advances in RNA-sequencing (RNA-seq) technologies have provided an unprecedented opportunity to explore the gene expression landscape across individuals, tissues, and environments by efficiently profiling the RNA sequences present in the samples. When a reference genome sequence or a transcriptome of the sample is available, mapping-based RNA-seq analysis protocols align the RNA-seq reads to the reference sequences, identify novel transcripts, and quantify the abundance of expressed transcripts.The reads that fail to map to the human reference, known as unmapped reads, are a large and often overlooked output of standard RNA-seq analyses. Even in carefully executed experiments, the unmapped reads can comprise a considerable fraction of the complete set of reads produced, and can arise due to technical sequencing produced by low-quality and error-prone copies of the nascent RNA sequence being sampled. Reads can also remain unmapped due to unknown transcripts, recombined B and T cell receptor sequences, A-to-G mismatches from A-to-I RNA editing, trans-splicing, gene fusion, circular RNAs, and the presence of non-host RNA sequences (e.g. bacterial, fungal, and viral organisms). Unmapped reads represent a rich resource for the study of B and T cell receptor repertoires and the human microbiome system-without incurring the expense of additional targeted sequencing.This book introduces and describes the Read Origin Protocol (ROP), a tool that identifies the origin of both mapped and unmapped reads. The protocol first identifies human reads using a standard high-throughput algorithm to map them onto a reference genome and transcriptome. After alignment, reads are grouped into genomic (e.g. CDS, UTRs, introns) and repetitive (e.g. SINEs, LINEs, LTRs) categories. The rest of the ROP protocol characterizes the remaining unmapped reads, which failed to map to the human reference sequences.

  • - A Practitioner's Approach
    af Sarah Ahmed & Tayyaba Azim
    471,95 kr.

    This book shows machine learning enthusiasts and practitioners how to get the best of both worlds by deriving Fisher kernels from deep learning models.

  • af Michael R. Lyu, Irwin King & Shenglin Zhao
    560,95 kr.

    This book systematically introduces Point-of-interest (POI) recommendations in Location-based Social Networks (LBSNs). Lastly, the book discusses future research directions in this area. This book is intended for professionals involved in POI recommendation and graduate students working on problems related to location-based services.

  • af Feng Xia & Azizur Rahim
    643,95 kr.

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS).

  • - A Brief Introduction
    af Jie Hu & Kun Yang
    630,95 kr.

    It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band.

  • - Principles, Methods and Applications
    af Miles Hansard, Seungkyu Lee, Ouk Choi & mfl.
    700,95 kr.

    Time-of-flight (TOF) cameras provide a depth value at each pixel, from which the 3D structure of the scene can be estimated. It is already possible to use multiple TOF cameras, in order to increase the scene coverage, and to combine the depth data with images from several colour cameras.

  • af Akka Zemmari
    667,95 kr.

    This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine learning.

  • - from DNA to Artificial Intelligence
    af Mario Alemi
    282,95 kr.

    This Open Access book will explore questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and ΓÇônowΓÇô connected human societies? Physicists have good models for describing the evolution of the universe since the Big Bang, but can we apply the same concepts to the evolution of aggregated matter ΓÇôliving matter included? The Amazing Journey analyzes the latest results in chemistry, biology, neuroscience, anthropology and sociology under the light of the evolution of intelligence, seen as the ability of processing information. The main strength of this book is using just two concepts used in physics ΓÇôinformation and energyΓÇô to explain: The emergence and evolution of life: procaryotes, eukaryotes and complex organismsThe emergence and evolution of the brainThe emergence and evolution of societies (human and not)Possible evolution of our "internet society" and the role that Artificial Intelligence is playing

  • af Yi Li
    571,95 kr.

    This book presents a comprehensive review of heterogeneous face analysis and synthesis, ranging from the theoretical and technical foundations to various hot and emerging applications, such as cosmetic transfer, cross-spectral hallucination and face rotation.

  • af Arindam Chaudhuri
    571,95 kr.

    This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.

  • - Principles and Applications
    af Zhi Jin & Lili Mou
    619,95 kr.

    This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.

  • - Principles, Challenges, and a Survey of Solutions
    af Arthur Francisco Lorenzon
    571,95 kr.

  • - The uber eXtensible Micro-Hypervisor Framework
    af Amit Vasudevan
    555,95 kr.

    This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence.

  • - Algorithms, Techniques, and Datasets
    af Oge Marques, Branka Stojanovic & Aleksandar Neskovic
    552,95 kr.

    This Springerbrief presents an overview of problems and technologies behind segmentation and separation of overlapped latent fingerprints, which are two fundamental steps in the context of fingerprint matching systems.

  • - Related Technologies, Challenges and Future Prospects
    af Min Chen, Shiwen Mao, Yin Zhang & mfl.
    651,95 kr.

    This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.

  • - A Concise and Practical Introduction
    af Joakim Kavrestad
    608,95 kr.

  • af Bin Fan, Zhenhua Wang & Fuchao Wu
    650,95 kr.

    This book covers a wide range of local image descriptors, from the classical ones to the state of the art, as well as the burgeoning research topics on this area.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.