Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Spatio-temporal networks (STN)are spatial networks whose topology and/or attributes change with time. Designing a STN database would require the development of data models, query languages, and indexing methods to efficiently represent, query, store, and manage time-variant properties of the network.
This brief also investigates the spatial distribution of sensor nodes and basic scalable estimation algorithms, the consensus-based estimation capability for a class of relay assisted sensor networks with asymmetric communication topology, and the problem of filter design for mobile target tracking over WSNs.
This Springer Brief presents a comprehensive survey of the existing methodologies of background subtraction methods. This well-known methodology has applications in moving object detection from video captured with a stationery camera, separating foreground and background objects and object classification and recognition.
However, the variety of data that could be considered for surveillance is immense, ranging from sensor-measured values to collected counts and information extracted from natural language documents.Denecke's objective is to introduce the multiple possibilities and facets of surveillance and its applications.
This text provides a survey of the latest research into the Hough transform for line detection and its contemporary developments.
This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms.Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration.
RFID (radio frequency identification) tags are becoming ubiquitously available in object tracking, access control, and toll payment. The current application model treats tags simply as ID carriers and deals with each tag individually for the purpose of identifying the object that the tag is attached to.
Fast Compact Algorithms and Software for Spline Smoothing investigates algorithmic alternatives for computing cubic smoothing splines when the amount of smoothing is determined automatically by minimizing the generalized cross-validation score.
While written with practitioners and students entering the field of clinical informatics in mind, the book eschews technical terminology and is easily accessible by the lay reader not proficient in clinical medicine or information technology.
This book introduces the statistical software R to the image processing community in an intuitive and practical manner. Those who are new to the field of image processing and to R software will find this work a useful introduction.
Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.
Daylight is a dynamic source of illumination in architectural space, creating diverse and ephemeral configurations of light and shadow within the built environment.
Pedestrian Protection Systems (PPSs) are on-board systems aimed at detecting and tracking people in the surroundings of a vehicle in order to avoid potentially dangerous situations.
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems.
Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree.
For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.
This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy.
This SpringerBrief reviews the existing market-oriented strategies for economically managing resource allocation in distributed systems. The second scheme targets a free-trade resource market, studying the interactions amongst multiple rational resource traders.
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects.
This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO).
Dimensionality reduction has proven useful in a wide range of problem domains and so this book will be applicable to anyone with a solid grounding in statistics and computer science seeking to apply spectral dimensionality to their work.
This brief provides methods for harnessing Twitter data to discover solutions to complex inquiries. The text gives examples of Twitter data with real-world examples, the present challenges and complexities of building visual analytic tools, and the best strategies to address these issues.
This work offers insights into ways to integrate new technologies into the field of design, and from a broader standpoint it also looks ahead, raising further questions and looking to the near future as to what additional technologies might cause further disruptions to 3D design as well as wonderful creative opportunities.
Variational Regularization of 3D Data provides an introduction to variational methods for data modelling and its application in computer vision.
The reliable detection of low-level image structures is an old and still challenging problem in computer vision. This book leads a detailed tour through the LSD algorithm, a line segment detector designed to be fully automatic.
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. Security for Multi-hop Wireless Networks demonstrates recent research that enhances the efficiency and safety of these key networks.
This book elucidates the principles of agile risk management and describes how these relate to individual projects. It also proposes an agile risk-management process derived from classical risk management but adapted to the circumstances of agile projects.
The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP and In ARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3 and Telnet.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.