Vi bøger
Levering: 1 - 2 hverdage

Informationsteknologi: generelle emner

Her finder du spændende bøger om Informationsteknologi: generelle emner. Nedenfor er et flot udvalg af over 1.000 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Alok Kanojia
    298,95 kr.

    "When it comes to family rules around video games, most parents are at a loss. How much should I let them play? is always a parent's first question, but when their child becomes irritable, rude, or seemingly directionless, the question becomes more urgent: Help! How do I get them to be interested in anything else?! Known as 'Dr. K' to his millions of followers, the former Harvard Medical School instructor and founder of the unique gamer's support resource Healthy Gamer, Dr. Alok Kanojia has firsthand experience with video gaming and addiction: He needed professional help to break his own addiction in college, and his parents had very little guidance for how to help him. Written to fill the resource void that still exists, How to Raise a Healthy Gamer provides parents with critical information about gaming culture, how games affect developing brains, and solutions rooted in the science treating addiction, including: The neuroscientific and psychological reasons that children gravitate to video games and how addiction develops. Step-by-step guidelines for setting, enforcing, and troubleshooting healthy gaming boundaries. Essential strategies for reaching kids who have developed a serious gaming problem. Special chapters on behavioral issues that often accompany game use: ADHD, spectrum disorders, and substance abuse. Whether a parent's goal is to stop addiction or just promote healthy habits, How to Raise a Healthy Gamer will help them better understand, communicate with, and-ultimately-nurture their children"--

  • af Tillmann Vitt
    523,95 kr.

    Gegenstand der Arbeit ist der Informationsfluss und die damit verbundene Frage nach dem Schutz von Geschäftsgeheimnissen bei Tarifverhandlungen. Exemplarisch werden anhand der Verhandlung eines Sanierungstarifvertrags potentielle Restriktionen der Informationsweitergabe an Gewerkschaft und Arbeitgeberverband untersucht. Dabei wird die Due Diligence bei Unternehmenskäufen als Referenzmaterie herangezogen. Es wird beleuchtet, ob die dort geltenden Weitergabebeschränkungen übertragbar sind. Die Arbeit widmet sich zudem der Frage, wie Arbeitgeberverband und Gewerkschaft mit den offengelegten Informationen umgehen müssen. Sind die Sozialpartner dazu verpflichtet, besondere organisatorische Sicherungsmaßnahmen zur Gewährleistung der Vertraulichkeit zu ergreifen?

  • af Joseph Migga Kizza
    630,95 kr.

  • af Paulo Cortez, John Macintyre, Ilias Maglogiannis & mfl.
    1.424,95 - 2.033,95 kr.

  • af Douglas E Harding
    273,95 - 383,95 kr.

  • af Rene Glavanovits
    1.163,95 kr.

    Your guide to end-to-end SAP development is here! From the database to the user interface, you'll learn what it takes to create applications as a full stack developer. See how to use SAPUI5, OData, CDS, TypeScript, and SAP Fiori elements in your applications. Get detailed, step-by-step instructions for working with OData V4 and V2, including developing applications using the ABAP RESTful application programming model and creating projects in Transaction SEGW. Extend and deploy your applications-then you're ready to go! Highlights include:1) SAPUI52) SAP Fiori elements3) OData V4 and OData V24) Core data services (CDS)5) TypeScript6) SAP Cloud Application Programming Model7) ABAP RESTful application programming model8) Transaction SEGW9) User interface development10) Flexible programming model11) Extensibility12) Deployment

  • af Nell Watson
    146,95 - 598,95 kr.

  • af Martin Georg Houlberg Jensen
    128,95 - 133,95 kr.

  • af Manal Helal
    364,50 kr.

    Tensorised deep learning models compress large models using fewer parameters that are easier to express and explain the models' performance. To use and participate in the current state-of-the-art research of multi-way analysis using tensor structures and algebra, a foundation in some mathematical concepts using examples and visualisations is required. This book covers the link from theoretical foundations to example applications in machine learning and deep neural network models. Plenty of Python libraries and application examples are referenced and explained to make it easier for newcomers in the field. All required prerequisites are referenced for a deeper foundation from scratch.

  • af C. Miya
    308,95 kr.

    The Internet of Things (IoT) enables autonomous, predictive, and real-time sensing and monitoring of things without human intervention. As connected devices have proliferated, so has the need to transmit and receive data, consolidate and evaluate it, and respond to events. IoT solutions connect machines, sensors, and control systems to speed up contemporary industrial manufacturing. Its Predictive Maintenance, Statistical Evaluation, and Measuring may increase system reliability.IoT links and organizes a wide network of devices and intelligent entities, enabling real-time communication between physical things through any Internet-connected network or service. Smart objects identify, communicate, and make choices, accessing data from other items. The Internet is still strong because it links individuals to actual objects and enables them to communicate in real time.The evolution of IoT began with landline phones, radios, and TVs, which were one-way experiences. The 1980s saw the development of Atari and Commodore home computers and IBM PCs, which improved the efficiency of machines in connecting to the outside world. However, slow dial-up rates and infrastructure made connecting a new concept.A smart object network may employ embedded sensors and actuators to observe, feel, record, share, and react to various types of data. The concept of IoT has evolved since 2009, with the goal of reducing waste, loss, and costs by allowing computers to know everything there is to know about things.

  • af Collective Author
    558,95 kr.

    The AI book deals with different subjects from the perspective of different disciplines and sciences.Chapter I It talks about AI applications and their role in management and in the quality of decision-making by increasing the efficiency of the performance of enterprises and business organizations. Chapter II dealt with the use of artificial intelligence in the field of literature and the importance of artificial intelligence in promoting the study of literary texts and creative writing. Chapter III speaks of AI technologies and their contribution to tourism marketing through read and broadcast media in the visual and audiovisual naughty. Chapter IV addressed the use of a new method of predicting ARMAX models using neural networks, comparing the proposed methods and the Box-Jenkins method.Chapter V focused on raising and enriching the debate on the concept of smart libraries in the age of knowledge and their location in the library system in light of the automated information and technology revolution, while Chapter VII is about monitoring and monitoring the technology of artificial intelligence in libraries and its employment in technical processes...

  • af Haifeng Luo
    863,95 kr.

    Sixth-generation (6G) wireless communication networks will transform connected things in 5G into connected intelligence. The networks can have human-like cognition capabilities by enabling many potential services, such as high-accuracy localization and tracking, augmented human sense, gesture and activity recognition, etc. For this purpose, many emerging applications in 6G have stringent requirements on transmission throughput and latency. With the explosion of devices in the connected intelligence world, spectrum utilization has to be enhanced to meet these stringent requirements. In-band full-duplex has been reported as a promising technique to enhance spectral efficiency and reduce end-to-end latency. However, simultaneous transmission and reception over the same frequency introduce additional interference compared to conventional half-duplex radios. The receiver is exposed to the transmitter of the same node operating in in-band full-duplex mode, causing self-interference. Due to the significant power difference between self-interference and the signal of interest, self-interference must be effectively suppressed to benefit from in-band full-duplex operation. In addition to self-interference, uplink users will interfere with downlink users within the range, known as co-channel interference. This interference could be significant in cellular networks, so it has to be appropriately processed to maximize the in-band full-duplex gain. The objective of this monograph is to present a timely overview of self-interference cancellation techniques and discuss the challenges and possible solutions to implement effective self-interference cancellation in 6G networks. Also included is beamforming to manage the complex interference and maximize the in-band full-duplex gain in cellular networks. Furthermore, a deep insight into the benefits of in-band full-duplex operations on various emerging applications is presented, such as integrated access and backhaul networks, integrated sensing and communications, and physical layer security.

  • af Anthony L Moore
    108,95 kr.

  • af Janet M. Cramer, Carlnita P. Greene & Lynn M. Walters
    663,95 - 1.797,95 kr.

  • af Shailesh Patil
    783,95 kr.

    Optimize your warehousing by integrating EWM in SAP S/4HANA! Walk through step-by-step instructions to configure integration points between EWM and production planning, transportation, and quality management. Connect to and exchange data with different logistics processes, from yard management to plant maintenance. This complete integration guide has everything you need to set up cross-functional warehouse management!Highlights include:1) Outbound and inbound processes2) Master data3) Production planning4) Quality management5) Transportation management6) Advanced shipping and receiving7) Warehouse automation systems8) Plant maintenance 9) SAP Dock Appointment Scheduling10) SAP Yard Logistics11) SAP Environment, Health, and Safety Management12) SAP Advanced Track and Trace for Pharmaceuticals

  • af Basawaraj Patil
    1.033,95 kr.

    Preparing for your extended warehouse management (EWM) exam? Make the grade with this C_S4EWM certification study guide! From inbound and outbound processing to shipping and receiving, this guide will review the key technical and functional knowledge you need to pass the test. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to C_S4EWM certification begins here! In this book, you'll learn about:a. The TestTo pass your certification exam, you need the right study materials. This guide provides comprehensive preparation for the exam, so deepen your knowledge of EWM and walk through topics new to C_S4EWM. b. Core ContentReview major subject areas like warehouse master data, labor management, and exception handling. Then master important terminology and key takeaways for each subject. c. Q&AAfter reviewing each chapter, solidify your knowledge with questions and answers for each section to improve your test-taking skills.Highlights include: 1) Exam C_S4EWM2) Master data3) Inbound and outbound processing4) Production integration5) Kitting6) Labor management7) Exception handling8) Batch management9) Storage control10) Physical inventory11) Replenishment12) Shipping and receiving

  • af Weizhi Meng
    1.230,95 - 1.239,95 kr.

    This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.

  • af Avishalom Tor
    2.206,95 kr.

    This book pursues the questions from a broad range of law and economics perspectives. Digital transformation leads to economic and social change, bringing with it both opportunities and risks. This raises questions of the extent to which existent legal frameworks are still sufficient and whether there is a need for new or additional regulation in the affected areas: new demands are made on the law and jurisprudence.

  • af Maddel M Manisha
    368,95 kr.

    "Security Management System of Cyber Cafes" is a comprehensive and practical guide that outlines effective strategies and best practices for ensuring the security of cyber cafes. Written by industry experts and cybersecurity professionals, this book serves as a valuable resource for cyber cafe owners, managers, and IT administrators seeking to establish robust security measures and safeguard their customers' digital experiences.In this book, the authors address the unique security challenges faced by cyber cafes, where numerous individuals access public computer terminals and shared networks. They provide a step-by-step approach to implementing a comprehensive security management system that encompasses various aspects of cyber cafe security, including network protection, user authentication, data privacy, content filtering, and incident response.Key topics covered in this book include:Introduction to cyber cafes: The authors provide an overview of cyber cafes, their services, and their importance in providing internet access to the public. They discuss the evolving landscape of cyber threats and the need for robust security measures to protect customers' privacy and prevent malicious activities.Risk assessment and security planning: The book guides cyber cafe owners and managers in conducting a thorough risk assessment to identify potential vulnerabilities and security gaps. It offers practical insights into creating a customized security plan tailored to the specific needs of the cyber cafe environment.Network security: The authors delve into network security considerations, addressing topics such as secure Wi-Fi deployment, firewall configuration, intrusion detection and prevention systems, and network segmentation. They emphasize the importance of protecting the cyber cafe's network infrastructure from unauthorized access and external threats.User authentication and access control: The book explores various methods of user authentication and access control, including password policies, multi-factor authentication, and biometric solutions. It highlights the significance of implementing strong authentication measures to prevent unauthorized access to the cyber cafe's resources.Data privacy and protection: The authors discuss strategies for protecting customer data and ensuring privacy within the cyber cafe environment. They cover topics such as data encryption, secure data storage, and compliance with data protection regulations, guiding cyber cafe owners in establishing robust data privacy practices.Content filtering and parental controls: The book addresses the importance of content filtering and parental control mechanisms in cyber cafes. It explores techniques for blocking access to inappropriate or harmful content, protecting minors, and ensuring a safe browsing environment for all customers.Incident response and incident handling: The authors provide guidelines for establishing an effective incident response plan and implementing incident handling procedures. They discuss incident detection, analysis, containment, and recovery, enabling cyber cafe staff to respond promptly and effectively to security incidents.Training and awareness: The book emphasizes the significance of training cyber cafe staff and raising customer awareness about security best practices. It offers guidance on conducting security awareness programs, educating employees and customers about potential risks, and promoting responsible online behavior.Throughout the book, the authors provide practical tips, case studies, and checklists to assist cyber cafe owners and managers in implementing a comprehensive security management system.

  • af Poornachandran Prabaharan
    348,95 kr.

    "Scalable Framework for Cyber Threat Situational Awareness" is a comprehensive and practical guide that explores the development and implementation of a scalable framework for achieving effective cyber threat situational awareness. Authored by cybersecurity experts and researchers, this book serves as a valuable resource for security professionals, analysts, and decision-makers seeking to enhance their understanding of cyber threats and improve their response capabilities.In this book, the authors address the critical need for organizations to establish robust situational awareness capabilities to detect, analyze, and respond to cyber threats in real-time. They present a scalable framework that integrates various data sources, analysis techniques, and visualization tools to provide a holistic view of the evolving threat landscape.Key topics covered in this book include:Introduction to cyber threat situational awareness: The authors provide an overview of the concept of cyber threat situational awareness, its importance in modern cybersecurity, and the challenges faced in achieving comprehensive awareness in dynamic and complex environments.Scalable framework architecture: The book presents the architecture of a scalable framework for cyber threat situational awareness. It covers the integration of diverse data sources, including network logs, intrusion detection systems, threat intelligence feeds, and user behavior data. The authors discuss the design principles and components necessary for building a scalable and adaptable framework.Data collection and aggregation: The authors delve into the process of collecting and aggregating data from various sources within the organization and external feeds. They explore techniques for data normalization, filtering, and enrichment to ensure the availability of high-quality data for analysis.Threat detection and analysis: The book covers advanced analytics techniques and algorithms for detecting and analyzing cyber threats. It explores anomaly detection, machine learning, and behavioral analysis approaches to identify patterns, indicators, and potential threats within the data.Visualization and reporting: The authors discuss visualization tools and techniques for presenting cyber threat information in a meaningful and intuitive manner. They highlight the importance of visualizing complex data to aid in decision-making, incident response, and collaboration among security teams.Incident response and mitigation: The book explores strategies for incident response and mitigation based on the insights gained from the cyber threat situational awareness framework. It covers incident triage, prioritization, and response coordination to ensure timely and effective actions against identified threats.Scalability and adaptability: The authors address the scalability and adaptability considerations of the framework, enabling organizations to handle large volumes of data, accommodate evolving threats, and integrate new data sources and analysis techniques.Integration with existing security systems: The book provides guidance on integrating the cyber threat situational awareness framework with existing security systems, such as security information and event management (SIEM) platforms, intrusion detection systems (IDS), and security orchestration, automation, and response (SOAR) tools.Emerging trends and future directions: The authors discuss emerging trends and technologies in cyber threat situational awareness, including threat intelligence sharing, collaborative defense, and leveraging artificial intelligence (AI) and machine learning (ML) for automated threat analysis.

  • af Marc Aubreville
    719,95 kr.

    This book constitutes two challenges that were held in conjunction with the 25th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2022, which took place in Singapore during September 18-22, 2022. The peer-reviewed 20 long and 5 short papers included in this volume stem from the following three biomedical image analysis challenges: Mitosis Domain Generalization Challenge (MIDOG 2022), Diabetic Retinopathy Analysis Challenge (CRAC 2022)The challenges share the need for developing and fairly evaluating algorithms that increase accuracy, reproducibility and efficiency of automated image analysis in clinically relevant applications.

  • af Marco Forestier
    338,95 kr.

    Entdecken Sie die faszinierende Welt von Daten als Service (DaaS) mit diesem umfassenden und praxisorientierten Buch. Daten sind in der heutigen digitalen Ära zu einer wertvollen Ressource geworden, und Unternehmen stehen vor der Herausforderung, diese Daten effektiv zu nutzen. Genau hier setzt DaaS an und bietet eine innovative Lösung.Dieses Buch führt Sie Schritt für Schritt in das Thema ein und vermittelt Ihnen ein tiefgreifendes Verständnis von DaaS und seinen vielfältigen Anwendungsbereichen. Sie werden die Grundlagen von DaaS kennenlernen, die verschiedenen Modelle und Plattformen erkunden und wertvolle Einblicke in die Zukunftsaussichten dieses aufstrebenden Feldes erhalten.Darüber hinaus werden Sie einen detaillierten Einblick in führende Unternehmen und Plattformen erhalten, die DaaS-Lösungen anbieten. Amazon Web Services (AWS), Google Cloud, Microsoft Azure, IBM und Salesforce sind nur einige der Unternehmen, die in diesem Buch vorgestellt werden. Sie werden deren Angebote, Funktionen und Nutzen für Unternehmen kennenlernen.Ein weiterer wichtiger Aspekt, der in diesem Buch behandelt wird, sind die rechtlichen Aspekte von DaaS. Sie werden verstehen, wie der europäische Datenschutz mit DaaS in Einklang gebracht wird und welche Nutzungsrechte Kunden haben.Egal, ob Sie ein Datenexperte, ein Unternehmer oder einfach nur an den Möglichkeiten von DaaS interessiert sind, dieses Buch wird Ihnen das notwendige Wissen vermitteln, um die Potenziale von Daten als Service optimal auszuschöpfen. Es ist eine unverzichtbare Lektüre für alle, die in der datengetriebenen Welt erfolgreich sein wollen. Tauchen Sie ein in die Welt von DaaS und nutzen Sie die Chancen, die dieses aufregende Feld bietet.

  • af Thomas Zoglauer
    569,95 kr.

    The increase in fake news, the growing influence on elections, increasing false reports and targeted disinformation campaigns are not least a consequence of advancing digitalisation. Information technology is needed to put a stop to these undesirable developments. With intelligent algorithms and refined data analysis, fakes must be detected more quickly in the future and their spread prevented. However, in order to meaningfully recognize and filter fakes by means of artificial intelligence, it must be possible to distinguish fakes from facts, facts from fictions, and fictions from fakes. This book therefore also asks questions about the distinctions of fake, factual and fictional. The underlying theories of truth are discussed, and practical-technical ways of differentiating truth from falsity are outlined. By considering the fictional as well as the assumption that information-technical further development can profit from humanities knowledge, the authors hope that content-related, technical and methodological challenges of the present and future can be overcome.

  • af David Poyer
    268,95 kr.

    Creative writing is in a state of rapid evolution. Understanding what's changing and what will remain foundational is the key to success or failure for prospective authors. Drawing on David Poyer's nearly half century in writing, publishing, and teaching, Writing in the Age of AI updates experienced writers and introduces beginners to the effect new digital tools will have on both the mechanics and the process of writing successful novels, short stories, novellas, and nonfiction works such as memoirs. It also answers such questions as, Where do ideas come from? How can an author plan a novel or nonfiction book? What's the best way to avoid writer's block? How does the editing process work? How can AI be incorporated in the writing process? What sales tools will help one get published? The book covers both traditional and emergent means of writing and editing. Finally, it addresses the most effective ways forward for a career as a published author, teacher, or editor. Whether you're a seasoned pro or just starting out, Writing in the Age of AI is an essential resource for anyone who wants to succeed.

  • af Aditya Iyengar
    398,95 kr.

    Discover the secrets of building high-performing and scalable web applications with clean code using Elixir's metaprogrammingPurchase of the print or Kindle book includes a free PDF eBookKey Features:Explore the various web servers available to build robust web applicationsLeverage Elixir's powerful Plug module to build a request-response pipelineExplore advanced techniques of Elixir to create Domain-Specific languages and build scalable, maintainable web productsBook Description:Elixir's functional nature and metaprogramming capabilities make it an ideal language for building web frameworks, with Phoenix being the most ubiquitous framework in the Elixir ecosystem and a popular choice for companies seeking scalable web-based products. With an ever-increasing demand for Elixir engineers, developers can accelerate their careers by learning Elixir and the Phoenix web framework.With Build Your Own Web Framework in Elixir, you'll start by exploring the fundamental concepts of web development using Elixir. You'll learn how to build a robust web server and create a router to direct incoming requests to the correct controller. Then, you'll learn to dispatch requests to controllers to respond with clean, semantic HTML, and explore the power of Domain-Specific Languages (DSL) and metaprogramming in Elixir. You'll develop a deep understanding of Elixir's unique syntax and semantics, allowing you to optimize your code for performance and maintainability. Finally, you'll discover how to effectively test each component of your application for accuracy and performance.By the end of this book, you'll have a thorough understanding of how Elixir components are implemented within Phoenix, and how to leverage its powerful features to build robust web applications.What You Will Learn:Get a comprehensive understanding of the Phoenix framework built on ElixirUse metaprogramming to optimize your Elixir code and create high-performance web applicationsExplore web development fundamentals including the principles of HTTP and HTMLEmploy Elixir's templating engine to dispatch requests to a controller and respond with dynamically generated HTMLImprove the scalability and responsiveness of your web server by using OTP constructsStreamline your routing logic using error handlingWho this book is for:This book is for web developers seeking to deepen their understanding of Elixir's role in the Phoenix framework. Basic familiarity with Elixir is a must.

  • af Farzin Asadi
    386,95 kr.

    Learn to use the Arduino boards to do big jobs in a simple way. This book is full of real-world examples for Arduino enthusiasts of all experience levels. All of the examples in this book use Arduino UNO, which is an excellent option for educational purposes. You'll start with an introduction to Arduino and see firsthand how its free multi-platform integrated development environment (IDE) makes coding easier. In many cases, you can edit the given codes to solve your own problems. ¿Arduino boards use a variety of microcontrollers and each board is suitable for a specific application. The Arduino IDE is also preloaded with a broad library of codes that you can modify and practice with. So instead of coding from scratch you can adjust the codes for similar projects. More experienced users will save time by simply copying nuggets of code from the various libraries.You'll also learn about digital input/output (I/O), analog-to-digital and digital-to-analog converters, LCDs and EEPROM. The book then moves on to serial communication, mathematical functions, and pulse width modulation (PWM), all important features when encoding in telecommunications. Finally, you'll see how to control different types of motors, review interrupts, internal comparators, and timers, and read different sensors with Arduino.What You Will LearnTurn on/off a device using a relayGenerate analog/digital outputRead an analog/digital inputControl motors with a parallel virtual machine (PVM) and serial communicationDisplay text with LCDsRead sensors with Arduino and use the interruptsWrite more efficient codes with interrupts and timersWho This Book Is ForEngineering (electrical/computer/biomedical/robotic/mechatronics/aerospace) and science (math/physic/chemistry) students, makers, and hobbyists. Being familiar with a programming language (especially C) is an advantage, however, it is not necessary.

  • af Ashraf Said Ahmad AlMadhoun
    373,95 kr.

    Open up the exciting world of electronics with 3D circuit designing tools and create your own fresh new projects. With this quick guide yoüll use high-quality graphical programs to create, modify, and update circuits in an interactive, virtual environment that can also be used in the real world. Follow along with the tutorials and get the chance to play with electronics safely before getting your hands dirty. In just a few minutes, yoüll start creating your first circuit. Yoüll focus more on how the components layout together than on worrying about design to get started. Watch as different electronic components receive different signals and test them in different situations and circuit conditions first before moving on to real-life testing. When yoüre ready, yoüll work with real breadboards and microcontrollers, such as the Arduino, to bring your simulated circuits and projects to life. Once you have your circuit put together, work with basic Arduino programming to give it purpose and make it respond to your commands. By the end of the book you'll have mastered the basics of both circuit design and programming. What You'll LearnEngineer electrical equipment for little to no costMeasure different electrical signals, such as voltage, temperature, light, and moreProgram Arduinos to work with your new circuitsWho This Book Is ForStudents and hobbyists interested in electrical engineering and programming who want to dive into experimentation virtually before working with real-world circuits.

  • af Maya Patel
    398,95 - 458,95 kr.

  • af Sebastian Bruch
    968,95 kr.

    Information retrieval researchers develop algorithmic solutions to hard problems and insist on a proper, multifaceted evaluation of ideas. As we move towards even more complex deep learning models in a wide range of applications, questions on efficiency once again resurface with renewed urgency. Efficiency is no longer limited to time and space but has found new, challenging dimensions that stretch to resource-, sample- and energy-efficiency with ramifications for researchers, users, and the environment. This monograph takes a step towards promoting the study of efficiency in the era of neural information retrieval by offering a comprehensive survey of the literature on efficiency and effectiveness in ranking and retrieval. It is inspired by the parallels that exist between the challenges in neural network-based ranking solutions and their predecessors, decision forest-based learning-to-rank models, and the connections between the solutions the literature to date has to offer. By understanding the fundamentals underpinning these algorithmic and data structure solutions one can better identify future directions and more efficiently determine the merits of ideas.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.