Browse Results

Showing 10,851 through 10,875 of 53,647 results

Computer and Information Science 2021 - Fall (Studies in Computational Intelligence #1003)

by Roger Lee

This edited book presents scientific results of the 21th IEEE/ACIS International Fall Virtual Conference on Computer and Information Science (ICIS 2021-Fall) held on October 13-15, 2021, in Xi’an China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications, and tools) of computer and information science and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 13 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

Computer and Information Science 2021—Summer (Studies in Computational Intelligence #985)

by Roger Lee

This edited book presents scientific results of the 20th IEEE/ACIS International Summer Semi-Virtual Conference on Computer and Information Science (ICIS 2021) held on June 23–25, 2021 in Shanghai, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 13 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

Computer and Information Science and Engineering: Volume 16 (Studies in Computational Intelligence #1156)

by Roger Lee

This book reports state-of-the-art results in Computer Information Science and Engineering in both printed and electronic form. Studies in Computation Intelligence (SCI) has grown into the most comprehensive computational intelligence research forum available in the world.

Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings (Communications in Computer and Information Science #659)

by Erol Gelenbe Ricardo Lent Tadeusz Czachórski Krzysztof Grochla

A main theme of the conference (held October-November 1988) was the application of artificial intelligence techniques in a variety of problem domains to build knowledge-based systems. Applications covered include education, medicine, image processing, pattern recognition, decision support, and simul

Computer and Information Sciences: Proceedings Of The 25th International Symposium On Computer And Information Sciences (Lecture Notes In Electrical Engineering #62)

by Ricardo Lent Krzysztof Grochla Erol Gelenbe Tadeusz Czachórski

This book constitutes the refereed proceedings of the 32nd International Symposium on Computer and Information Sciences, ISCIS 2018, held in Poznan, Poland, in September 2018.The 29 revised full papers presented were carefully reviewed and selected from 64 submissions. The papers are dealing with the following topics: smart algorithms; data classification and processing; stochastic modelling; performance evaluation; queuing systems; wireless networks and security; image processing and computer vision.

Computer and Information Sciences II: 26th International Symposium on Computer and Information Sciences

by Erol Gelenbe Ricardo Lent Georgia Sakellari

Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.

Computer and Information Security Handbook

by John R. Vacca

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics.

Computer and Network Security Essentials

by Kevin Daimi

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers.

Computer Animation and Social Agents: 33rd International Conference on Computer Animation and Social Agents, CASA 2020, Bournemouth, UK, October 13-15, 2020, Proceedings (Communications in Computer and Information Science #1300)

by Feng Tian Xiaosong Yang Daniel Thalmann Weiwei Xu Jian Jun Zhang Nadia Magnenat Thalmann Jian Chang

This book constitutes the revised selected papers of the 33rd International Conference on Computer Animation and Social Agents, CASA 2020, held in Bournemouth, UK*, in October 2020.The 1 full paper and 13 short papers presented were carefully reviewed and selected from a total of 86 submissions. The papers are organized in topical sections of modelling, animation and simulation; virtual reality; image processing and computer vision.*The conference was held virtually due to the COVID-19 pandemic.

Computer Animation (Kaleidoscope)

by Darcy Lockman

Explains how computer animation is used to make entire films, indicates how it differs from traditional animation, and includes information on the development of that technology.

Computer Applications: 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part I (Communications in Computer and Information Science #1959)

by Min Zhang Bin Xu Fuyuan Hu Junyu Lin Xianhua Song Zeguang Lu

The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer Applications, CCF NCCA 2023, held in Suzhou, China, during July 16–20, 2023.The 39 revised full papers presented in these proceedings were carefully reviewed and selected from 197 submissions. The papers are organized in the following topical sections:Volume I:Artificial intelligence and application.Volume II:Data science and technology; pattern recognition and machine learning; network communication and security; frontier and comprehensive applications.

Computer Applications: 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part II (Communications in Computer and Information Science #1960)

by Min Zhang Bin Xu Fuyuan Hu Junyu Lin Xianhua Song Zeguang Lu

The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer Applications, CCF NCCA 2023, held in Suzhou, China, during July 16–20, 2023.The 39 revised full papers presented in these proceedings were carefully reviewed and selected from 197 submissions. The papers are organized in the following topical sections:Volume I:Artificial intelligence and application.Volume II:Data science and technology; pattern recognition and machine learning; network communication and security; frontier and comprehensive applications.

Computer Applications for Business: Step-by-step Exercises and Applications

by Iris Blanc

Computer Applications for Business will introduce you to word processing, spreadsheet, database and desktop presentation concepts through sequential practice material. Most of the exercises relate to computers. Consequently, while you are doing the exercises, you are also learning about computers. The exercises proceed from basic to intermediate level. Since this book is generic, it may be used with any software or computer. There are five chapters in this book: 1. Word Processing, 2. Spreadsheet, 3. Database, 4. Integration, and 5. Desktop Publishing.

Computer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation (Law, Governance and Technology Series #5)

by Ephraim Nissan

This book provides an overview of computer techniques and tools -- especially from artificial intelligence (AI) -- for handling legal evidence, police intelligence, crime analysis or detection, and forensic testing, with a sustained discussion of methods for the modelling of reasoning and forming an opinion about the evidence, methods for the modelling of argumentation, and computational approaches to dealing with legal, or any, narratives. By the 2000s, the modelling of reasoning on legal evidence has emerged as a significant area within the well-established field of AI & Law. An overview such as this one has never been attempted before. It offers a panoramic view of topics, techniques and tools. It is more than a survey, as topic after topic, the reader can get a closer view of approaches and techniques. One aim is to introduce practitioners of AI to the modelling legal evidence. Another aim is to introduce legal professionals, as well as the more technically oriented among law enforcement professionals, or researchers in police science, to information technology resources from which their own respective field stands to benefit. Computer scientists must not blunder into design choices resulting in tools objectionable for legal professionals, so it is important to be aware of ongoing controversies. A survey is provided of argumentation tools or methods for reasoning about the evidence. Another class of tools considered here is intended to assist in organisational aspects of managing of the evidence. Moreover, tools appropriate for crime detection, intelligence, and investigation include tools based on link analysis and data mining. Concepts and techniques are introduced, along with case studies. So are areas in the forensic sciences. Special chapters are devoted to VIRTOPSY (a procedure for legal medicine) and FLINTS (a tool for the police). This is both an introductory book (possibly a textbook), and a reference for specialists from various quarters.

Computer Applications in Engineering and Management (Chapman & Hall/Distributed Computing and Intelligent Data Analytics Series)

by Parveen Berwal

The book Computer Applications in Engineering and Management is about computer applications in management, electrical engineering, electronics engineering, and civil engineering. It covers the software tools for office automation, introduces the basic concepts of database management, and provides an overview about the concepts of data communication, internet, and e-commerce. Additionally, the book explains the principles of computing management used in construction of buildings in civil engineering and the role of computers in power grid automation in electronics engineering. Features Provides an insight to prospective research and application areas related to industry and technology Includes industry-based inputs Provides a hands-on approach for readers of the book to practice and assimilate learning This book is primarily aimed at undergraduates and graduates in computer science, information technology, civil engineering, electronics and electrical engineering, management, academicians, and research scholars.

Computer Architecture

by Gérard Blanchet Bertrand Dupouy

This book lays out the concepts necessary to understand how a computer works.For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choice helps to show how techniques, concepts and performances have evolved since the first computers.The book is divided into five parts. The first four, which are of increasing difficulty, are the core of the book: "Elements of a Basic Architecture", "Programming Model and Operation", "Memory Hierarchy", "Parallelism and Performance Enhancement". The final part provides hints and solutions to the exercises in the book as well as appendices. The reader may approach each part independently based on their prior knowledge and goals.

Computer Architecture: Fundamentals and Principles of Computer Design

by Joseph D. Dumas II

Future computing professionals must become familiar with historical computer architectures because many of the same or similar techniques are still being used and may persist well into the future. Computer Architecture: Fundamentals and Principles of Computer Design discusses the fundamental principles of computer design and performance enhancement that have proven effective and demonstrates how current trends in architecture and implementation rely on these principles while expanding upon them or applying them in new ways. Rather than focusing on a particular type of machine, this textbook explains concepts and techniques via examples drawn from various architectures and implementations. When necessary, the author creates simplified examples that clearly explain architectural and implementation features used across many computing platforms. Following an introduction that discusses the difference between architecture and implementation and how they relate, the next four chapters cover the architecture of traditional, single-processor systems that are still, after 60 years, the most widely used computing machines. The final two chapters explore approaches to adopt when single-processor systems do not reach desired levels of performance or are not suited for intended applications. Topics include parallel systems, major classifications of architectures, and characteristics of unconventional systems of the past, present, and future.This textbook provides students with a thorough grounding in what constitutes high performance and how to measure it, as well as a full familiarity in the fundamentals needed to make systems perform better. This knowledge enables them to understand and evaluate the many new systems they will encounter throughout their professional careers.

Computer Architecture: Fundamentals and Principles of Computer Design, Second Edition

by Joseph D. Dumas II

Not only does almost everyone in the civilized world use a personal computer, smartphone, and/or tablet on a daily basis to communicate with others and access information, but virtually every other modern appliance, vehicle, or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile, for example, without several computers on board to do everything from monitoring exhaust emissions, to operating the anti-lock brakes, to telling the transmission when to shift, and so on. Appliances such as clothes washers and dryers, microwave ovens, refrigerators, etc. are almost all digitally controlled. Gaming consoles like Xbox, PlayStation, and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere, even when we don’t see them as such, and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture, and suitable for use in an undergraduate CS, EE, or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course, the reader should be familiar with computer programming concepts in at least one language such as C, C++, or Java. Previous courses in operating systems, assembly language, and/or systems programming would be helpful, but are not essential.

Computer Architecture

by Charles Fox

Not since the 1980s has computer architecture been so exciting! This book captures the moment, mining the history of computing to teach key concepts in modern hardware design and introduce the neural and quantum architectures of the future.Computer Architecture is an in-depth exploration of the principles and designs that have shaped computer hardware through the ages, from counting devices like the abacus, to Babbage&’s Difference Engine, to modern GPUs and the frontiers of quantum computing.This engaging blend of history, theory, hands-on exercises, and real-world examples is sure to make for an insightful romp through a fast-changing world. You won&’t just read about computer architecture, you&’ll also gain the understanding to touch, build, and program it. You&’ll explore the basic structures of a CPU by learning to program a Victorian Analytical Engine. You&’ll extend electronic machines to 8-bit and 16-bit retro gaming computers, learning to program a Commodore 64 and an Amiga. You&’ll delve into x86 and RISC-V architectures, cloud and supercomputers, and ideas for future technologies. You&’ll also learn:• How to represent data with different coding schemes and build digital logic gates • The basics of machine and assembly language programming• How pipelining, out-of-order execution, and parallelism work, in context• The power and promise of neural networks, DNA, photonics, and quantum computing Whether you&’re a student, a professional, or simply a tech enthusiast, after reading this book, you&’ll grasp the milestones of computer architecture and be able to engage directly with the technology that defines today&’s world. Prepare to be inspired, challenged, and above all, see and experience the digital world, hands-on.

Computer Architecture: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)

by John L. Hennessy David A. Patterson

Computer Architecture: A Quantitative Approach, Sixth Edition has been considered essential reading by instructors, students and practitioners of computer design for over 20 years. The sixth edition of this classic textbook from Hennessy and Patterson, winners of the 2017 ACM A.M. Turing Award recognizing contributions of lasting and major technical importance to the computing field, is fully revised with the latest developments in processor and system architecture. <p><p>The text now features examples from the RISC V (RISC Five) instruction set architecture, a modern RISC instruction set developed and designed to be a free and openly adoptable standard. It also includes a new chapter on domain specific architectures and an updated chapter on warehouse scale computing that features the first public information on Google's newest WSC.

Computer Architecture: Software Aspects, Coding, and Hardware (Telecommunications And Networking Library)

by John Y. Hsu

With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.The book features a "bottom up" computer design approach, based upon the author's thirty years experience in both academe and industry. By combining computer engineering with electrical engineering, the author describes how logic circuits are designed in a CPU. The extensive coverage of a micprogrammed CPU and new processor design features gives the insight of current computer development. Computer Architecture: Software Aspects, Coding, and Hardware presents a comprehensive review of the subject, from beginner to advanced levels. Topics include:o Two's complement numbers o Integer overflow o Exponent overflow and underflow o Looping o Addressing modes o Indexing o Subroutine linking o I/O structures o Memory mapped I/O o Cycle stealing o Interrupts o Multitasking o Microprogrammed CPU o Multiplication tree o Instruction queue o Multimedia instructions o Instruction cache o Virtual memory o Data cache o Alpha chip o Interprocessor communications o Branch prediction o Speculative loading o Register stack o JAVA virtual machine o Stack machine principles

Computer Architecture and Organization: Fundamentals and Architecture Security

by Shuangbao Paul Wang

In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author’s recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.

Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems (Wiley-hep Information Security Ser.)

by Shuangbao Paul Wang Robert S. Ledley

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates

Computer Arithmetic: Algorithms and Hardware Implementations

by Mircea Vlăduţiu

The subject of this book is the analysis and design of digital devices that implement computer arithmetic. The book's presentation of high-level detail, descriptions, formalisms and design principles means that it can support many research activities in this field, with an emphasis on bridging the gap between algorithm optimization and hardware implementation. The author provides a unified view linking the domains of digital design and arithmetic algorithms, based on original formalisms and hardware description languages. A feature of the book is the large number of examples and the implementation details provided. While the author does not avoid high-level details, providing for example gate-level designs for all matrix/combinational arithmetic structures. The book is suitable for researchers and students engaged with hardware design in computer science and engineering. A feature of the book is the large number of examples and the implementation details provided. While the author does not avoid high-level details, providing for example gate-level designs for all matrix/combinational arithmetic structures. The book is suitable for researchers and students engaged with hardware design in computer science and engineering.

Computer Arithmetic and Verilog HDL Fundamentals

by Joseph Cavanagh

<p>Verilog Hardware Description Language (HDL) is the state-of-the-art method for designing digital and computer systems. Ideally suited to describe both combinational and clocked sequential arithmetic circuits, Verilog facilitates a clear relationship between the language syntax and the physical hardware. It provides a very easy-to-learn and practical means to model a digital system at many levels of abstraction. <p>Computer Arithmetic and Verilog HDL Fundamentals details the steps needed to master computer arithmetic for fixed-point, decimal, and floating-point number representations for all primary operations. Silvaco International’s SILOS, the Verilog simulator used in these pages, is simple to understand, yet powerful enough for any application. It encourages users to quickly prototype and de-bug any logic function and enables single-stepping through the Verilog source code. It also presents drag-and-drop abilities. <p>Designed for electrical and computer engineers and computer scientists, this book leaves nothing unfinished, carrying design examples through to completion. The goal is practical proficiency. To this end, each chapter includes problems of varying complexity to be designed by the reader.</p>

Refine Search

Showing 10,851 through 10,875 of 53,647 results