- Table View
- List View
Guide to Computer Network Security
by Joseph Migga KizzaWith the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before. This comprehensive and authoritative "Guide to Computer Network Security" exposes the various security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this much-anticipated new edition embraces a broader view of computer networks that encompasses new agile mobile systems and social networks. The book broadly surveys thought-provoking security issues, discussing and raising questions about the impact of new technologies and protocols. Topics and features: provides supporting material for lecturers and students at an associated website, including syllabus suggestions, an instructor s manual, slides, solutions, and laboratory materials; includes both quickly-workable questions and more thought-provoking advanced exercises at the end of each chapter; devotes an entire chapter to laboratory exercises, offering both weekly and semester-long assignments, and hard open research projects; surveys known security threats, and discusses flaws and vulnerabilities in computer network infrastructures and protocols; reviews existing best practices, proposes practical and efficient solutions to security issues, and encourages readers to investigate alternative possible approaches; explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security; examines the impact of developments in virtualization, cloud computing, and mobile systems, which have extended the boundaries of the traditional computer network. This unique text/reference is an essential instructional and research tool for undergraduates in computer science and engineering. It is also a valuable reference for practitioners involved in computer networks, data security, and information-intensive areas. "
Guide to Computer Network Security (Computer Communications and Networks)
by Joseph Migga KizzaThis fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike. Features: introduces the fundamentals of traditional computer networks and the security threats they face; discusses the security challenges introduced by virtualization software, cloud computing and mobile systems; examines the security quagmire presented by the home computing environment; raises important legislative, legal, social, technical and ethical security issues, including the tension between the needs of individual privacy and collective security; provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to lab exercises; supplies additional support material for instructors at an associated website.
Guide to Computer Network Security (Texts in Computer Science)
by Joseph Migga KizzaThis timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.Topics and features:Explores the full range of security risks and vulnerabilities in all connected digital systemsInspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systemsRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityDescribes the fundamentals of traditional computer network security, and common threats to securityReviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systemsDiscusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchainPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestionsThis important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.
Guide to Computer Network Security (Texts in Computer Science)
by Joseph Migga KizzaThis timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations.Topics and features:Explores the range of risks and vulnerabilities in all connected digital systemsPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsDescribes the fundamentals of traditional computer network security, and common threats to securityDiscusses the role and challenges of artificial intelligence in advancing the security of computing systems’ algorithms, protocols, and best practicesRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestionsThis important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.
Guide to Computing Fundamentals in Cyber-Physical Systems
by Dietmar P. F. MöllerThis book presents an in-depth review of the state of the art ofcyber-physical systems (CPS) and their applications. Relevant case studies arealso provided, to help the reader to master the interdisciplinary material. Features: includes self-testexercises in each chapter, together with a glossary; offers a variety of teachingsupport materials at an associated website, including a comprehensive set ofslides and lecture videos; presents a brief overview of the study of systems,and embedded computing systems, before defining CPS; introduces the concepts ofthe Internet of Things, and ubiquitous (or pervasive) computing; reviews thedesign challenges of CPS, and their impact on systems and software engineering;describes the ideas behind Industry 4. 0 and the revolutions in digitalmanufacturing, including smart and agile manufacturing, as well ascybersecurity in manufacturing; considers the social impact of the changes inskills required by the globalized, digital work environment of the future.
Guide to Computing for Expressive Music Performance
by Eduardo R. Miranda Alexis KirkeThis book discusses all aspects of computing for expressive performance, from the history of CSEMPs to the very latest research, in addition to discussing the fundamental ideas, and key issues and directions for future research. Topics and features: includes review questions at the end of each chapter; presents a survey of systems for real-time interactive control of automatic expressive music performance, including simulated conducting systems; examines two systems in detail, YQX and IMAP, each providing an example of a very different approach; introduces techniques for synthesizing expressive non-piano performances; addresses the challenges found in polyphonic music expression, from a statistical modelling point of view; discusses the automated analysis of musical structure, and the evaluation of CSEMPs; describes the emerging field of embodied expressive musical performance, devoted to building robots that can expressively perform music with traditional instruments.
Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices (Advances in Information Security #103)
by Dietmar P.F. MöllerIn today’s digital transformation environments, a rigorous cybersecurity approach to effective risk management — including contingency planning, outlining immediate actions, preparing post-breach responses — is central to defending organizations’ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals.Topics and features:Explores cybersecurity’s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networksProvides numerous examples of applications and best practicesConsiders methods that organizations can use to assess their cybersecurity awareness and/or strategyDescribes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate dataAddresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacksDiscusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity StandardGathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity.Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.
Guide to Data Privacy: Models, Technologies, Solutions (Undergraduate Topics in Computer Science)
by Vicenç TorraData privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement—among other models—differential privacy, k-anonymity, and secure multiparty computation.Topics and features:Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications)Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for usersOffers characterization of privacy models, comparing their differences, advantages, and disadvantagesDescribes some of the most relevant algorithms to implement privacy modelsIncludes examples of data protection mechanismsThis unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview.Vicenç Torra is Professor with the Department of Computing Science at Umeå University, Umeå, Sweden.
Guide to Deep Learning Basics: Logical, Historical and Philosophical Perspectives
by Sandro SkansiThis stimulating text/reference presents a philosophical exploration of the conceptual foundations of deep learning, presenting enlightening perspectives that encompass such diverse disciplines as computer science, mathematics, logic, psychology, and cognitive science. The text also highlights select topics from the fascinating history of this exciting field, including the pioneering work of Rudolf Carnap, Warren McCulloch, Walter Pitts, Bulcsú László, and Geoffrey Hinton.Topics and features:Provides a brief history of mathematical logic, and discusses the critical role of philosophy, psychology, and neuroscience in the history of AIPresents a philosophical case for the use of fuzzy logic approaches in AIInvestigates the similarities and differences between the Word2vec word embedding algorithm, and the ideas of Wittgenstein and Firth on linguisticsExamines how developments in machine learning provide insights into the philosophical challenge of justifying inductive inferencesDebates, with reference to philosophical anthropology, whether an advanced general artificial intelligence might be considered as a living beingInvestigates the issue of computational complexity through deep-learning strategies for understanding AI-complete problems and developing strong AIExplores philosophical questions at the intersection of AI and transhumanismThis inspirational volume will rekindle a passion for deep learning in those already experienced in coding and studying this discipline, and provide a philosophical big-picture perspective for those new to the field.
Guide to Differential Privacy Modifications: A Taxonomy of Variants and Extensions (SpringerBriefs in Computer Science)
by Balázs Pejó Damien DesfontainesShortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified.These categories act like dimensions: Variants from the same category cannot be combined, but variants from different categories can be combined to form new definitions. We also establish a partial ordering of relative strength between these notions by summarizing existing results. Furthermore, we list which of these definitions satisfy some desirable properties, like composition, post-processing, and convexity by either providing a novel proof or collecting existing ones.
Guide to Digital Forensics
by Joakim KävrestadThis work introduces the reader to the world of digital forensics in a practical and accessible manner. The text was written to fulfill a need for a book that introduces forensic methodology and sound forensic thinking, combined with hands-on examples for common tasks in a computer forensic examination. The author has several years of experience as a computer forensics examiner and is now working as a university-level lecturer. Guide to Digital Forensics: A Concise and Practical Introduction is intended for students that are looking for an introduction to computer forensics and can also be used as a collection of instructions for practitioners. The aim is to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector. Upon reading this book, the reader should have a proper overview of the field of digital forensics, starting them on the journey of becoming a computer forensics expert.
Guide to Digital Innovation in the Cultural and Creative Industry (SAGE Works)
by Yong Xiang Sunghan Ryu Weimin ZhangThe digital age has brought significant changes to the cultural and creative industries, making it challenging to keep up with the latest trends. The Guide to Digital Innovation in the Cultural and Creative Industry is an informative resource that can help you navigate the revolution. It not only provides a comprehensive understanding of how digital transformation affects existing industries but also outlines emerging business opportunities. Whether you′re an experienced professional or a beginner, this book is an essential resource that will equip you with the knowledge and tools you need to succeed in the rapidly evolving landscape of the cultural and creative industries. Dive into: Democratizing creation: Discover how digital tools break down barriers and empower creators of all levels. From platforms to possibilities: Explore online video streaming, ebook publishing, virtual museums, and more, witnessing the rise of innovative business models. Cutting-edge tech, boundless potential: Delve into AI, blockchain, VR/AR, and other emerging technologies, understanding how they reshape content production, distribution, and consumption. Case studies that examine real-world scenarios, from the digital subscriptions of the New York Times to music consumption in the Spotify era.
Guide to Digital Innovation in the Cultural and Creative Industry (SAGE Works)
by Yong Xiang Sunghan Ryu Weimin ZhangThe digital age has brought significant changes to the cultural and creative industries, making it challenging to keep up with the latest trends. The Guide to Digital Innovation in the Cultural and Creative Industry is an informative resource that can help you navigate the revolution. It not only provides a comprehensive understanding of how digital transformation affects existing industries but also outlines emerging business opportunities. Whether you′re an experienced professional or a beginner, this book is an essential resource that will equip you with the knowledge and tools you need to succeed in the rapidly evolving landscape of the cultural and creative industries. Dive into: Democratizing creation: Discover how digital tools break down barriers and empower creators of all levels. From platforms to possibilities: Explore online video streaming, ebook publishing, virtual museums, and more, witnessing the rise of innovative business models. Cutting-edge tech, boundless potential: Delve into AI, blockchain, VR/AR, and other emerging technologies, understanding how they reshape content production, distribution, and consumption. Case studies that examine real-world scenarios, from the digital subscriptions of the New York Times to music consumption in the Spotify era.
Guide to Disaster-Resilient Communication Networks (Computer Communications and Networks)
by Jacek Rak David HutchisonThis authoritative volume presents a comprehensive guide to the evaluation and design of networked systems with improved disaster resilience. The text offers enlightening perspectives on issues relating to all major failure scenarios, including natural disasters, disruptions caused by adverse weather conditions, massive technology-related failures, and malicious human activities.Topics and features: describes methods and models for the analysis and evaluation of disaster-resilient communication networks; examines techniques for the design and enhancement of disaster-resilient systems; provides a range of schemes and algorithms for resilient systems; reviews various advanced topics relating to resilient communication systems; presents insights from an international selection of more than 100 expert researchers working across the academic, industrial, and governmental sectors.This practically-focused monograph, providing invaluable support on topics of resilient networking equipment and software, is an essential reference for network professionals including network and networked systems operators, networking equipment vendors, providers of essential services, and regulators. The work can also serve as a supplementary textbook for graduate and PhD courses on networked systems resilience.
Guide to Discrete Mathematics: An Accessible Introduction to the History, Theory, Logic and Applications (Texts in Computer Science)
by Gerard O'ReganThis stimulating textbook presents a broad and accessible guide to the fundamentals of discrete mathematics, highlighting how the techniques may be applied to various exciting areas in computing. The text is designed to motivate and inspire the reader, encouraging further study in this important skill. Features: This book provides an introduction to the building blocks of discrete mathematics, including sets, relations and functions; describes the basics of number theory, the techniques of induction and recursion, and the applications of mathematical sequences, series, permutations, and combinations; presents the essentials of algebra; explains the fundamentals of automata theory, matrices, graph theory, cryptography, coding theory, language theory, and the concepts of computability and decidability; reviews the history of logic, discussing propositional and predicate logic, as well as advanced topics such as the nature of theorem proving; examines the field of software engineering, including software reliability and dependability and describes formal methods; investigates probability and statistics and presents an overview of operations research and financial mathematics.
Guide to Distributed Algorithms: Design, Analysis and Implementation Using Python (Undergraduate Topics in Computer Science)
by K. ErciyesThe study of distributed algorithms provides the needed background in many real-life applications, such as: distributed real-time systems, wireless sensor networks, mobile ad hoc networks and distributed databases. The main goal of Guide to Distributed Algorithms is to provide a detailed study of the design and analysis methods of distributed algorithms and to supply the implementations of most of the presented algorithms in Python language, which is the unique feature of the book not found in any other contemporary books on distributed computing. Topics and features: Presents comprehensive design methods for distributed algorithms Provides detailed analysis for the algorithms presented Uses graph templates to demonstrate the working of algorithms Provides working Python code for most of the algorithms presented This unique textbook/study manual can serve as a comprehensive manual of distributed algorithms for Computer Science and non-CS majors as well as practitioners of distributed algorithms in research projects.
Guide to Distributed Simulation with HLA
by Okan Topçu Halit OğuztüzünThis invaluable textbook/reference provides a hands-on guide to the application of good software development practices to the construction of distributed simulation systems, with a particular focus on High Level Architecture (HLA). Emphasizing a learning-by-doing approach supported by examples, the text offers practical advice on real-world development issues for all engineers and programmers entering the field.Topics and features: explains how to rapidly develop an HLA federation, offering an implemented sample for each service area of the HLA federate interface specification; describes this implementation using the freely available software tools SimGe and RACoN; provides numerous step-by-step examples, code snippets, and case studies, as well as links to downloadable sample source code; uses the Microsoft .NET platform and the C# programming language in all examples and case studies; includes review questions throughout the book for further study; examines not only federate application development, but also object model construction; discusses the employment of HLA in multi-agent simulations.Providing an accessible introduction and all-in-one resource for HLA-based distributed simulation development, this book is an essential guide for students and practitioners training in distributed simulation and distributed interactive simulation.
Guide to Dynamic Simulations of Rigid Bodies and Particle Systems
by Murilo G. CoutinhoThis book introduces the techniques needed to produce realistic simulations and animations of particle and rigid-body systems. The text focuses on both the theoretical and practical aspects of developing and implementing physically based dynamic-simulation engines. Each chapter examines numerous algorithms, describing their design and analysis in an accessible manner, without sacrificing depth of coverage or mathematical rigor. Features: examines the problem of computing an hierarchical representation of the geometric description of each simulated object, as well as the simulated world; discusses the use of discrete and continuous collision detection to handle thin or fast-moving objects; describes the computational techniques needed for determining all impulsive and contact forces between bodies with multiple simultaneous collisions and contacts; presents techniques that can be used to dynamically simulate articulated rigid bodies; concludes each chapter with exercises.
Guide to Efficient Software Design: An MVC Approach to Concepts, Structures, and Models (Texts in Computer Science)
by David P. VoorheesThis classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These concepts are then applied to a case study, and reinforced through practice exercises, with the option to follow either a structured design or object-oriented design paradigm. The text applies an incremental and iterative software development approach, emphasizing the use of design characteristics and modeling techniques as a way to represent higher levels of design abstraction, and promoting the model-view-controller (MVC) architecture.Topics and features: provides a case study to illustrate the various concepts discussed throughout the book, offering an in-depth look at the pros and cons of different software designs; includes discussion questions and hands-on exercises that extend the case study and apply the concepts to other problem domains; presents a review of program design fundamentals to reinforce understanding of the basic concepts; focuses on a bottom-up approach to describing software design concepts; introduces the characteristics of a good software design, emphasizing the model-view-controller as an underlying architectural principle; describes software design from both object-oriented and structured perspectives; examines additional topics on human-computer interaction design, quality assurance, secure design, design patterns, and persistent data storage design; discusses design concepts that may be applied to many types of software development projects; suggests a template for a software design document, and offers ideas for further learning.Students of computer science and software engineering will find this textbook to be indispensable for advanced undergraduate courses on programming and software design. Prior background knowledge and experience of programming is required, but familiarity in software design is not assumed.
Guide to Electricity and Magnetism: Using Mathematica for Calculations and Visualizations
by James W. RohlfThis is a “how to guide” for a calculus-based introductory course in electricity and magnetism. Students taking the subject at an intermediate or advanced level may also find it to be a useful reference. The calculations are performed in Mathematica, and stress graphical visualization, units, and numerical answers. The techniques show the student how to learn the physics without being hung up on the math. There is a continuing movement to introduce more advanced computational methods into lower-level physics courses. Mathematica is a unique tool in that code is written as "human readable" much like one writes a traditional equation on the board.Key Features: Concise summary of the physics concepts. Over 300 worked examples in Mathematica. Tutorial to allow a beginner to produce fast results. The companion code for this book can be found here: https://physics.bu.edu/~rohlf/code.html
Guide to FPGA Implementation of Arithmetic Functions
by Enrique Cantó Gustavo D. Sutter Jean-Pierre DeschampsThis book is designed both for FPGA users interested in developing new, specific components - generally for reducing execution times -and IP core designers interested in extending their catalog of specific components. The main focus is circuit synthesis and the discussion shows, for example, how a given algorithm executing some complex function can be translated to a synthesizable circuit description, as well as which are the best choices the designer can make to reduce the circuit cost, latency, or power consumption. This is not a book on algorithms. It is a book that shows how to translate efficiently an algorithm to a circuit, using techniques such as parallelism, pipeline, loop unrolling, and others. Numerous examples of FPGA implementation are described throughout this book and the circuits are modeled in VHDL. Complete and synthesizable source files are available for download.
Guide to Flow-Aware Networking
by Jerzy Domżał Robert Wójcik Andrzej JajszczykThis book provides a practical guide to flow-aware networking (FAN), one of the most promising new quality-of-service architectures for the Future Internet. The latest concepts are examined in detail, including coverage of approximate flow-aware networking. The scope and evolution of the debate on network neutrality is also discussed. Topics and features: provides a broad survey of flow-oriented approaches and solutions based on the concept of flows; presents a range of mechanisms for improving transmission performance of streaming flows under congestion; illustrates how problems caused by congestion may be solved in a multilayer environment, proposing new methods for enhancing transmission in wired-wireless FAN; analyzes aspects of fair transmission in FAN, reviewing algorithms that improve transmission of streaming flows during network failures; describes the implementation aspects of the cross-protect router; concludes each chapter with review questions, with answers provided at the end of the book.
Guide to Flow-Aware Networking: Challenges and Opportunities (Computer Communications and Networks #0)
by Jerzy Domżał Robert Wójcik Andrzej JajszczykThe book presents a comprehensive view on Flow-Aware Networking. It starts with a brief overview of the known QoS architectures based on the concept of a flow. Then, the original FAN concept is presented, along with its variations proposed by the authors. The next chapter covers a very valuable feature of the FAN architecture, namely its ability to assure net neutrality. The chapters that follow will discuss, in detail, a variety of issues making the FAN concept implementable, including congestion control, fairness, resilience to failures, service differentiation and degradation. The final chapter presents the test implementation of the FAN router, including the environment used and performance tests. Chapters are supplemented with problems to solve, along with their solutions. The pedagogical character of the book is supported by a number of illustrative examples contained in most of the chapters. At the end of the book, a glossary of the key terms is included, along with a comprehensive bibliography.Flow-based traffic management is currently becoming a mainstream. There is plenty of Quality of Service (QoS) techniques based on flows. Software-Defined Networking with its dominant protocol OpenFlow also follows this trend. Flow-Aware Networking (FAN) is a promising QoS architecture. Information on FAN can be found in various research papers. It is, therefore highly scattered. This book gathers practically all relevant information regarding FAN and puts it together.Quality of Service assurance is one of the key challenges of today’s Internet. The existing approaches to provide QoS do not meet expectations of network operators, managers and users although numerous efforts in this area have been reported. One of the most promising concepts is the Flow-Aware Network (FAN). FAN can play a key role in assuring the net neutrality, smoothly combining interests of all the involved parties. The authors of the proposal have been involved in FAN research practically since its inception at the start of the 21st century. The book reports the wide experiences the authors accumulated in the subject area during the work on common FAN-related projects conducted with the team of James Roberts that proposed the original FAN concept as well as other leading research groups in Europe and the USA. One of the aims of the book is to accompany courses taught by the authors.
Guide to Framing Design Practice for UX (Synthesis Lectures on Human-Centered Informatics)
by John LongThe scope of the book is UX. It presents a comprehensive guide for readers to better engage with the framing of UX design practice. The guide characterises UX as a movement, whose members are developing shared ideas to specify and to implement HCI (Human-Computer Interaction) as UX. The book is based on the analysis of the conduct and reporting of framing UX design practice, contributed by experienced UX practitioners. It surveys the various means by which UX practitioners conduct and report their design practices. These include trial and error; implement, test, and specify; and implement, evaluate, and iterate. These practices apply UX frameworks, UX approaches, and UX methods and are typically reported in the form of UX case studies. The book differs from top-down, formal, and framework-driven approaches. In contrast, it takes a bottom-up, informal, and practice-driven approach. In a dynamic field such as UX, there is seldom time to stop and think about the wider issues associated with design practice and its related trends. But this book creates that opportunity for UX practitioners to locate and reflect on their design practice—what they are doing and why they are doing it. The guide creates a space in which UX practitioners are informed of current trends that they can incorporate into their own workflows. Readers benefiting from this book include those working in customer experience design, experience-centred design, and human experience design. It will also be of interest to undergraduate and graduate students trying to make sense of the different ways of conducting and reporting HCI as UX. Further, it provides grounding for young researchers making their way in the fast developing world of UX.
Guide to Geometric Algebra in Practice
by Leo Dorst Joan LasenbyThis highly practical Guide to Geometric Algebra in Practice reviews algebraic techniques for geometrical problems in computer science and engineering, and the relationships between them. The topics covered range from powerful new theoretical developments, to successful applications, and the development of new software and hardware tools. Topics and features: provides hands-on review exercises throughout the book, together with helpful chapter summaries; presents a concise introductory tutorial to conformal geometric algebra (CGA) in the appendices; examines the application of CGA for the description of rigid body motion, interpolation and tracking, and image processing; reviews the employment of GA in theorem proving and combinatorics; discusses the geometric algebra of lines, lower-dimensional algebras, and other alternatives to 5-dimensional CGA; proposes applications of coordinate-free methods of GA for differential geometry.