Browse Results

Showing 57,576 through 57,600 of 61,674 results

Towards new e-Infrastructure and e-Services for Developing Countries: 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23–25, 2023, Proceedings, Part I (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #587)

by Oumarou Sie Rashid A. Saeed Abdoulaye Sere

The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on nternational Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023. The 59 full papers presented in these two volumes were carefully reviewed and selected from 72 submissions. The papers are organized in the following topical sections: Part I: Digital economy, Digital transformation, e-Government and e-services; ICT infrastructures for critical environmental conditions; Wireless networks; E-health; Cybersecurity and Privacy. Part II: Systems and cloud computing; Artificial Intelligence; Ontology and data preparation; Responsible Artificial Intelligence for Sustainable Development in Africa (workshop).

Towards new e-Infrastructure and e-Services for Developing Countries: 15th International Conference, AFRICOMM 2023, Bobo-Dioulasso, Burkina Faso, November 23–25, 2023, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #588)

by Oumarou Sie Rashid A. Saeed Abdoulaye Sere

The two-volume set LNICST 587 + 588 constitutes the refereed proceedings of the EAI 15th International Conference on Africa Internet infrastructure and Services, AFRICOMM 2023, which took place in Bobo-Dioulasso, Burkina Faso, in November 2023. The 59 full papers presented in these two volumes were carefully reviewed and selected from 72 submissions. The papers are organized in the following topical sections: Part I: Digital economy, Digital transformation, e-Government and e-services; ICT infrastructures for critical environmental conditions; Wireless networks; E-health; Cybersecurity and Privacy. Part II: Systems and cloud computing; Artificial Intelligence; Ontology, data preparation; Responsible Artificial Intelligence for Sustainable Development in Africa (workshop).

Towards the Automatization of Cranial Implant Design in Cranioplasty II: Second Challenge, AutoImplant 2021, Held in Conjunction with MICCAI 2021, Strasbourg, France, October 1, 2021, Proceedings (Lecture Notes in Computer Science #13123)

by Jan Egger Jianning Li

This book constitutes the Second Automatization of Cranial Implant Design in Cranioplasty Challenge, AutoImplant 2021, which was held in conjunction with the 24th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2021, in Strasbourg, France, in September, 2021. The challenge took place virtually due to the COVID-19 pandemic. The 7 papers are presented together with one invited paper, one qualitative evaluation criteria from neurosurgeons and a dataset descriptor. This challenge aims to provide more affordable, faster, and more patient-friendly solutions to the design and manufacturing of medical implants, including cranial implants, which is needed in order to repair a defective skull from a brain tumor surgery or trauma. The presented solutions can serve as a good benchmark for future publications regarding 3D volumetric shape learning and cranial implant design.

Towards the Automatization of Cranial Implant Design in Cranioplasty: First Challenge, AutoImplant 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 8, 2020, Proceedings (Lecture Notes in Computer Science #12439)

by Jan Egger Jianning Li

This book constitutes the First Automatization of Cranial Implant Design in Cranioplasty Challenge, AutoImplant 2020, which was held in conjunction with the 23rd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2020, in Lima, Peru, in October 2020. The challenge took place virtually due to the COVID-19 pandemic.The 10 papers presented together with one invited paper and a dataset descriptor in this volume were carefully reviewed and selected form numerous submissions. This challenge aims to provide more affordable, faster, and more patient-friendly solutions to the design and manufacturing of medical implants, including cranial implants, which is needed in order to repair a defective skull from a brain tumor surgery or trauma. The presented solutions can serve as a good benchmark for future publications regarding 3D volumetric shape learning and cranial implant design.

Towards the Integration of IoT, Cloud and Big Data: Services, Applications and Standards (Studies in Big Data #137)

by Pramod Kumar Anuradha Tomar Vinay Rishiwal Priyan Malarvizhi Kumar

This book discusses integration of internet of things (IoT), cloud computing, and big data. It presents a unique platform where IoT, cloud computing, and big data are fused together and can be foreseen as a perfect solution to many applications. Usually, IoT, cloud computing, and big data are researched separately on the basis of their properties, underlying technologies, and other open issues. Integration of IoT, cloud computing and big data is not that easy and can face key open issues like standardization of interfaces, power and energy efficiency in both data processing and transmission, security and privacy, storage mechanisms for future applications, scalability and flexibility, and QoS provisioning for end user applications. Integration of IoT, cloud computing, and big data represents the next big rise for future industry and business applications. This integration opens new exhilarating directions for research and it is discussed in this book.

Towards the Internet of Services: The THESEUS Research Program

by Wolfgang Wahlster Hans-Joachim Grallert Stefan Wess Hermann Friedrich Thomas Widenka

The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to smart products, smart services, and smart data, all adaptable to specific tasks, locations, situations, and contexts of smart spaces. Such tech­nologies allow us to describe, revise, and adapt the characteristics, functions, processes, and usage patterns of customization targets on the basis of machine-understandable content representation that enables auto­mated processing and information sharing between human and software agents. This book explains the principal achievements of the Theseus research program, one of the central pro­grams in the German government's Digital 2015 initiative and its High-Tech Strategy 2020. The methods, toolsets, and standards for semantic technologies developed during this program form a solid basis for the fourth industrial revolution (Industrie 4. 0), the hybrid service economy, and the transformation of big data into useful smart data for the emerging data economy. The contributing authors are leading scientists and engineers, representing world-class academic and in­dustrial research teams, and the ideas, technologies, and representative use cases they describe in the book derive from results in multidisciplinary fields, such as the Internet of Services; the Semantic Web, and semantic technologies, knowledge management, and search; user interfaces, multimodal interaction, and visualization; machine learning and data mining; and business process support, manufacturing, automa­tion, medical systems, and integrated service engineering. The book will be of value to both researchers and practitioners in these domains.

Towards the Internet of Things: Architectures, Security, and Applications (EAI/Springer Innovations in Communication and Computing)

by Mohammad Ali Jabraeil Jamali Bahareh Bahrami Arash Heidari Parisa Allahverdizadeh Farhad Norouzi

This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming.Discusses ongoing research into the connection of the physical and virtual worlds;Includes the architecture, security, privacy, communications, and protocols of IoT;Presents a variety of case studies in IoT including wearables, smart cities, and energy management.

Towards the Multilingual Semantic Web

by Paul Buitelaar Philipp Cimiano

To date, the relation between multilingualism and the Semantic Web has not yet received enough attention in the research community. One major challenge for the Semantic Web community is to develop architectures, frameworks and systems that can help in overcoming national and language barriers, facilitating equal access to information produced in different cultures and languages. As such, this volume aims at documenting the state-of-the-art with regard to the vision of a Multilingual Semantic Web, in which semantic information will be accessible in and across multiple languages. The Multilingual Semantic Web as envisioned in this volume will support the following functionalities: (1) responding to information needs in any language with regard to semantically structured data available on the Semantic Web and Linked Open Data (LOD) cloud, (2) verbalizing and accessing semantically structured data, ontologies or other conceptualizations in multiple languages, (3) harmonizing, integrating, aggregating, comparing and repurposing semantically structured data across languages and (4) aligning and reconciling ontologies or other conceptualizations across languages. The volume is divided into three main sections: Principles, Methods and Applications. The section on "Principles" discusses models, architectures and methodologies that enrich the current Semantic Web architecture with features necessary to handle multiple languages. The section on "Methods" describes algorithms and approaches for solving key issues related to the construction of the Multilingual Semantic Web. The section on "Applications" describes the use of Multilingual Semantic Web based approaches in the context of several application domains. This volume is essential reading for all academic and industrial researchers who want to embark on this new research field at the intersection of various research topics, including the Semantic Web, Linked Data, natural language processing, computational linguistics, terminology and information retrieval. It will also be of great interest to practitioners who are interested in re-examining their existing infrastructure and methodologies for handling multiple languages in Web applications or information retrieval systems.

Towards Wireless Heterogeneity in 6G Networks

by Abraham George G. Ramana Murthy

The connected world paradigm effectuated through the proliferation of mobile devices, Internet of Things (IoT), and the metaverse will offer novel services in the coming years that need anytime, anywhere, high-speed access. The success of this paradigm will highly depend on the ability of the devices to always obtain the optimal network connectivity for an application and on the seamless mobility of the devices. This book will discuss 6G concepts and architectures to support next-generation applications such as IoT, multiband devices, and high-speed mobile applications. IoT applications put forth significant challenges on the network in terms of spectrum utilization, latency, energy efficiency, large number of users, and supporting different application characteristics in terms of reliability, data rate, and latency.While the 5G network developmentwas motivated by the need for larger bandwidth and higher quality of service (QoS), 6G considerations are supporting many users with a wide application requirement, lowering network operating cost, and enhanced network flexibility. Network generations beyond 5G are expected to accommodate massive number of devices with the proliferation of connected devices concept in connected cars, industrial automation, medical devices, and consumer devices.This book will address the fundamental design consideration for 6G networks and beyond. There are many technical challenges that need to be explored in the next generation of networks, such as increased spectrum utilization, lower latency, higher data rates, accommodating more users, heterogeneous wireless connectivity, distributed algorithms, and device-centric connectivity due to diversified mobile environments and IoT application characteristics. Since 6G is a multidisciplinary topic, this book will primarily focus on aspects of device characteristics, wireless heterogeneity, traffic engineering, device-centric connectivity, and smartness of application.

Trace-Based Post-Silicon Validation for VLSI Circuits

by Xiao Liu Qiang Xu

This book first provides a comprehensive coverage of state-of-the-art validation solutions based on real-time signal tracing to guarantee the correctness of VLSI circuits. The authors discuss several key challenges in post-silicon validation and provide automated solutions that are systematic and cost-effective. A series of automatic tracing solutions and innovative design for debug (DfD) techniques are described, including techniques for trace signal selection for enhancing visibility of functional errors, a multiplexed signal tracing strategy for improving functional error detection, a tracing solution for debugging electrical errors, an interconnection fabric for increasing data bandwidth and supporting multi-core debug, an interconnection fabric design and optimization technique to increase transfer flexibility and a DfD design and associated tracing solution for improving debug efficiency and expanding tracing window. The solutions presented in this book improve the validation quality of VLSI circuits, and ultimately enable the design and fabrication of reliable electronic devices.

Traceable Human Experiment Design Research: Theoretical Model and Practical Guide

by Nadine Mandran

The aim of this book is to describe the methodology of conducting the THEDRE research "Traceable Human Experiment Design Research". It applies to Research in Human Centered Informatics (RICH). These are areas of computer research that integrate users to build scientific knowledge and supporting tools for this research. As an example, we can mention the relevant fields such as Information Systems (IS), Human Machine Interfaces (HMI) Engineering, and Human Information Systems (HIA). The construction of this language and method is based on experiments conducted since 2008 in the field of RICH.

Traceback and Anonymity

by Xinyuan Wang Douglas Reeves

This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of the timing attacks on low-latency anonymous communication, and analyze the fundamental limitations of low-latency anonymous communication from the perspective of timing-based covert channel. Suitable for professionals and researchers, Traceback and Anonymity is a close look at a key aspect of cyber security studies. Advanced-level students interested in cyber security techniques or networking will also find the content valuable.

Tracing Your Family History on the Internet, Second Edition: A Guide for Family Historians (Tracing Your Ancestors Ser.)

by Chris Paton

This fully revised second edition of Chris Paton's best-selling guide is essential reading if you want to make effective use of the internet in your family history research. Every day new records and resources are placed online and new methods of sharing research and communicating across cyberspace become available, and his handbook is the perfect introduction to them. He has checked and updated all the links and other sources, added new ones, written a new introduction and substantially expanded the social networking section. Never before has it been so easy to research family history using the internet, but he demonstrates that researchers need to take a cautious approach to the information they gain from it. They need to ask, where did the original material come from and has it been accurately reproduced, why was it put online, what has been left out and what is still to come? As he leads the researcher through the multitude of resources that are now accessible online, he helps to answer these questions. He shows what the internet can and cannot do, and he warns against the various traps researchers can fall into along the way.As seen in Your Family Tree Magazine.

Tracing Your Irish Family History on the Internet, Second Edition: A Guide for Family Historians (Tracing Your Ancestors)

by Chris Paton

A simple, easy-to-use guide to tracing your Irish ancestry via the Internet. In this, the fully updated second edition of his best-selling guide to researching Irish history using the Internet, Chris Paton shows the extraordinary variety of sources that can now be accessed online. Although Ireland has lost many records that would have been of great interest to family historians, he demonstrates that a great deal of information survived and is now easily available to the researcher. Thanks to the pioneering efforts of the Public Record Office of Northern Ireland, the National Archives of Ireland, organizations such as FindmyPast Ireland, Ancestry.co.uk, and RootsIreland and the volunteer genealogical community, an ever-increasing range of Ireland&’s historical resources are accessible from afar. As well as exploring the various categories of records that the family historian can turn to, Chris Paton illustrates their use with fascinating case studies. He fully explores the online records available from both the north and the south from the earliest times to the present day. Many overseas collections are also included, and he looks at social networking in an Irish context where many exciting projects are currently underway. Paton&’s book is an essential introduction and reference for anyone who is keen to trace their Irish roots.

Tracing Your Scottish Family History on the Internet: A Guide for Family Historians (Tracing Your Ancestors)

by Chris Paton

From search engines and databases to DNA platforms, discover how to easily learn more about your Scottish ancestry online with this helpful guide.Scotland is a land with a proud and centuries long history that far predates its membership of Great Britain and the United Kingdom. Today in the 21st century it is also a land that has done much to make its historical records accessible, to help those with Caledonian ancestry trace their roots back to earlier times and a world long past.In Tracing Scottish Family History on the Internet, Chris Paton expertly guides the family historian through the many Scottish records offerings available, but also cautions the reader that not every record is online, providing detailed advice on how to use web based finding aids to locate further material across the country and beyond. He also examines social networking and the many DNA platforms that are currently further revolutionizing online Scottish research.From the Scottish Government websites offering access to our most important national records, to the holdings of local archives, libraries, family history societies, and online vendors, Chris Paton takes the reader across Scotland, from the Highlands and Islands, through the Central Belt and the Lowlands, and across the diaspora, to explore the various flavors of Scottishness that have bound us together as a nation for so long.

Tracing the Life Cycle of Ideas in the Humanities and Social Sciences: A Portrait Of A Discipline Through Analyses Of Scientific Literature (Quantitative Methods in the Humanities and Social Sciences)

by Arjuna Tuzzi

This book demonstrates how quantitative methods for text analysis can successfully combine with qualitative methods in the study of different disciplines of the Humanities and Social Sciences (HSS). The book focuses on learning about the evolution of ideas of HSS disciplines through a distant reading of the contents conveyed by scientific literature, in order to retrieve the most relevant topics being debated over time. Quantitative methods, statistical techniques and software packages are used to identify and study the main subject matters of a discipline from raw textual data, both in the past and today. The book also deals with the concept of quality of life of words and aims to foster a discussion about the life cycle of scientific ideas. Textual data retrieved from large corpora pose interesting challenges for any data analysis method and today represent a growing area of research in many fields. New problems emerge from the growing availability of large databases and new methods are needed to retrieve significant information from those large information sources. This book can be used to explain how quantitative methods can be part of the research instrumentation and the "toolbox" of scholars of Humanities and Social Sciences. The book contains numerous examples and a description of the main methods in use, with references to literature and available software. Most of the chapters of the book have been written in a non-technical language for HSS researchers without mathematical, computer or statistical backgrounds.

Track Changes: A Literary History of Word Processing

by Matthew G. Kirschenbaum

Writing in the digital age has been as messy as the inky rags in Gutenberg's shop or the molten lead of a Linotype machine. Matthew Kirschenbaum examines how creative authorship came to coexist with the computer revolution. Who were the early adopters, and what made others anxious? Was word processing just a better typewriter, or something more?

Track and Trace Management System for Dementia and Intellectual Disabilities (Advanced Technologies and Societal Change)

by Amit Kumar George Ghinea Suresh Merugu

This book reviews humanitarian literature and presents the development of low-cost track & trace management system integrated with accurate GPS location data pinging using Internet of Things (IoT). The first part relates to mobile device configuration with an embedded GPS and wireless Internet connection to transmit its current location. The second part presents web server implementation and development that receives the data, parses it, and stores it for access over the Internet. The third part discusses the user interface that allows one to visually identify the current location of the device.

Track-Before-Detect Using Expectation Maximisation

by Samuel J. Davey Han X. Gaetjens

This book offers a detailed description of the histogram probabilistic multi-hypothesis tracker (H-PMHT), providing an accessible and intuitive introduction to the mathematical mechanics of H-PMHT as well as a definitive reference source for the existing literature on the method. Beginning with basic concepts, the authors then move on to address extensions of the method to a broad class of tracking problems. The latter chapters present applications using recorded data from experimental radar, sonar and video sensor systems. The book is supplemented with software that both furthers readers’ understanding and acts as a toolkit for those who wish to apply the methods to their own problems.

Trackability and Tracking of General Linear Systems

by Lyubomir Gruyitch

Trackability and Tracking of General Linear Systems deals with five classes of the systems, three of which are new, begins with the definition of time together with a brief description of its crucial properties and with the principles of the physical uniqueness and continuity of physical variables. They are essential for the natural tracking control synthesis. The book presents further new results on the new compact, simple and elegant calculus that enabled the generalization of the transfer function matrix concept and of the state concept, the completion of the trackability and tracking concepts together with the proofs of the trackability and tracking criteria, as well as the natural tracking control synthesis for all five classes of the systems. Features • Crucially broadens the state space concept and the complex domain fundamentals of the dynamical systems to the control systems. • Addresses the knowledge and ability necessary to study and design control systems that will satisfy the fundamental control goal. • Outlines new effective mathematical means for effective complete analysis and synthesis of the control systems. • Upgrades, completes and essentially generalizes the control theory beyond the existing boundaries. • Provides information necessary to create and teach advanced inherently upgraded control courses.

Tracker Hacker (Codename: Winger #1)

by Jeff Adams

Codename: Winger OneTheo Reese is just an average high school student with a passion for hockey and an uncanny talent when it comes to computers… at least on the surface. What his teammates, fellow students, and even his boyfriend don’t realize is that Theo leads a double life. When he’s not putting up his facade of normal, Theo is working as an agent for Tactical Operational Support, where his technical genius is more than just a hobby. At sixteen he is responsible for helping agents in the field and keeping the TOS network secure. It’s a secret he has to keep—from everyone. But secrecy becomes even harder when a hacker compromises the system TOS uses to track its agents and Theo’s dad goes missing. Theo must find him and stop the hacker, which means leaving the comfort of his computer screen and venturing into a very real and very deadly world. And if that’s not enough to deal with, all the secrecy is really putting a strain on Theo’s love life.

Tracking and Mapping of Spatiotemporal Quantities Using Unicellular Swarm Intelligence

by John Oluwagbemiga Oyekan

The book discusses new algorithms capable ofsearching for, tracking, mapping and providing a visualization of invisiblesubstances. It reports on the realization of a bacterium-inspired roboticcontroller that can be used by an agent to search for any environmental spatialfunction such as temperature or pollution. Using the parameters of amathematical model, the book shows that it is possible to control theexploration, exploitation and sensitivity of the agent. This feature sets thework apart from the usual method of applying the bacterium behavior to roboticagents. The book also discusses how a computationally tractable multi-agentrobotic controller was developed and used to track as well as provide a visualmap of a spatio-temporal distribution of a substance. On the one hand, thisbook provides biologists and ecologists with a basis to perform simulationsrelated to how individual organisms respond to spatio-temporal factors in theirenvironment as well as predict and analyze the behavior of organisms at apopulation level. On the other hand, it offers robotic engineers practical andfresh insights into the development of computationally tractable algorithms forspatial exploratory and mapping robots. It also allows a more general audienceto gain an understanding of the design of computational intelligence algorithmsfor autonomous physical systems.

Tracking and Preventing Diseases with Artificial Intelligence (Intelligent Systems Reference Library #206)

by Jerry Chun-Wei Lin Philippe Fournier-Viger Mayuri Mehta Maulika Patel

This book presents an overview of how machine learning and data mining techniques are used for tracking and preventing diseases. It covers several aspects such as stress level identification of a person from his/her speech, automatic diagnosis of disease from X-ray images, intelligent diagnosis of Glaucoma from clinical eye examination data, prediction of protein-coding genes from big genome data, disease detection through microscopic analysis of blood cells, information retrieval from electronic medical record using named entity recognition approaches, and prediction of drug-target interactions.The book is suitable for computer scientists having a bachelor degree in computer science. The book is an ideal resource as a reference book for teaching a graduate course on AI for Medicine or AI for Health care. Researchers working in the multidisciplinary areas use this book to discover the current developments. Besides its use in academia, this book provides enough details about the state-of-the-art algorithms addressing various biomedical domains, so that it could be used by industry practitioners who want to implement AI techniques to analyze the diseases. Medical institutions use this book as reference material and give tutorials to medical experts on how the advanced AI and ML techniques contribute to the diagnosis and prediction of the diseases.

Tracking the Mastermind: Unofficial Graphic Novel #2 for Fortniters (Storm Shield #2)

by Nathan Meyer

The second book in an exciting new series of Fortnite graphic novelsIdris, Kiki, Sarah, and Cody are known as The Stonewood Survivors. After launching a comm-satellite to serve as a beacon for others lost on the Island, they&’re hailed as heroes. But heroes&’ work never ends. Core to their mission of survival is uncovering information about the founder of the shadowy corporation, Vindertech. This they know: Dr. Vinderman is the mastermind behind a host of wonder weapons that includes Ray the Robot and, more importantly, humanity&’s last hope for survival, the Storm Shields. What they don&’t know is whether Dr. Vinderman is working for or against them. To get to the truth, they must paraglide over herds of ravenous Husks and Mist Monsters, land on the roof of Vindertech Research Labs, save the supercomputer servers housed there, and discover Dr. Vinderman&’s location. Nothing happens as planned, and soon they are trapped in a deadly game of hide and seek. Hunted by the maniacal sniper known as Teddy Bear, they enter storm-wracked Plankerton where, if they&’re not slaughtered by mutant fiends, they just might save the world—assuming they don&’t kill each other first! <P><P> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. Benetech is actively working on projects to improve accessibility issues such as these.</i>

Tractability

by Lucas Bordeaux Youssef Hamadi Pushmeet Kohli

Classical computer science textbooks tell us that some problems are 'hard'. Yet many areas, from machine learning and computer vision, to theorem proving and software verification, have defined their own set of tools for effectively solving complex problems. Tractability provides an overview of these different techniques, and of the fundamental concepts and properties used to tame intractability. This book will help you understand what to do when facing a hard computational problem. Can the problem be modelled by convex, or submodular functions? Will the instances arising in practice be of low treewidth, or exhibit another specific graph structure that makes them easy? Is it acceptable to use scalable, but approximate algorithms? A wide range of approaches is presented through self-contained chapters written by authoritative researchers on each topic. As a reference on a core problem in computer science, this book will appeal to theoreticians and practitioners alike.

Refine Search

Showing 57,576 through 57,600 of 61,674 results