Browse Results

Showing 19,726 through 19,750 of 53,536 results

A Real-Time In-Memory Discovery Service: Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (In-Memory Data Management Research)

by Jürgen Müller

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Cyberspace and International Relations: Theory, Prospects and Challenges

by Jan-Frederik Kremer Benedikt Müller

Cyberspace is everywhere in today's world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the "cyberization" of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice. In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches. Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations.

Advances in Heuristic Signal Processing and Applications

by Patrick Siarry Hadi Nobahari Amitava Chatterjee

There have been significant developments in the design and application of algorithms for both one-dimensional signal processing and multidimensional signal processing, namely image and video processing, with the recent focus changing from a step-by-step procedure of designing the algorithm first and following up with in-depth analysis and performance improvement to instead applying heuristic-based methods to solve signal-processing problems. In this book the contributing authors demonstrate both general-purpose algorithms and those aimed at solving specialized application problems, with a special emphasis on heuristic iterative optimization methods employing modern evolutionary and swarm intelligence based techniques. The applications considered are in domains such as communications engineering, estimation and tracking, digital filter design, wireless sensor networks, bioelectric signal classification, image denoising, and image feature tracking. The book presents interesting, state-of-the-art methodologies for solving real-world problems and it is a suitable reference for researchers and engineers in the areas of heuristics and signal processing.

Data Intensive Computing for Biodiversity (Studies in Computational Intelligence #485)

by Sarinder K. Dhillon Amandeep S. Sidhu

This book is focused on the development of a data integration framework for retrieval of biodiversity information from heterogeneous and distributed data sources. The data integration system proposed in this book links remote databases in a networked environment, supports heterogeneous databases and data formats, links databases hosted on multiple platforms, and provides data security for database owners by allowing them to keep and maintain their own data and to choose information to be shared and linked. The book is a useful guide for researchers, practitioners, and graduate-level students interested in learning state-of-the-art development for data integration in biodiversity.

Benchmarking Transaction and Analytical Processing Systems: The Creation of a Mixed Workload Benchmark and its Application (In-Memory Data Management Research)

by Anja Bog

Systems for Online Transaction Processing (OLTP) and Online Analytical Processing (OLAP) are currently separate. The potential of the latest technologies and changes in operational and analytical applications over the last decade have given rise to the unification of these systems, which can be of benefit for both workloads. Research and industry have reacted and prototypes of hybrid database systems are now appearing. Benchmarks are the standard method for evaluating, comparing and supporting the development of new database systems. Because of the separation of OLTP and OLAP systems, existing benchmarks are only focused on one or the other. With the rise of hybrid database systems, benchmarks to assess these systems will be needed as well. Based on the examination of existing benchmarks, a new benchmark for hybrid database systems is introduced in this book. It is furthermore used to determine the effect of adding OLAP to an OLTP workload and is applied to analyze the impact of typically used optimizations in the historically separate OLTP and OLAP domains in mixed-workload scenarios.

Benchmarking Peer-to-Peer Systems: Understanding Quality of Service in Large-Scale Distributed Systems (Lecture Notes in Computer Science #7847)

by Wolfgang Effelsberg Thorsten Strufe Ralf Steinmetz

Peer-to-peer systems are now widely used and have become the focus of attention for many researchers over the past decade. A number of algorithms for decentralized search, content distribution, and media streaming have been developed. This book provides fundamental concepts for the benchmarking of those algorithms in peer-to-peer systems. It also contains a collection of characteristic benchmarking results. The chapters of the book have been organized in three topical sections on: Fundamentals of Benchmarking in P2P Systems; Synthetic Benchmarks for Peer-to-Peer Systems; and Application Benchmarks for Peer-to-Peer Systems. They are preceded by a detailed introduction to the subject.

Condition: The Geometry of Numerical Algorithms (Grundlehren der mathematischen Wissenschaften #349)

by Felipe Cucker Peter Bürgisser

This book gathers threads that have evolved across different mathematical disciplines into seamless narrative. It deals with condition as a main aspect in the understanding of the performance ---regarding both stability and complexity--- of numerical algorithms. While the role of condition was shaped in the last half-century, so far there has not been a monograph treating this subject in a uniform and systematic way. The book puts special emphasis on the probabilistic analysis of numerical algorithms via the analysis of the corresponding condition. The exposition's level increases along the book, starting in the context of linear algebra at an undergraduate level and reaching in its third part the recent developments and partial solutions for Smale's 17th problem which can be explained within a graduate course. Its middle part contains a condition-based course on linear programming that fills a gap between the current elementary expositions of the subject based on the simplex method and those focusing on convex programming.

Basics of Bioinformatics: Lecture Notes of the Graduate Summer School on Bioinformatics of China

by Rui Jiang Xuegong Zhang Michael Q. Zhang

This book outlines 11 courses and 15 research topics in bioinformatics, based on curriculums and talks in a graduate summer school on bioinformatics that was held in Tsinghua University. The courses include: Basics for Bioinformatics, Basic Statistics for Bioinformatics, Topics in Computational Genomics, Statistical Methods in Bioinformatics, Algorithms in Computational Biology, Multivariate Statistical Methods in Bioinformatics Research, Association Analysis for Human Diseases: Methods and Examples, Data Mining and Knowledge Discovery Methods with Case Examples, Applied Bioinformatics Tools, Foundations for the Study of Structure and Function of Proteins, Computational Systems Biology Approaches for Deciphering Traditional Chinese Medicine, and Advanced Topics in Bioinformatics and Computational Biology. This book can serve as not only a primer for beginners in bioinformatics, but also a highly summarized yet systematic reference book for researchers in this field. Rui Jiang and Xuegong Zhang are both professors at the Department of Automation, Tsinghua University, China. Professor Michael Q. Zhang works at the Cold Spring Harbor Laboratory, Cold Spring Harbor, NY, USA.

Advanced SOA Tools and Applications (Studies in Computational Intelligence #499)

by Wojciech Cellary Adam Grzech Stanisław Ambroszkiewicz Jerzy Brzeziński Krzysztof Zieliński

This book presents advanced software development tools for construction, deployment and governance of Service Oriented Architecture (SOA) applications. Novel technical concepts and paradigms, formulated during the research stage and during development of such tools are presented and illustrated by practical usage examples. Hence this book will be of interest not only to theoreticians but also to engineers who cope with real-life problems. Additionally, each chapter contains an overview of related work, enabling comparison of the proposed concepts with exiting solutions in various areas of the SOA development process. This makes the book interesting also for students and scientists who investigate similar issues.

Anwendungsentwicklung mit Datenbanken (eXamen.press)

by Günter Matthiessen Michael Unterstein

Das Buch ergänzt und erweitert "Relationale Datenbanken und SQL in Theorie und Praxis (ISBN 978-3-642-28985-9)". Schwerpunkt der Darstellung sind Aspekte der Anwendungsprogrammierung mit Datenbanken. Dabei werden prozedurale Konzepte in SQL wie Stored Procedures und Trigger, Anbindung von Datenbanken in Java, Transaktionen und anderes mehr behandelt. Auch der Entwurf mit UML ist Thema. Eine Beispieldatenbank und die Quellcodes stehen zum Download zur Verfügung.

Automated Design of Analog and High-frequency Circuits: A Computational Intelligence Approach (Studies in Computational Intelligence #501)

by Bo Liu Georges Gielen Francisco V. Fernández

Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight time-to-market requirements, the time available for thorough problem analysis and development of tailored solution methods is decreasing. There is no doubt that this trend will continue in the foreseeable future. Hence, it is not surprising that robust and general automated problem solving methods with satisfactory performance are needed.

Cooperative Robots and Sensor Networks (Studies in Computational Intelligence #507)

by Anis Koubâa Abdelmajid Khelil

Mobile robots and Wireless Sensor Networks (WSNs) have enabled great potentials and a large space for ubiquitous and pervasive applications. Robotics and WSNs have mostly been considered as separate research fields and little work has investigated the marriage between these two technologies. However, these two technologies share several features, enable common cyber-physical applications and provide complementary support to each other. The primary objective of book is to provide a reference for cutting-edge studies and research trends pertaining to robotics and sensor networks, and in particular for the coupling between them. The book consists of five chapters. The first chapter presents a cooperation strategy for teams of multiple autonomous vehicles to solve the rendezvous problem. The second chapter is motivated by the need to improve existing solutions that deal with connectivity prediction, and proposed a genetic machine learning approach for link-quality prediction. The third chapter presents an architecture for indoor navigation using an Android smartphone for guiding a variety of users, from sighted to the visually impaired, to their intended destination. In chapter four, the authors deal with accurate prediction modeling of ocean currents for underwater glider navigation. In chapter five, the authors discuss the challenges and limitations of RSS-based localization mechanisms and propose, EasyLoc, an autonomous and practical RSS-based localization technique that satisfies ease of deployment and implementation.

Computer Vision Techniques for the Diagnosis of Skin Cancer (Series in BioEngineering)

by M. Emre Celebi Jacob Scharcanski

The goal of this volume is to summarize the state-of-the-art in the utilization of computer vision techniques in the diagnosis of skin cancer. Malignant melanoma is one of the most rapidly increasing cancers in the world. Early diagnosis is particularly important since melanoma can be cured with a simple excision if detected early. In recent years, dermoscopy has proved valuable in visualizing the morphological structures in pigmented lesions. However, it has also been shown that dermoscopy is difficult to learn and subjective. Newer technologies such as infrared imaging, multispectral imaging, and confocal microscopy, have recently come to the forefront in providing greater diagnostic accuracy. These imaging technologies presented in this book can serve as an adjunct to physicians and provide automated skin cancer screening. Although computerized techniques cannot as yet provide a definitive diagnosis, they can be used to improve biopsy decision-making as well as early melanoma detection, especially for patients with multiple atypical nevi.

Contemporary Evolution Strategies (Natural Computing Series)

by Thomas Bäck Christophe Foussette Peter Krause

This book surveys key algorithm developments between 1990 and 2012, with brief descriptions, a unified pseudocode for each algorithm and downloadable program code. Provides a taxonomy to clarify similarities and differences as well as historical relationships.

Case-Based Reasoning: A Textbook (Lecture Notes in Computer Science #4626)

by Michael M. Richter Rosina O. Weber

This book presents case-based reasoning in a systematic approach with two goals: to present rigorous and formally valid structures for precise case-based reasoning, and to demonstrate the range of techniques, methods, and tools available for many applications.

Carl Adam Petri: Eine Biographie

by Einar Smith

Der Autor präsentiert Leben, Werk und Wirken eines der weltweit bekanntesten deutschen Informatiker: Carl Adam Petri. Die Stadien seiner Entwicklung sind lebendig und kurzweilig beschrieben, gehen aber so weit in die Tiefe, dass der Leser ein gutes Verständnis für die Hintergründe von Petris wichtigstem Beitrag zur Informatik bekommt, die nach ihm benannten Petrinetze. Das Buch kann so als Einführung in die Petrinetze gelesen werden, erörtert aber auch die theoretischen, physikalischen und philosophischen Grundlagen der Netze, die erst einen umfassenden Zugang zu Petris Werk ermöglichen. Das Buch wendet sich dank seiner verständlichen Darstellung aber auch an Leser, die einfach nur eine bemerkenswerte Persönlichkeit der Zeitgeschichte kennenlernen möchten.

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures (SpringerBriefs in Computer Science)

by Keijo Haataja Konstantin Hyppönen Sanna Pasanen Pekka Toivanen

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Cyber Security and Privacy: Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers (Communications in Computer and Information Science #182)

by Massimo Felici

This book constitutes the thoroughly refereed, selected papers on Cyber Security and Privacy EU Forum 2013, held in Belgium, in April 2013. The 14 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on cloud computing, security and privacy management, security and privacy technology, security and privacy policy.

Approaches in Integrative Bioinformatics: Towards the Virtual Cell

by Ming Chen Ralf Hofestädt

Approaches in Integrative Bioinformatics provides a basic introduction to biological information systems, as well as guidance for the computational analysis of systems biology. This book also covers a range of issues and methods that reveal the multitude of omics data integration types and the relevance that integrative bioinformatics has today. Topics include biological data integration and manipulation, modeling and simulation of metabolic networks, transcriptomics and phenomics, and virtual cell approaches, as well as a number of applications of network biology. It helps to illustrate the value of integrative bioinformatics approaches to the life sciences. This book is intended for researchers and graduate students in the field of Bioinformatics. Professor Ming Chen is the Director of the Bioinformatics Laboratory at the College of Life Sciences, Zhejiang University, Hangzhou, China. Professor Ralf Hofestädt is the Chair of the Department of Bioinformatics and Medical Informatics, Bielefeld University, Germany.

Combinatorial Search: From Algorithms To Systems

by Youssef Hamadi

Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to efficiently explore these regions. Various mathematical formalisms may be used to express and tackle combinatorial problems, among them the constraint satisfaction problem (CSP) and the propositional satisfiability problem (SAT). These algorithms, or constraint solvers, apply search space reduction through inference techniques, use activity-based heuristics to guide exploration, diversify the searches through frequent restarts, and often learn from their mistakes. In this book the author focuses on knowledge sharing in combinatorial search, the capacity to generate and exploit meaningful information, such as redundant constraints, heuristic hints, and performance measures, during search, which can dramatically improve the performance of a constraint solver. Information can be shared between multiple constraint solvers simultaneously working on the same instance, or information can help achieve good performance while solving a large set of related instances. In the first case, information sharing has to be performed at the expense of the underlying search effort, since a solver has to stop its main effort to prepare and commu nicate the information to other solvers; on the other hand, not sharing information can incur a cost for the whole system, with solvers potentially exploring unfeasible spaces discovered by other solvers. In the second case, sharing performance measures can be done with little overhead, and the goal is to be able to tune a constraint solver in relation to the characteristics of a new instance - this corresponds to the selection of the most suitable algorithm for solving a given instance. The book is suitable for researchers, practitioners, and graduate students working in the areas of optimization, search, constraints, and computational complexity.

Applications of Declarative Programming and Knowledge Management: 19th International Conference, INAP 2011, and 25th Workshop on Logic Programming, WLP 2011, Vienna, Austria, September 28-30, 2011, Revised Selected Papers (Lecture Notes in Computer Science #7773)

by Hans Tompits Salvador Abreu Johannes Oetsch Jörg Pührer Dietmar Seipel Masanobu Umeda Armin Wolf

This book constitutes revised selected papers of the 19th International Conference on Applications of Declarative Programming and Knowledge Management, INAP 2011, and the 25th Workshop on Logic Programming, WLP 2011, held in Vienna, Austria, in September 2011. The 19 papers presented in this volume were carefully reviewed and selected from 27 papers presented at the conference and initially a total of 35 submissions. The book also contains the papers of two invited talks. The papers are organized in topical sections on languages; answer-set programming and abductive reasoning; constraints and logic programming; answer-set programming and model expansion; application papers; and system descriptions.

, 2nd Edition: Introduction, Methods, and Information Systems (International Handbooks on Information Systems)

by Jan Vom Brocke Michael Rosemann

Business Process Management (BPM) has become one of the most widely used approaches for the design of modern organizational and information systems. The conscious treatment of business processes as significant corporate assets has facilitated substantial improvements in organizational performance but is also used to ensure the conformance of corporate activities. This Handbook presents in two volumes the contemporary body of knowledge as articulated by the world' s leading BPM thought leaders. This first volume focuses on arriving at a sound definition of BPM approaches and examines BPM methods and process-aware information systems. As such, it provides guidance for the integration of BPM into corporate methodologies and information systems. Each chapter has been contributed by leading international experts. Selected case studies complement their views and lead to a summary of BPM expertise that is unique in its coverage of the most critical success factors of BPM.<P><P> The second edition of this handbook has been significantly revised and extended. Each chapter has been updated to reflect the most current developments. This includes in particular new technologies such as in-memory data and process management, social media and networks. A further focus of this revised and extended edition is on the actual deployment of the proposed theoretical concepts. This volume includes a number of entire new chapters from some of the world's leading experts in the domain of BPM.

Data Mining for Service (Studies in Big Data #3)

by Katsutoshi Yada

Virtually all nontrivial and modern service related problems and systems involve data volumes and types that clearly fall into what is presently meant as "big data", that is, are huge, heterogeneous, complex, distributed, etc. Data mining is a series of processes which include collecting and accumulating data, modeling phenomena, and discovering new information, and it is one of the most important steps to scientific analysis of the processes of services. Data mining application in services requires a thorough understanding of the characteristics of each service and knowledge of the compatibility of data mining technology within each particular service, rather than knowledge only in calculation speed and prediction accuracy. Varied examples of services provided in this book will help readers understand the relation between services and data mining technology. This book is intended to stimulate interest among researchers and practitioners in the relation between data mining technology and its application to other fields.

Applications and Markets for Cooperating Objects (SpringerBriefs in Electrical and Computer Engineering)

by Stamatis Karnouskos Pedro José Marrón Luca Mottola Giancarlo Fortino José Ramiro Martínez-de Dios

This book provides an overview and an insight in cooperative objects and defines the classification of topics into the different areas. A significant number of researchers and industrial partners were contacted in order to prepare the roadmap. The book presents of the main results provided by the corresponding European project "CONET".

Collaborative Design for Embedded Systems: Co-modelling and Co-simulation

by John Fitzgerald Peter Gorm Larsen Marcel Verhoef

One of the most significant challenges in the development of embedded and cyber-physical systems is the gap between the disciplines of software and control engineering. In a marketplace, where rapid innovation is essential, engineers from both disciplines need to be able to explore system designs collaboratively, allocating responsibilities to software and physical elements, and analyzing trade-offs between them. To this end, this book presents a framework that allows the very different kinds of design models - discrete-event (DE) models of software and continuous time (CT) models of the physical environment - to be analyzed and simulated jointly, based on common scenarios. The individual chapters provide introductions to both sides of this co-simulation technology, and give a step-by-step guide to the methodology for designing and analyzing co-models. They are grouped into three parts: Part I introduces the technical basis for collaborative modeling and simulation with the Crescendo technology. Part II continues with different methodological guidelines for creating co-models and analyzing them in different ways using case studies. Part III then delves into more advanced topics and looks into the potential future of this technology in the area of cyber-physical systems. Finally various appendices provide summaries of the VDM and 20-sim technologies, a number of valuable design patterns applicable for co-models, and an acronym list along with indices and references to other literature. By combining descriptions of the underlying theory with records of real engineers' experience in using the framework on a series of case studies the book appeals to scientists and practitioners alike. It is complemented by tools, examples, videos, and other material on www. crescendotool. org. Scientists/researchers and graduate students working in embedded and cyber-physical systems will learn the semantic foundations for collaborative modeling and simulation, as well as the current capabilities and limitations of methods and tools in this field. Practitioners will be able to develop an appreciation of the capabilities of the co-modeling techniques, to assess the benefits of more collaborative approaches to modeling and simulation, and will benefit from the included guidelines and modeling patterns.

Refine Search

Showing 19,726 through 19,750 of 53,536 results