Browse Results

Showing 28,276 through 28,300 of 53,408 results

Self-Service in the Internet Age

by Celia Romm Livermore Fay Sudweeks David Oliver

The Internet has emerged as a network which enables a vast range of interactions between businesses and government organizations and individuals. These interactions are classified as B2C (business to consumer), B2B (business to business) and C2C (consumer to consumer) creating ever growing forms of Internet connectedness. This connectedness enables a vast range of self-service opportunities via the Internet. Self-Service in the Internet Age explores attitudes and behaviors to this new form of self-service provision. It focuses on how services are used and viewed by those who choose to use or not use them in a variety of contexts such as personal banking, shopping, travel, education, and health.

Muscular Portfolios: The Investing Revolution for Superior Returns with Lower Risk

by Brian Livingston

Muscular Portfolios is here to change the investing game — and help you leave stress behind with a stronger, smarter approach to investing. For decades, the financial services industry has sold risky investments, claiming that this was the only path to large gains. But this strategy is highly vulnerable to big losses that can devastate your portfolio. Today, there's a better approach. It combines the latest academic research in finance with the new ultra-low-cost index funds (exchange-traded funds). The result is an approach that provides market-like returns with dramatically smaller losses and requires only 15 minutes a month or less. Muscular Portfolios lays out the basic principles of this kind of investing so you can manage your own money successfully — without turning it into your second job. Investigative journalist Brian Livingston takes you behind the curtain of Wall Street and lays out a game-changing approach to investing: Muscular Portfolios, which are easy-to-use financial strategies you can set up yourself, even if you have no investment experience at all. Filled with helpful illustrations, compelling evidence, and simple, no-nonsense instructions, Muscular Portfolios is a resource, not a sales pitch. There are no financial products to buy, no secret formula to pay for. Everything is fully disclosed in bite-sized steps — and on a totally free website — that you can start using today to grow your wealth. Driven by cutting-edge investment research and backed by extensive market testing, Muscular Portfolios will revolutionize investing for families and individual investors.

Windows Vista Secrets®

by Brian Livingston Paul Thurrott

From the book: Part I Surviving Setup Part II Understanding the Windows Vista User Experience Part III Security Part IV Digital Media and Entertainment Part V Mobility Part VI Internet and Networking Part VII Home Office/Power User

Founders at Work: Stories of Startups' Early Days

by Jessica Livingston

Founders at Work: Stories of Startups' Early Days is a collection of interviews with founders of famous technology companies about what happened in the very earliest days. These people are celebrities now.

Researching Learning in Virtual Worlds

by Daniel Livingstone Sarah Smith-Robbins Anna Peachey Julia Gillen

Most of the chapters in this book are extended papers from Research Learning in Virtual Environments (reLIVE08), an international conference held by the UK Open University in Milton Keynes in November 2008. Authors of the best papers and presentations from the conferences were invited to contribute to Research Learning in Virtual Worlds, the first book to specifically address research methods and related issues for education in virtual worlds. The book covers a range of research undertaken in virtual worlds. It opens with an accessible introduction both to the book and to the subject area, making it an ideal springboard for those who are new to research in this area. The subsequent ten chapters present work covering a range of research methodologies across a broad discipline base, providing essential reading for advanced undergraduate or postgraduate researchers working in education in virtual worlds, and engaging background material for researchers in similar and related disciplines.

Artificial Neural Networks: Methods and Applications (Methods in Molecular Biology #458)

by David J. Livingstone

In this book, international experts report the history of the application of ANN to chemical and biological problems, provide a guide to network architectures, training and the extraction of rules from trained networks, and cover many cutting-edge examples of the application of ANN to chemistry and biology. Methods involving the mapping and interpretation of Infra Red spectra and modelling environmental toxicology are included. This book is an excellent guide to this exciting field.

The Class: Living and Learning in the Digital Age (Connected Youth and Digital Futures #1)

by Sonia Livingstone Julian Sefton-Green

An intimate look at how children network, identify, learn and grow in a connected world.Read Online at connectedyouth.nyupress.orgDo today’s youth have more opportunities than their parents? As they build their own social and digital networks, does that offer new routes to learning and friendship? How do they navigate the meaning of education in a digitally connected but fiercely competitive, highly individualized world?Based upon fieldwork at an ordinary London school, The Class examines young people's experiences of growing up and learning in a digital world. In this original and engaging study, Livingstone and Sefton-Green explore youth values, teenagers’ perspectives on their futures, and their tactics for facing the opportunities and challenges that lie ahead. The authors follow the students as they move across their different social worlds—in school, at home, and with their friends, engaging in a range of activities from video games to drama clubs and music lessons. By portraying the texture of the students’ everyday lives, The Class seeks to understand how the structures of social class and cultural capital shape the development of personal interests, relationships and autonomy. Providing insights into how young people’s social, digital, and learning networks enable or disempower them, Livingstone and Sefton-Green reveal that the experience of disconnections and blocked pathways is often more common than that of connections and new opportunities.

Protecting Privacy in Data Release

by Giovanni Livraga

This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsourcing and cloud computing situations. Private companies, public organizations and final users are releasing, sharing, and disseminating their data to take reciprocal advantage of the great benefits of making their data available to others. This book weighs these benefits against the potential privacy risks. A detailed analysis of recent techniques for privacy protection in data release and case studies illustrate crucial scenarios. Protecting Privacy in Data Release targets researchers, professionals and government employees working in security and privacy. Advanced-level students in computer science and electrical engineering will also find this book useful as a secondary text or reference.

Artificial Neural Networks with Java: Tools for Building Neural Network Applications

by Igor Livshin

Develop neural network applications using the Java environment. After learning the rules involved in neural network processing, this second edition shows you how to manually process your first neural network example. The book covers the internals of front and back propagation and helps you understand the main principles of neural network processing. You also will learn how to prepare the data to be used in neural network development and you will be able to suggest various techniques of data preparation for many unconventional tasks. This book discusses the practical aspects of using Java for neural network processing. You will know how to use the Encog Java framework for processing large-scale neural network applications. Also covered is the use of neural networks for approximation of non-continuous functions. In addition to using neural networks for regression, this second edition shows you how to use neural networks for computer vision. It focuses on image recognition such as the classification of handwritten digits, input data preparation and conversion, and building the conversion program. And you will learn about topics related to the classification of handwritten digits such as network architecture, program code, programming logic, and execution. The step-by-step approach taken in the book includes plenty of examples, diagrams, and screenshots to help you grasp the concepts quickly and easily.What You Will LearnUse Java for the development of neural network applicationsPrepare data for many different tasksCarry out some unusual neural network processingUse a neural network to process non-continuous functionsDevelop a program that recognizes handwritten digitsWho This Book Is ForIntermediate machine learning and deep learning developers who are interested in switching to Java

Computational Methods to Study the Structure and Dynamics of Biomolecules and Biomolecular Processes: From Bioinformatics to Molecular Quantum Mechanics (Springer Series on Bio- and Neurosystems #8)

by Adam Liwo

This book provides a comprehensive overview of modern computer-based techniques for analyzing the structure, properties and dynamics of biomolecules and biomolecular processes. It is organized in four main parts; the first one deals with methodology of molecular simulations; the second one with applications of molecular simulations; the third one introduces bioinformatics methods and the use of experimental information in molecular simulations; the last part reports on selected applications of molecular quantum mechanics. This second edition has been thoroughly revised and updated to include the latest progresses made in the respective field of research.

Cloud Computing: Methodology, Systems, and Applications (Computing And Networks Ser.)

by Lizhe Wang, Rajiv Ranjan, Jinjun Chen and Boualem Benatallah

Cloud computing has created a shift from the use of physical hardware and locally managed software-enabled platforms to that of virtualized cloud-hosted services. Cloud assembles large networks of virtual services, including hardware (CPU, storage, and network) and software resources (databases, message queuing systems, monitoring systems, and load-balancers). As Cloud continues to revolutionize applications in academia, industry, government, and many other fields, the transition to this efficient and flexible platform presents serious challenges at both theoretical and practical levels—ones that will often require new approaches and practices in all areas. Comprehensive and timely, Cloud Computing: Methodology, Systems, and Applications summarizes progress in state-of-the-art research and offers step-by-step instruction on how to implement it. Summarizes Cloud Developments, Identifies Research Challenges, and Outlines Future Directions Ideal for a broad audience that includes researchers, engineers, IT professionals, and graduate students, this book is designed in three sections: Fundamentals of Cloud Computing: Concept, Methodology, and Overview Cloud Computing Functionalities and Provisioning Case Studies, Applications, and Future Directions It addresses the obvious technical aspects of using Cloud but goes beyond, exploring the cultural/social and regulatory/legal challenges that are quickly coming to the forefront of discussion. Properly applied as part of an overall IT strategy, Cloud can help small and medium business enterprises (SMEs) and governments in optimizing expenditure on application-hosting infrastructure. This material outlines a strategy for using Cloud to exploit opportunities in areas including, but not limited to, government, research, business, high-performance computing, web hosting, social networking, and multimedia. With contributions from a host of internationally recognized researchers, this reference delves into everything from necessary changes in users’ initial mindset to actual physical requirements for the successful integration of Cloud into existing in-house infrastructure. Using case studies throughout to reinforce concepts, this book also addresses recent advances and future directions in methodologies, taxonomies, IaaS/SaaS, data management and processing, programming models, and applications.

Combinatorial Optimization: 7th International Symposium, ISCO 2022, Virtual Event, May 18–20, 2022, Revised Selected Papers (Lecture Notes in Computer Science #13526)

by Ivana Ljubić Francisco Barahona Santanu S. Dey A. Ridha Mahjoub

This book constitutes thoroughly refereed and revised selected papers from the 7th International Symposium on Combinatorial Optimization, ISCO 2022, which was held online during May 18–20, 2022.The 24 full papers included in this book were carefully reviewed and selected from 50 submissions. They were organized in topical sections as follows: Polyhedra and algorithms; polyhedra and combinatorics; non-linear optimization; game theory; graphs and trees; cutting and packing; applications; and approximation algorithms.

System Administration Ethics: Ten Commandments for Security and Compliance in a Modern Cyber World

by Igor Ljubuncic Tom Litterer

Successfully navigate through the ever-changing world of technology and ethics and reconcile system administration principles for separation of duty, account segmentation, administrative groups and data protection. As security breaches become more common, businesses need to protect themselves when facing ethical dilemmas in today’s digital landscape. This book serves as a equitable guideline in helping system administrators, engineers – as well as their managers – on coping with the ethical challenges of technology and security in the modern data center by providing real-life stories, scenarios, and use cases from companies both large and small. You'll examine the problems and challenges that people working with customer data, security and system administration may face in the cyber world and review the boundaries and tools for remaining ethical in an environment where it is so easy to step over a line - intentionally or accidentally. You'll also see how to correctly deal with multiple ethical situations, problems that arise, and their potential consequences, with examples from both classic and DevOps-based environments.Using the appropriate rules of engagement, best policies and practices, and proactive “building/strengthening” behaviors, System Administration Ethics provides the necessary tools to securely run an ethically correct environment. What You'll LearnThe concepts of Least Privilege and Need to KnowRequest change approval and conduct change communicationFollow "Break Glass" emergency proceduresCode with data breaches, hacking and security violations, and proactively embrace and design for failures Build and gain trust with employees and build the right ethical cultureReview what managers can do to improve ethics and protect their employeesWho This Book Is ForThis book’s primary audience includes system administrators and information security specialists engaged with the creation, process and administration of security policies and systems. A secondary audience includes company leaders seeking to improve the security, privacy, and behavioral practices.

C++ Multithreading Cookbook

by Milos Ljumovic

The book is an easy-to-follow guide for creating multi-threaded applications using C++. Each topic is thoroughly explained with multiple illustrations. Many algorithms, such as Dinning Philosophers Problem give you thorough explanations that will help you to understand and solve concurrent tasks. The book is intended for enterprise developers and programmers who wish to make use of C++ capabilities to learn the multithreaded approach. Knowledge of multithreading along with experience in C++ is an added advantage. However it is not a prerequisite.

Document Analysis and Recognition – ICDAR 2021: 16th International Conference, Lausanne, Switzerland, September 5–10, 2021, Proceedings, Part IV (Lecture Notes in Computer Science #12824)

by Josep Lladós Daniel Lopresti Seiichi Uchida

This four-volume set of LNCS 12821, LNCS 12822, LNCS 12823 and LNCS 12824, constitutes the refereed proceedings of the 16th International Conference on Document Analysis and Recognition, ICDAR 2021, held in Lausanne, Switzerland in September 2021. The 182 full papers were carefully reviewed and selected from 340 submissions, and are presented with 13 competition reports.The papers are organized into the following topical sections: scene text detection and recognition, document classification, gold-standard benchmarks and data sets, historical document analysis, and handwriting recognition. In addition, the volume contains results of 13 scientific competitions held during ICDAR 2021.

Document Analysis and Recognition – ICDAR 2021: 16th International Conference, Lausanne, Switzerland, September 5–10, 2021, Proceedings, Part II (Lecture Notes in Computer Science #12822)

by Josep Lladós Daniel Lopresti Seiichi Uchida

This four-volume set of LNCS 12821, LNCS 12822, LNCS 12823 and LNCS 12824, constitutes the refereed proceedings of the 16th International Conference on Document Analysis and Recognition, ICDAR 2021, held in Lausanne, Switzerland in September 2021. The 182 full papers were carefully reviewed and selected from 340 submissions, and are presented with 13 competition reports.The papers are organized into the following topical sections: document analysis for literature search, document summarization and translation, multimedia document analysis, mobile text recognition, document analysis for social good, indexing and retrieval of documents, physical and logical layout analysis, recognition of tables and formulas, and natural language processing (NLP) for document understanding.

Document Analysis and Recognition – ICDAR 2021: 16th International Conference, Lausanne, Switzerland, September 5–10, 2021, Proceedings, Part I (Lecture Notes in Computer Science #12821)

by Josep Lladós Daniel Lopresti Seiichi Uchida

This four-volume set of LNCS 12821, LNCS 12822, LNCS 12823 and LNCS 12824, constitutes the refereed proceedings of the 16th International Conference on Document Analysis and Recognition, ICDAR 2021, held in Lausanne, Switzerland in September 2021. The 182 full papers were carefully reviewed and selected from 340 submissions, and are presented with 13 competition reports.The papers are organized into the following topical sections: historical document analysis, document analysis systems, handwriting recognition, scene text detection and recognition, document image processing, natural language processing (NLP) for document understanding, and graphics, diagram and math recognition.

Document Analysis and Recognition – ICDAR 2021: 16th International Conference, Lausanne, Switzerland, September 5–10, 2021, Proceedings, Part III (Lecture Notes in Computer Science #12823)

by Josep Lladós Daniel Lopresti Seiichi Uchida

This four-volume set of LNCS 12821, LNCS 12822, LNCS 12823 and LNCS 12824, constitutes the refereed proceedings of the 16th International Conference on Document Analysis and Recognition, ICDAR 2021, held in Lausanne, Switzerland in September 2021. The 182 full papers were carefully reviewed and selected from 340 submissions, and are presented with 13 competition reports.The papers are organized into the following topical sections: extracting document semantics, text and symbol recognition, document analysis systems, office automation, signature verification, document forensics and provenance analysis, pen-based document analysis, human document interaction, document synthesis, and graphs recognition.

Inside the World of Adopt Me! (Adopt Me!)

by Uplift Games Llc

Inside the World of Adopt Me! has descriptive copy which is not yet available from the Publisher.

Arithmetic and Algebraic Circuits (Intelligent Systems Reference Library #201)

by Antonio Lloris Ruiz Encarnación Castillo Morales Luis Parrilla Roure Antonio García Ríos María José Lloris Meseguer

This book presents a complete and accurate study of arithmetic and algebraic circuits. The first part offers a review of all important basic concepts: it describes simple circuits for the implementation of some basic arithmetic operations; it introduces theoretical basis for residue number systems; and describes some fundamental circuits for implementing the main modular operations that will be used in the text. Moreover, the book discusses floating-point representation of real numbers and the IEEE 754 standard. The second and core part of the book offers a deep study of arithmetic circuits and specific algorithms for their implementation. It covers the CORDIC algorithm, and optimized arithmetic circuits recently developed by the authors for adders and subtractors, as well as multipliers, dividers and special functions. It describes the implementation of basic algebraic circuits, such as LFSRs and cellular automata. Finally, it offers a complete study of Galois fields, showing some exemplary applications and discussing the advantages in comparison to other methods. This dense, self-contained text provides students, researchers and engineers, with extensive knowledge on and a deep understanding of arithmetic and algebraic circuits and their implementation.

Kingdom Hearts: The Ultimate Handbook

by Conor Lloyd

A guide to some of the most important characters in the Kingdom Hearts series. Includes fold-out poster!From Sora and Xehanort to Donald, Goofy, King Mickey, and a wide variety of other characters, this handbook provides an overview on some of the most iconic characters in this incredible gaming franchise. Plus, it comes with a fold-out poster! It's a must-have for fans of the Kingdom Hearts series.

Microsoft® Lync® 2013 Plain & Simple

by Darren Lloyd

Get the full-color, visual guide that makes learning Lync 2013 plain and simple! Follow the book's easy steps and screenshots and clear, concise language to learn the simplest ways to communicate and collaborate with colleagues and co-workers. Here's WHAT you'll learn: Set up your personal communication environment Communicate by voice, video, IM, and the web Add, monitor, categorize, and search for contacts Share content and set up conference calls on the fly Discover tabbed conversations and persistent chat Use Lync with other Microsoft Office programs Here's HOW you'll learn it: Jump in wherever you need answers Follow easy STEPS and SCREENSHOTS to see exactly what to do Get handy TIPS for new techniques and shortcuts Use TRY THIS! exercises to apply what you learn right away

Business Leadership for IT Projects

by Gary Lloyd

The track record of IT projects is poor. Less than a third of IT projects deliver what they said they would, on schedule and on budget. The major cause of IT project failure is not, as you might expect, poor IT leadership or difficult technology but poor business leadership. One of the reasons for this is that, unlike their IT peers, business managers often get little training or education in project delivery, let alone the special case represented by an IT project. Business Leadership for IT Projects addresses the gap by providing tools and ideas that are applicable to all sizes of IT projects, from those in large multinational corporations, down to small growing businesses. It sets out the key project touchpoints where business leadership can have a major impact on project success. The book combines psychological research and project best practice to create a practical toolbox that can be dipped into, as needs arise, or followed as an overall approach to IT project leadership. The toolbox weaves together three key strands of thought. First, that the concept of value should be at the forefront of project design and delivery. Second, that business managers need to take active leadership of IT projects to secure value. Third, that project teams need tools to slow down their thinking and ensure that actions and decisions are well thought through.

Build Your Own Web Site the Right Way Using HTML & CSS (2nd Edition)

by Ian Lloyd

Build Your Own Website The Right Way Using HTML & CSS, 2nd Edition teaches web development from scratch, without assuming any previous knowledge of HTML, CSS or web development techniques. This book introduces you to HTML and CSS as you follow along with the author, step-by-step, to build a fully functional web site from the ground up. However, unlike countless other "learn web design" books, this title concentrates on modern, best-practice techniques from the very beginning, which means you'll get it right the first time. The web sites you'll build will: Look good on a PC, Mac or Linux computer Render correctly whether your visitors are using Internet Explorer, Firefox, Opera, or Safari Use web standards so your sites will be fast loading and easy to maintain Be accessible to disabled users who use screen readers to browse the Web By the end of the book, you'll be equipped with enough knowledge to set out on your first projects as a professional web developer, or you can simply use the knowledge you've gained to create attractive, functional, usable and accessible sites for personal use.

Build Your Own Website The Right Way Using HTML & CSS: Start Building Websites Like a Pro!

by Ian Lloyd

With over 60,000 copies sold since its first edition, this SitePoint best-seller has just had a fresh update to include recent advances in the web industry.With the first two editions coming highly recommended by established, leading web designers and developers, the third edition with all its extra goodies will continue that trend. Also fully updated to include the latest operating systems, web browsers and providing fixes to issues that have cropped up since the last edition.Readers will learn to:Style text and control your page layout with CSSCreate and Optimize graphics for the WebAdd interactivity to your sites with formsInclude a custom search, contact us page, and a News/Events section on your siteTrack visitors with Google AnalyticsExtend your reach and connect your site with Social MediaUse HTML5&CSS3 to add some cool, polished features to your siteUse diagnosis/debug tools to find any problemsAnd lots more.

Refine Search

Showing 28,276 through 28,300 of 53,408 results