Browse Results

Showing 19,326 through 19,350 of 53,620 results

Theoretical Computer Science: 38th National Conference, NCTCS 2020, Nanning, China, November 13–15, 2020, Revised Selected Papers (Communications in Computer and Information Science #1352)

by Kun He Cheng Zhong Zhiping Cai Yitong Yin

This book constitutes the thoroughly refereed proceedings of the 38th National Conference of Theoretical Computer Science, NCTCS 2020, held in Nanning, China, in November 2020. The 13 full papers presented were carefully reviewed and selected from 28 submissions. They present recent research in the areas of algorithms and complexity, matrix computation; deep learning; network communication and security.

Creating Apps with React Native: Deliver Cross-Platform 0 Crash, 5 Star Apps

by M. Holmes He

Produce high-quality, cross-platform apps with user experiences almost identical to pure native apps. When evaluating cross-platform frameworks, developers make an assumption that quality will be compromised. But that doesn't have to be true. The principles in this book will show you how to meet quality expectations both from engineering and consumer standpoints. You’ll also realize the ideal of a greater front end. That means your whole front-end team, including app side and web side, will be optimized. The shared knowledge base as well as mobilization potential give more flexibility and strength in all front-end facets without the need of increasing team sizes.The market has seen a large amount of high quality React Native apps and successful stories about them. Nevertheless, under optimized apps and unsuccessful stories shadow. The fundamental difference between the two opposing groups is understanding. Discover the critical points in the React and React Native architecture, and develop general best practices that can lead to consistently developing 0 crash, 5 star apps based on an understanding of fundamentals.What You'll LearnMeasure and define successful app designCreate animation based on user needReduce performance bottleneck throughout your appsWho This Book Is ForMobile developers who want to expand their front end skill set, and web developers who want to enter mobile development.

The Design of Cloud Workflow Systems

by Qiang He Dahai Cao Dong Yuan Wenhao Li Xiao Liu Yun Yang Gaofeng Zhang Jinjun Chen

Cloud computing is the latest market-oriented computing paradigm which brings software design and development into a new era characterized by "XaaS", i.e. everything as a service. Cloud workflows, as typical software applications in the cloud, are composed of a set of partially ordered cloud software services to achieve specific goals. However, due to the low QoS (quality of service) nature of the cloud environment, the design of workflow systems in the cloud becomes a challenging issue for the delivery of high quality cloud workflow applications. To address such an issue, this book presents a systematic investigation to the three critical aspects for the design of a cloud workflow system, viz. system architecture, system functionality and quality of service. Specifically, the system architecture for a cloud workflow system is designed based on the general four-layer cloud architecture, viz. application layer, platform layer, unified resources layer and fabric layer. The system functionality for a cloud workflow system is designed based on the general workflow reference model but with significant extensions to accommodate software services in the cloud. The support of QoS is critical for the quality of cloud workflow applications. This book presents a generic framework to facilitate a unified design and development process for software components that deliver lifecycle support for different QoS requirements. While the general QoS requirements for cloud workflow applications can have many dimensions, this book mainly focuses on three of the most important ones, viz. performance, reliability and security. In this book, the architecture, functionality and QoS management of our SwinDeW-C prototype cloud workflow system are demonstrated in detail as a case study to evaluate our generic design for cloud workflow systems. To conclude, this book offers a general overview of cloud workflow systems and provides comprehensive introductions to the design of the system architecture, system functionality and QoS management.

Fundamentals of Matrix-Analytic Methods

by Qi-Ming He

Fundamentals of Matrix-Analytic Methods targets advanced-level students in mathematics, engineering and computer science. It focuses on the fundamental parts of Matrix-Analytic Methods, Phase-Type Distributions, Markovian arrival processes and Structured Markov chains and matrix geometric solutions. New materials and techniques are presented for the first time in research and engineering design. This book emphasizes stochastic modeling by offering probabilistic interpretation and constructive proofs for Matrix-Analytic Methods. Such an approach is especially useful for engineering analysis and design. Exercises and examples are provided throughout the book.

Robust Recognition via Information Theoretic Learning

by Ran He Baogang Hu Xiaotong Yuan Liang Wang

This Springer Brief represents a comprehensive review of information theoretic methods for robust recognition. A variety of information theoretic methods have been proffered in the past decade, in a large variety of computer vision applications; this work brings them together, attempts to impart the theory, optimization and usage of information entropy. The authors resort to a new information theoretic concept, correntropy, as a robust measure and apply it to solve robust face recognition and object recognition problems. For computational efficiency, the brief introduces the additive and multiplicative forms of half-quadratic optimization to efficiently minimize entropy problems and a two-stage sparse presentation framework for large scale recognition problems. It also describes the strengths and deficiencies of different robust measures in solving robust recognition problems.

Advances in Image and Graphics Technologies: 12th Chinese conference, IGTA 2017, Beijing, China, June 30 – July 1, 2017, Revised Selected Papers (Communications in Computer and Information Science #757)

by Ran He Shengjin Wang Yue Liu Xiaoru Yuan Jian Yang Yongtian Wang Henry Been-Lirn Duh

This book constitutes the referred proceedings of the 8th China Conference on Image and Graphics Technologies and Applications, IGTA 2014, held in Beijing, China, in June 2014. The 39 papers presented were carefully reviewed and selected from 110 submissions. They cover various aspects of research in image processing and graphics and related topics, including object detection, pattern recognition, object tracking, classification, image segmentation, reconstruction, etc.

Metaverse – METAVERSE 2023: 19th International Conference, Held as Part of the Services Conference Federation, SCF 2023, Honolulu, HI, USA, September 23–26, 2023, Proceedings (Lecture Notes in Computer Science #14210)

by Sheng He Jiacai Lai Liang-Jie Zhang

This book constitutes the refereed proceedings of the 19th International Conference on Metaverse, METAVERSE 2023, held in Honolulu, HI, USA, during September 23–26, 2023.The 9 full papers and 3 short papers included in this book were carefully reviewed and selected from 15 submissions. They were organized in topical sections as follows: answer set programming; metaverse engineering foundations and applications, with a focus on novel approaches for engineering requirements, design and architectures, testing, maintenance and evolution, model-driven development, software processes, metrics, quality assurance and new software economics models, search-based software engineering, benefiting day-to-day services sectors and derived through experiences, with appreciation to scale, pragmatism, transparency, compliance and/or dependability.

Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks

by Shibo He Jiming Chen Junkun Li Youxian Sun

This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sensing model. The brief illustrates efficient algorithms rotate the duty of each sensor to prolong the network lifetime and ensure intruder trapping performance. The brief concludes with future directions of the field. Designed for researchers and professionals working with wireless sensor networks, the brief also provides a wide range of applications which are also valuable for advanced-level students interested in efficiency and networking.

Machine Learning Contests: A Guidebook

by Wang He Peng Liu Qian Qian

This book systematically introduces the competitions in the field of algorithm and machine learning. The first author of the book has won 5 championships and 5 runner-ups in domestic and international algorithm competitions.Firstly, it takes common competition scenarios as a guide by giving the main processes of using machine learning to solve real-world problems, namely problem modelling, data exploration, feature engineering, model training. And then lists the main points of difficulties, general ideas with solutions in the whole process. Moreover, this book comprehensively covers several common problems in the field of machine learning competitions such as recommendation, temporal prediction, advertising, text computing, etc. The authors, also knew as "competition professionals”, will explain the actual cases in detail and teach you various processes, routines, techniques and strategies, which is a rare treasure book for all competition enthusiasts. It is very suitable for readers who are interested in algorithm competitions and deep learning algorithms in practice, or computer-related majors.

Real-World Evidence in Medical Product Development

by Weili He Yixin Fang Hongwei Wang

This book provides state-of-art statistical methodologies, practical considerations from regulators and sponsors, logistics, and real use cases for practitioners for the uptake of RWE/D. Randomized clinical trials have been the gold standard for the evaluation of efficacy and safety of medical products. However, the cost, duration, practicality, and limited generalizability have incentivized many to look for alternative ways to optimize drug development. This book provides a comprehensive list of topics together to include all aspects with the uptake of RWE/D, including, but not limited to, applications in regulatory and non-regulatory settings, causal inference methodologies, organization and infrastructure considerations, logistic challenges, and practical use cases.

Advances and Innovations in Statistics and Data Science (ICSA Book Series in Statistics)

by Wenqing He Liqun Wang Jiahua Chen Chunfang Devon Lin

This book highlights selected papers from the 4th ICSA-Canada Chapter Symposium, as well as invited articles from established researchers in the areas of statistics and data science. It covers a variety of topics, including methodology development in data science, such as methodology in the analysis of high dimensional data, feature screening in ultra-high dimensional data and natural language ranking; statistical analysis challenges in sampling, multivariate survival models and contaminated data, as well as applications of statistical methods. With this book, readers can make use of frontier research methods to tackle their problems in research, education, training and consultation.

Dynamic Games for Network Security (Springerbriefs In Electrical And Computer Engineering)

by Xiaofan He Huaiyu Dai

The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds. Particularly, the exposition of this book begins with a brief introduction of relevant background knowledge in Chapter 1, followed by a review of existing applications of SG in addressing various dynamic network security problems in Chapter 2. A detailed treatment of dynamic security games with information asymmetry is given in Chapters 3–5. Specifically, dynamic security games with extra information that concerns security competitions, where the defender has an informational advantage over the adversary are discussed in Chapter 3. The complementary scenarios where the defender lacks information about the adversary is examined in Chapter 4 through the lens of incomplete information SG. Chapter 5 is devoted to the exploration of how to proactively create information asymmetry for the defender’s benefit.The primary audience for this brief includes network engineers interested in security decision-making in dynamic network security problems. Researchers interested in the state-of-the-art research on stochastic game theory and its applications in network security will be interested in this SpringerBrief as well. Also graduate and undergraduate students interested in obtaining comprehensive information on stochastic game theory and applying it to address relevant research problems can use this SpringerBrief as a study guide. Lastly, concluding remarks and our perspective for future works are presented in Chapter 6.

Network and Parallel Computing: 17th IFIP WG 10.3 International Conference, NPC 2020, Zhengzhou, China, September 28–30, 2020, Revised Selected Papers (Lecture Notes in Computer Science #12639)

by Xin He En Shao Guangming Tan

This book constitutes the proceedings of the 17th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2020, held in Zhengzhou, China, in September 2020. The 34 full and 7 short papers presented in this volume were carefully reviewed and selected from 95 submissions. They were organized in topical sections named: accelerator; AI; algorithm; architecture and hardware; big data and cloud; edge computing; emerging; network; and storage.

The Calabi–Yau Landscape: From Geometry, to Physics, to Machine Learning (Lecture Notes in Mathematics #2293)

by Yang-Hui He

Can artificial intelligence learn mathematics? The question is at the heart of this original monograph bringing together theoretical physics, modern geometry, and data science. The study of Calabi–Yau manifolds lies at an exciting intersection between physics and mathematics. Recently, there has been much activity in applying machine learning to solve otherwise intractable problems, to conjecture new formulae, or to understand the underlying structure of mathematics. In this book, insights from string and quantum field theory are combined with powerful techniques from complex and algebraic geometry, then translated into algorithms with the ultimate aim of deriving new information about Calabi–Yau manifolds. While the motivation comes from mathematical physics, the techniques are purely mathematical and the theme is that of explicit calculations. The reader is guided through the theory and provided with explicit computer code in standard software such as SageMath, Python and Mathematica to gain hands-on experience in applications of artificial intelligence to geometry. Driven by data and written in an informal style, The Calabi–Yau Landscape makes cutting-edge topics in mathematical physics, geometry and machine learning readily accessible to graduate students and beyond. The overriding ambition is to introduce some modern mathematics to the physicist, some modern physics to the mathematician, and machine learning to both.

Agricultural Internet of Things: Technologies and Applications (Agriculture Automation and Control)

by Yong He Pengcheng Nie Qin Zhang Fei Liu

Internet of things (IoT) is a new type of network that combines communication technology, expanded applications, and physical devices. Among them, agriculture is one of the most important areas in the application of the IoT technology, which has its unique requirements and integration features. Compared to the information technology in traditional agriculture, the agricultural IoT mainly refers to industrialized production and sustainable development under relatively controllable conditions. Agricultural IoT applies sensors, RFID, visual capture terminals and other types of sensing devices to detect and collect site information, and with broad applications in field planting, facility horticulture, livestock and poultry breeding, aquaculture and agricultural product logistics. It utilizes multiple information transmission channels such as wireless sensor networks, telecommunications networks and the internet to achieve reliable transmission of agricultural information at multiple scales and intelligently processes the acquired, massive information. The goals are to achieve (i) optimal control of agricultural production process, (ii) intelligent electronic trading of agricultural products circulation, and (iii) management of systematic logistics, quality and safety traceability. This book focuses on three levels of agricultural IoT network: information perception technology, information transmission technology and application technology.

Dorothy Vaughan: NASA's Leading Human Computer (Movers, Shakers, and History Makers)

by Deirdre R. Head

In 1949, Dorothy Vaughan became the first African American woman to lead a team at NASA's Langley Research Center. Her work as a mathematician was an important part of helping the United States explore space. Learn more about Vaughan's life as a famous mathematician!

Mindless: Why Smarter Machines are Making Dumber Humans

by Simon Head

The tools of corporate efficiency - expert systems, databases, and operations management - have improved our lives significantly, but with a cost: they're turning us into mindless drones. This book traces how these IT-intensive management systems have come to dominate our lives, with a profound effect in particular on the middle class.

Artificial Life and Intelligent Agents: First International Symposium, ALIA 2014, Bangor, UK, November 5-6, 2014. Revised Selected Papers (Communications In Computer And Information Science #732)

by Christopher J. Headleand Peter R. Lewis Panagiotis D. Ritsos Steve Battle

This book constitutes the refereed proceedings of the Second International Symposium on Artificial Life and Intelligent Agents, ALIA 2016, held in Birmingham, UK, in June 2016. The 8 revised full papers and three revised short papers presented together with two demo papers were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modelling; robotics; bio-inspired problem solving; human-like systems; applications and games.

Artificial Life and Intelligent Agents: First International Symposium, ALIA 2014, Bangor, UK, November 5-6, 2014. Revised Selected Papers (Communications in Computer and Information Science #519)

by Christopher J. Headleand William J. Teahan Llyr Ap Cenydd

This book constitutes the refereed proceedings of the First International Symposium on Artificial Life and Intelligent Agents, ALIA 2014, held in Bangor, UK, in November 2014. The 10 revised full papers were carefully reviewed and selected from 20 submissions. The papers are organized in topical sections on learning and evolution; human interaction; robotic simulation.

Disk-Based Algorithms for Big Data

by Christopher G. Healey

Disk-Based Algorithms for Big Data is a product of recent advances in the areas of big data, data analytics, and the underlying file systems and data management algorithms used to support the storage and analysis of massive data collections. The book discusses hard disks and their impact on data management, since Hard Disk Drives continue to be common in large data clusters. It also explores ways to store and retrieve data though primary and secondary indices. This includes a review of different in-memory sorting and searching algorithms that build a foundation for more sophisticated on-disk approaches like mergesort, B-trees, and extendible hashing. Following this introduction, the book transitions to more recent topics, including advanced storage technologies like solid-state drives and holographic storage; peer-to-peer (P2P) communication; large file systems and query languages like Hadoop/HDFS, Hive, Cassandra, and Presto; and NoSQL databases like Neo4j for graph structures and MongoDB for unstructured document data. Designed for senior undergraduate and graduate students, as well as professionals, this book is useful for anyone interested in understanding the foundations and advances in big data storage and management, and big data analytics. About the Author Dr. Christopher G. Healey is a tenured Professor in the Department of Computer Science and the Goodnight Distinguished Professor of Analytics in the Institute for Advanced Analytics, both at North Carolina State University in Raleigh, North Carolina. He has published over 50 articles in major journals and conferences in the areas of visualization, visual and data analytics, computer graphics, and artificial intelligence. He is a recipient of the National Science Foundation’s CAREER Early Faculty Development Award and the North Carolina State University Outstanding Instructor Award. He is a Senior Member of the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers (IEEE), and an Associate Editor of ACM Transaction on Applied Perception, the leading worldwide journal on the application of human perception to issues in computer science.

Photographing Washington, D.C. Digital Field Guide

by John Healey

The ideal companion guide for capturing awe-inspiring photos of Washington, D. C. ! Whether using a compact camera or a high-end dSLR, this companion guide provides you with detailed information for taking spectacular shots of some of the most recognizable architecture in the world. Whether you aim to capture memorable photos of the White House, U. S. Capitol, Washington Monument, Lincoln Memorial, or one of D. C. 's other many remarkable memorials, this portable resource goes where you go and walks you through valuable tips and techniques for taking the best shot possible. You'll discover suggested locations for taking photos, recommended equipment, what camera settings to use, best times of day to photograph specific attractions, how to handle weather challenges, and more. In addition, beautiful images of Washington, D. C. 's most breathtaking attractions and recognizable landmarks serve to both inspire and assist you as you embark on an amazing photographic adventure! Elevates your photography skills to a new level with photography secrets from professional photographer John Healey Presents clear, understandable tips and techniques that span all skill levels, using all types of digital cameras, from compact cameras to high end DSLRs Features Washington, D. C. 's main attractions in alphabetical order as well as thumb tabs on the pages so you can quickly and easily access the information you are looking for Shares detailed information and insight on critical topics, such as ideal locations to photograph from, the best time of day to shoot, camera equipment to have handy, weather conditions, and optimal camera settings to consider Whether you're a local familiar with the territory or a visitor seeing our nation's capital for the first time, this handy guide will help capture fantastic photos!

The CPHIMS Review Guide, 4th Edition: Preparing for Success in Healthcare Information and Management Systems (HIMSS Book Series)

by Healthcare Information & Management Systems Society (HIMSS)

Whether you’re taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the ‘gold standard’ in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.

Failure to Connect: How Computers Affect Our Children's Minds and What We Can Do About It

by Jane M. Healy

In this comprehensive, practical, and unsettling look at computers in children's lives, Jane M. Healy, Ph.D., questions whether computers are really helping or harming children's development. Once a bedazzled enthusiast of educational computing but now a troubled skeptic, Dr. Healy examines the advantages and drawbacks of computer use for kids at home and school, exploring its effects on children's health, creativity, brain development, and social and emotional growth. Today, the Federal Government allocates scarce educational funding to wire every classroom to the Internet, software companies churn out "educational" computer programs even for preschoolers, and school administrators cut funding and space for books, the arts, and physical education to make room for new computer hardware. It is past the time to address these issues. Many parents and even some educators have been sold on the idea that computer literacy is as important as reading and math. Those who haven't hopped on the techno bandwagon are left wondering whether they are shortchanging their children's education or their students' futures. Few people stop to consider that computers, used incorrectly, may do far more harm than good. New technologies can be valuable educational tools when used in age-appropriate ways by properly trained teachers. But too often schools budget insufficiently for teacher training and technical support. Likewise, studies suggest that few parents know how to properly assist children's computer learning; much computer time at home may be wasted time, drawing children away from other developmentally important activities such as reading, hobbies, or creative play. Moreover, Dr. Healy finds that much so-called learning software is more "edutainment" than educational, teaching students more about impulsively pointing and clicking for some trivial goal than about how to think, to communicate, to imagine, or to solve problems. Some software, used without careful supervision, may also have the potential to interrupt a child's internal motivation to learn. Failure to Connect is the first book to link children's technology use to important new findings about stages of child development and brain maturation, which are clearly explained throughout. It illustrates, through dozens of concrete examples and guidelines, how computers can be used successfully with children of different age groups as supplements to classroom curricula, as research tools, or in family projects. Dr. Healy issues strong warnings, however, against too early computer use, recommending little or no exposure before age seven, when the brain is primed to take on more abstract challenges. She also lists resources for reliable reviews of child-oriented software, suggests questions parents should ask when their children are using computers in school, and discusses when and how to manage computer use at home. Finally, she offers a thoughtful look at the question of which skills today's children will really need for success in a technological future -- and how they may best acquire them. Based on years of research into learning and hundreds of hours of interviews and observations with school administrators, teachers, parents, and students, Failure to Connect is a timely and eye-opening examination of the central questions we must confront as technology increasingly influences the way we educate our children.

Data Visualization: A Practical Introduction

by Kieran Healy

This book provides students and researchers a hands-on introduction to the principles and practice of data visualization. It explains what makes some graphs succeed while others fail, how to make high-quality figures from data using powerful and reproducible methods, and how to think about data visualization in an honest and effective way. Data Visualization builds the reader’s expertise in ggplot2, a versatile visualization library for the R programming language. Through a series of worked examples, this accessible primer then demonstrates how to create plots piece by piece, beginning with summaries of single variables and moving on to more complex graphics. Topics include plotting continuous and categorical variables; layering information on graphics; producing effective “small multiple” plots; grouping, summarizing, and transforming data for plotting; creating maps; working with the output of statistical models; and refining plots to make them more comprehensible. Effective graphics are essential to communicating ideas and a great way to better understand data. This book provides the practical skills students and practitioners need to visualize quantitative data and get the most out of their research findings. Provides hands-on instruction using R and ggplot2 Shows how the “tidyverse” of data analysis tools makes working with R easier and more consistent Includes a library of data sets, code, and functions

Ansible: From Beginner to Pro

by Michael Heap

This book is your concise guide to Ansible, the simple way to automate apps and IT infrastructure. In less than 250 pages, this book takes you from knowing nothing about configuration management to understanding how to use Ansible in a professional setting. You will learn how to create an Ansible playbook to automatically set up an environment, ready to install an open source project. You'll extract common tasks into roles that you can reuse across all your projects, and build your infrastructure on top of existing open source roles and modules that are available for you to use. You will learn to build your own modules to perform actions specific to your business. By the end you will create an entire cluster of virtualized machines, all of which have your applications and all their dependencies installed automatically. Finally, you'll test your Ansible playbooks. Ansible can do as much or as little as you want it to. Ansible: From Beginner to Pro will teach you the key skills you need to be an Ansible professional. You'll be writing roles and modules and creating entire environments without human intervention in no time at all - add it to your library today. What You Will Learn Learn why Ansible is so popular and how to download and install it Create a playbook that automatically downloads and installs a popular open source project Use open source roles to complete common tasks, and write your own specific to your business Extend Ansible by writing your own modules Test your infrastructure using Test Kitchen and ServerSpec Who This Book Is For Developers that currently create development and production environments by hand. If you find yourself running apt-get install regularly, this book is for you. Ansible adds reproducibility and saves you time all at once. Ansible: From Beginner to Pro is great for any developer wanting to enhance their skillset and learn new tools.

Refine Search

Showing 19,326 through 19,350 of 53,620 results