Scientific Essay from the year 2012 in the subject Computer Science - Theory, , language: English, abstract: In this paper, a new algorithm for solving MEB problem is proposed based on new understan……続きを見る
This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to softwa……続きを見る
This brief surveys existing techniques to address the problem of long delays and high power consumption for web browsing on smartphones, which can be due to the local computational limitation at the……続きを見る
著者:Bo Xing, Wen-Jing Gao
出版社: Springer International Publishing
発売日: 2016年05月31日
The first notable feature of this book is its innovation: Computational intelligence (CI), a fast evolving area, is currently attracting lots of researchers’ attention in dealing with many complex p……続きを見る
Quotient Space Based Problem Solving provides an in-depth treatment of hierarchical problem solving, computational complexity, and the principles and applications of multi-granular computing, includ……続きを見る
The aim of this book is to explain to high-performance computing (HPC) developers how to utilize the Intel® Xeon Phi™ series products efficiently. To that end, it introduces some computing grammar, ……続きを見る
In plain, uncomplicated language, and using detailed examples to explain the key concepts, models, and algorithms in vertical search ranking, Relevance Ranking for Vertical Search Engines teaches re……続きを見る
This book provides readers with a comprehensive review of the state of the art in error control for Network on Chip (NOC) links. Coverage includes detailed description of key issues in NOC error con……続きを見る
This book describes current problems in data science and Big Data. Key topics are data classification, Graph Cut, the Laplacian Matrix, Google Page Rank, efficient algorithms, hardness of problems, ……続きを見る
A complete pentesting guide facilitating smooth backtracking for working hackers
About This Book
Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux
Gain……続きを見る
Bootstrap perhaps is the most popular frontend framework for developing mobile first projects on the web in recent years, its repository on github gets more than 100 thousands stars. Millions of web……続きを見る
This book addresses the fundamental theory and key technologies of narrowband and broadband mobile communication systems specifically for railways. It describes novel relaying schemes that meet the ……続きを見る
Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight……続きを見る
This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware arc……続きを見る
Become the ethical hacker you need to be to protect your network
Key Features
Set up, configure, and run a newly installed Kali-Linux 2018.x
Footprint, monitor, and audit your network and investiga……続きを見る
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which inclu……続きを見る
Perl was originally written by Larry Wall while he was working at NASA’s Jet Propulsion Labs. Larry is an Internet legend, known not just for Perl, but as the author of the UNIX utilities rn, one of……続きを見る
Master intermediate to advanced techniques of the Perl programming language starting with a focus on regular expressions and some of their advanced features. This book then covers other pro-level fe……続きを見る
A thorough analysis of contemporary digital media practices, showing how people increasingly not only consume but also produce and even design media.
With many new forms of digital media–including s……続きを見る
Implement neural search systems on the cloud by leveraging Jina design patterns Key Features • Identify the different search techniques and discover applications of neural search • Gain a solid unde……続きを見る
ARTIFICIAL INTELLIGENCE-BASED SMART POWER SYSTEMS
Authoritative resource describing artificial intelligence and advanced technologies in smart power systems with simulation examples and case studies……続きを見る
An Introduction to the Machine Learning Empowered Intelligent Data Center Networking
Fundamentals of Machine Learning in Data Center Networks. This book reviews the common learning paradigms that ar……続きを見る
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be ……続きを見る
This book introduces embedded software engineering and management methods, proposing the relevant testing theory and techniques that promise the final realization of automated testing of embedded sy……続きを見る
This Element is an excerpt from Ubiquitous Computing for Business: Find New Markets, Create Better Businesses, and Reach Customers Around The World 24-7-365 (9780137064434) by Bo Begole. Available i……続きを見る
This book assumes familiarity with threads (in a language such as Ada, C#, or Java) and introduces the entity-life modeling (ELM) design approach for certain kinds of multithreaded software. ELM foc……続きを見る
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers
About This Book
Conduct network testing, surveillance, pen testing and forensics on MS Windows using K……続きを見る
This is the first book to introduce UUDN for 5G, including the concept, challenges, architecture and key technologies.
The new network architecture based on “de-cellular” and “user-centric” is propo……続きを見る
This self-contained book, written by active researchers, presents up-to-date information on smart maintenance strategies for human–robot interaction (HRI) and the associated applications of novel se……続きを見る
This book systematically presents energy-efficient robust fusion estimation methods to achieve thorough and comprehensive results in the context of network-based fusion estimation. It summarizes rec……続きを見る