Most of the papers in this volume were first presented at the Workshop on Cross-Linguistic Information Retrieval that was held August 22, 1996 dur ing the SIGIR'96 Conference. Alan Smeaton of Dublin……続きを見る
Written as a tutorial to explore and understand the power of R for machine learning. This practical guide that covers all of the need to know topics in a very systematic way. For each machine learni……続きを見る
Expert Oracle RAC Performance Diagnostics and Tuning provides comprehensive coverage of the features, technology and principles for testing and tuning RAC databases. The book takes a deep look at op……続きを見る
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, i……続きを見る
This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013……続きを見る
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be a……続きを見る
This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Cov……続きを見る
著者:Thomas Schneider
出版社: Springer Berlin Heidelberg
発売日: 2016年04月09日
Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private ……続きを見る
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclona……続きを見る
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at c……続きを見る
著者:Eric Diehl
出版社: Springer Berlin Heidelberg
発売日: 2015年09月30日
Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards c……続きを見る
Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storin……続きを見る
The importance of benchmarking in the service sector is well recognized as it helps in continuous improvement in products and work processes. Through benchmarking, companies have strived to implemen……続きを見る
The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social ……続きを見る
An ontology is a formal description of concepts and relationships that can exist for a community of human and/or machine agents. The notion of ontologies is crucial for the purpose of enabling knowl……続きを見る
著者:Awais Rashid
出版社: Springer Berlin Heidelberg
発売日: 2016年05月19日
Recently, a new set of software development techniques has become available, collectively termed Aspect-Oriented Software Development (AOSD). This aims to support the modularization of systemic prop……続きを見る
著者:Min Wu, Bede Liu
出版社: Springer New York
発売日: 2016年05月21日
The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipula……続きを見る
Pro Oracle SQL, Second Edition unlocks the power of SQL in the Oracle databaseーone of the most potent SQL implementations on the market today. To master it requires a multi-pronged approach: learn ……続きを見る
This book comprises the refereed papers together with the invited keynote papers, presented at the Second International Conference on Enterprise Information Systems. The conference was organised by ……続きを見る
This book represents a selection of papers presented at the Inductive Logic Programming (ILP) workshop held at Cumberland Lodge, Great Windsor Park. The collection marks two decades since the first ……続きを見る
Every day decision making in complex human-centric systems are characterized by imperfect decision-relevant information. The principal problems with the existing decision theories are that they do n……続きを見る
著者:Lentin Joseph
出版社: Packt Publishing
発売日: 2015年05月27日
About This Book
Design, simulate, build and program an interactive autonomous mobile robot
Program Robot Operating System using Python
Get a grip on the hands-on guide to robotics for learning vari……続きを見る
"Robert Pearl, a well-known DBA in the SQL community, explains his holistic vision of a database instance that needs regular check-ups and gives the tools, scripts, and best practices he has collect……続きを見る
The theory of elliptic curves involves a pleasing blend of algebra, geometry, analysis, and number theory. This volume stresses this interplay as it develops the basic theory, thereby providing an o……続きを見る
Process Technology brings together in one place important contributions and up-to-date research results in this fast moving area.
Process Technology serves as an excellent reference, providing insig……続きを見る
Intelligent data analysis, data mining and knowledge discovery in databases have recently gained the attention of a large number of researchers and practitioners. This is witnessed by the rapidly in……続きを見る
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is design……続きを見る
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two……続きを見る
Mining Very Large Databases with Parallel Processing addresses the problem of large-scale data mining. It is an interdisciplinary text, describing advances in the integration of three computer scien……続きを見る
Clustering is an important technique for discovering relatively dense sub-regions or sub-spaces of a multi-dimension data distribution. Clus tering has been used in information retrieval for many di……続きを見る