Listing 1 - 10 of 24 | << page >> |
Sort by
|
Choose an application
Choose an application
Distributed Computing Through Combinatorial Topology describes techniques for analyzing distributed algorithms based on award winning combinatorial topology research. The authors present a solid theoretical foundation relevant to many real systems reliant on parallelism with unpredictable delays, such as multicore microprocessors, wireless networks, distributed systems, and Internet protocols. Today, a new student or researcher must assemble a collection of scattered conference publications, which are typically terse and commonly use different notations and terminologies. This
Electronic data processing --- Combinatorial topology. --- Distributed processing --- Mathematics.
Choose an application
This practical technical guide to embedded middleware implementation offers a coherent framework that guides readers through all the key concepts necessary to gain an understanding of this broad topic. Big picture theoretical discussion is integrated with down-to-earth advice on successful real-world use via step-by-step examples of each type of middleware implementation. Technically detailed case studies bring it all together, by providing insight into typical engineering situations readers are likely to encounter. Expert author Tammy Noergaard keeps explanations as simple and readable as
Electronic data processing --- Embedded computer systems. --- Distributed processing.
Choose an application
Systems engineering --- Congresses --- System design --- Congresses --- Electronic data processing --- Congresses --- Information theory --- Congresses
Choose an application
Text entry has never been so important as it is today. This is in large part due to the phenomenal, relatively recent success of mobile computing, text messaging on mobile phones, and the proliferation of small devices like the Blackberry and Palm Pilot. Compared with the recent past, when text entry was primarily through the standard "qwerty? keyboard, people today use a diverse array of devices with the number and variety of such devices ever increasing. The variety is not just in the devices, but also in the technologies used: Entry modalities have become more varied and include
Choose an application
Year 2000 date conversion (Computer systems) --- Electronic data processing --- Computers --- Law and legislation --- England --- Computers --- Law and legislation --- Wales --- Contracts --- England --- Contracts --- Wales
Choose an application
Le premier ouvrage permettant aux entreprises de savoir comment réagir sur le plan juridique lorsqu'elles sont confrontées à une fuite de données et préserver ainsi leur image de marque.
Status of persons --- Tort and negligence --- France --- Electronic data processing --- Computer security --- Informatique --- Sécurité informatique --- Law and legislation --- Droit --- EPUB-ALPHA-F EPUB-LIV-FT LIVDROIT STRADA-B
Choose an application
The advent of wireless sensor technology and ad-hoc networks has made DSC a major field of interest. Edited and written by the leading players in the field, this book presents the latest theory, algorithms and applications, making it the definitive reference on DSC for systems designers and implementers, researchers, and graduate students. This book gives a clear understanding of the performance limits of distributed source coders for specific classes of sources and presents the design and application of practical algorithms for realistic scenarios. Material covered includes the use of standard channel codes, such as LDPC and Turbo codes, to DSC, and discussion of the suitability of compressed sensing for distributed compression of sparse signals. Extensive applications are presented and include distributed video coding, microphone arrays and securing biometric data.
Data compression (Telecommunication) --- Multisensor data fusion --- Coding theory --- Electronic data processing --- Données --- Fusion multicapteurs --- Codage --- Traitement réparti --- Distributed processing --- Compression (Télécommunications) --- ELSEVIER-B EPUB-LIV-FT
Choose an application
This two-volume set constitutes the refereed proceedings of the 17th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2021, held in October 2021. Due to COVID-19 pandemic the conference was held virtually. The 62 full papers and 7 short papers presented were carefully reviewed and selected from 206 submissions. The papers reflect the conference sessions as follows: Optimization for Collaborate System; Optimization based on Collaborative Computing; UVA and Traffic system; Recommendation System; Recommendation System & Network and Security; Network and Security; Network and Security & IoT and Social Networks; IoT and Social Networks & Images handling and human recognition; Images handling and human recognition & Edge Computing; Edge Computing; Edge Computing & Collaborative working; Collaborative working & Deep Learning and application; Deep Learning and application; Deep Learning and application; Deep Learning and application & UVA.
Information retrieval --- Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- applicatiebeheer --- apps --- informatica --- informatiesystemen --- KI (kunstmatige intelligentie) --- architectuur (informatica) --- Computer networks --- Electronic data processing --- Multimedia systems --- Distributed processing
Choose an application
This book explores total information awareness empowered by social media. At the FBI Citizens Academy in February 2021, I asked the FBI about the January 6 Capitol riot organized on social media that led to the unprecedented ban of a sitting U.S. President by all major social networks. In March 2021, Facebook CEO Mark Zuckerberg, Google CEO Sundar Pichai, and Twitter CEO Jack Dorsey appeared before Congress to face criticism about their handling of misinformation and online extremism that culminated in the storming of Capitol Hill. With more than three billion monthly active users, Facebook family of apps is by far the world's largest social network. Facebook as a nation is bigger than the top three most populous countries in the world: China, India, and the United States. Social media has enabled its users to inform and misinform the public, to appease and disrupt Wall Street, to mitigate and exacerbate the COVID-19 pandemic, and to unite and divide a country. Mark Zuckerberg once said, "We exist at the intersection of technology and social issues." He should have heeded his own words. In October 2021, former Facebook manager-turned-whistleblower Frances Haugen testified at the U.S. Senate that Facebook's products "harm children, stoke division, and weaken our democracy." This book offers discourse and practical advice on information and misinformation, cybersecurity and privacy issues, cryptocurrency and business intelligence, social media marketing and caveats, e-government and e-activism, as well as the pros and cons of total information awareness including the Edward Snowden leaks. "Highly recommended." - T. D. Richardson, Choice Magazine "A great book for social media experts." - Will M., AdWeek "Parents in particular would be well advised to make this book compulsory reading for their teenage children..." - David B. Henderson, ACM Computing Reviews.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- applicatiebeheer --- apps --- landbouw --- multimedia --- architectuur (informatica) --- Application software. --- Multimedia systems. --- Electronic data processing --- Computer and Information Systems Applications. --- Multimedia Information Systems. --- IT Operations. --- Management.
Listing 1 - 10 of 24 | << page >> |
Sort by
|