Browse Results

Showing 20,576 through 20,600 of 54,371 results

Creating Maintainable APIs: A Practical, Case-Study Approach

by Ervin Varga

Build straightforward and maintainable APIs to create services that are usable and maintainable. Although this book focuses on distributed services, it also emphasizes how the core principles apply even to pure OOD and OOP constructs. The overall context of Creating Maintainable APIs is to classify the topics into four main areas: classes and interfaces, HTTP REST APIs, messaging APIs, and message payloads (XML, JSON and JSON API as well as Apache Avro). What You Will Learn Use object-oriented design constructs and their APIs Create and manage HTTP REST APIs Build and manage maintainable messaging APIs, including the use of Apache Kafka as a principal messaging hub Handle message payloads via JSON Who This Book Is For Any level software engineers and very experienced programmers.

Creating Media for Learning: Student-Centered Projects Across the Curriculum

by Sam Gliksman

Help Students Show Learning Through Media Creation Education hinges on effective communication. This book demonstrates how media has become a core component of modern communication and highlights the need to incorporate student-centered media projects throughout the curriculum. Self-expression with media will enhance the learning process and allow students to creatively demonstrate their knowledge. The strategies and tactics these pages offer equip educators to make their students enthusiastic experts at producing dynamic media projects. Content includes: The how, why, and when of prompting students to create their own media across subjects and grade levels. Keys to mastery of media formats from simple photography to eBooks to complex animations. Detailed descriptions of student projects that utilize different media. The benefits of media sharing, and how to do it responsibly. The innovative use of Augmented Reality, so readers can activate a video on the book’s printed pages with their mobile devices. Across all disciplines, mastery of media creation is central to the success of current and next generation students. Educators who implement this book’s ideas will be amazed by the resultant increase in student engagement and depth of learning. "What a thoughtful collection of student-created products. This book highlights a variety of multimedia projects, offers a multitude of best practices and practical implementation tips, and is sure to empower teachers to help students find their voice." Lisa Johnson, Eanes ISD Ed Tech @TechChef4u

Creating Media for Learning: Student-Centered Projects Across the Curriculum

by Sam Gliksman

Help Students Show Learning Through Media Creation Education hinges on effective communication. This book demonstrates how media has become a core component of modern communication and highlights the need to incorporate student-centered media projects throughout the curriculum. Self-expression with media will enhance the learning process and allow students to creatively demonstrate their knowledge. The strategies and tactics these pages offer equip educators to make their students enthusiastic experts at producing dynamic media projects. Content includes: The how, why, and when of prompting students to create their own media across subjects and grade levels. Keys to mastery of media formats from simple photography to eBooks to complex animations. Detailed descriptions of student projects that utilize different media. The benefits of media sharing, and how to do it responsibly. The innovative use of Augmented Reality, so readers can activate a video on the book’s printed pages with their mobile devices. Across all disciplines, mastery of media creation is central to the success of current and next generation students. Educators who implement this book’s ideas will be amazed by the resultant increase in student engagement and depth of learning. "What a thoughtful collection of student-created products. This book highlights a variety of multimedia projects, offers a multitude of best practices and practical implementation tips, and is sure to empower teachers to help students find their voice." Lisa Johnson, Eanes ISD Ed Tech @TechChef4u

Creating Value with Big Data Analytics: Making Smarter Marketing Decisions

by Peter C. Verhoef Edwin Kooge Natasha Walk

Our newly digital world is generating an almost unimaginable amount of data about all of us. Such a vast amount of data is useless without plans and strategies that are designed to cope with its size and complexity, and which enable organisations to leverage the information to create value. This book is a refreshingly practical, yet theoretically sound roadmap to leveraging big data and analytics. Creating Value with Big Data Analytics provides a nuanced view of big data development, arguing that big data in itself is not a revolution but an evolution of the increasing availability of data that has been observed in recent times. Building on the authors’ extensive academic and practical knowledge, this book aims to provide managers and analysts with strategic directions and practical analytical solutions on how to create value from existing and new big data. By tying data and analytics to specific goals and processes for implementation, this is a much-needed book that will be essential reading for students and specialists of data analytics, marketing research, and customer relationship management.

Creative Truth: Start & Build a Profitable Design Business

by Brad Weaver

Creative Truth is your playbook for starting, building, and enjoying a profitable design business. Whether you’re a solo freelancer working from home or a small group of creative entrepreneurs ready to get to the next level, this is your roadmap to success. You’re the CEO, CFO, CTO, Secretary, Janitor, Office Manager, and everything in between. Finding a balance between running the business and doing great creative work is a constant struggle. From learning how to price your work and manage your time, to setting up your business and defining your market, Brad Weaver covers everything designers need to know to run a studio without losing heart. <P><P>Highlights: <li>Real numbers, real tools, and best practices in a toolkit that you can start using immediately in your business. <li>A companion website that offers up-to-date resources, articles, tools, and discussions, allowing readers to continue learning as they grow. <li>Practical tips for getting clients, being more profitable, building your network, managing your operations, getting things done, hiring help, managing contractors, and finding joy along the way.

Creative Workflow in Lightroom: The photographer’s guide to managing, developing, and sharing your work

by Jason Bradley

Adobe’s Lightroom has emerged as a must-have software due to its powerful editing tools and time saving organizational capabilities but how you establish a personalized, creative workflow that optimizes this technology, your time, and your art eludes most photographers. Jason Bradley, award-winning photographer and Lightroom pro, shares the answers to these questions in this practical and easy to follow guide that taps into the "how" and the "why" of a professional photographer’s creative workflow in Lightroom. Bradley will show you how all workflows can be simplified into three steps: establishing, managing, and rendering the file, alongside stunning photographs and explanations from his own experiences. This book will not only teach you how to work within Lightroom but, ultimately, how to make Lightroom work for you.

Creatively Teach the Common Core Literacy Standards With Technology: Grades 6-12 (Corwin Teaching Essentials)

by Catlin R. Tucker

Let technology pave the way to Common Core success. Your transition to the Common Core just got easier! When you start getting creative with technology, you’ll turn your classroom into a student-centered learning environment that fosters collaboration, individualizes instruction, and cultivates essential technological literacy. This book is your road map to student success—while meeting the Common Core ELA and literacy standards. Features include: Specific recommendations for free apps and tech tools that support the Common Core Step-by-step guidelines to breaking down a Common Core standard for your grade and subject Teacher-tested, lesson ideas and teaching strategies Replicable resources, including prewriting activities and writing templates Real-life examples You don’t need to be in a 1:1 school to do amazing things with technology. With just a few devices, you can engage a whole class! Delve into the Common Core ELA standards by having students experiment creatively with the tech tools at hand for a more meaningful and resonant learning experience. "The book contains a tremendous collection of actionable ideas that can be seamlessly implemented to make a difference in all aspects of the classroom. A must-own guide that will surely be a teacher′s go-to resource to help bring the standards to life." Adam Bellow, Founder of eduTecher / eduClipper Plainview, New York "Catlin Tucker provides great ideas for student use of technology tools that cross the curriculum areas and allow the students to showcase their mastery of content. Students will love how the traditional classroom assessments are transformed!" Kathy Schrock, Educational Technologist, Adjunct Instructor Wilkes University, PA

Creatively Teach the Common Core Literacy Standards With Technology: Grades 6-12 (Corwin Teaching Essentials)

by Catlin R. Tucker

Let technology pave the way to Common Core success. Your transition to the Common Core just got easier! When you start getting creative with technology, you’ll turn your classroom into a student-centered learning environment that fosters collaboration, individualizes instruction, and cultivates essential technological literacy. This book is your road map to student success—while meeting the Common Core ELA and literacy standards. Features include: Specific recommendations for free apps and tech tools that support the Common Core Step-by-step guidelines to breaking down a Common Core standard for your grade and subject Teacher-tested, lesson ideas and teaching strategies Replicable resources, including prewriting activities and writing templates Real-life examples You don’t need to be in a 1:1 school to do amazing things with technology. With just a few devices, you can engage a whole class! Delve into the Common Core ELA standards by having students experiment creatively with the tech tools at hand for a more meaningful and resonant learning experience. "The book contains a tremendous collection of actionable ideas that can be seamlessly implemented to make a difference in all aspects of the classroom. A must-own guide that will surely be a teacher′s go-to resource to help bring the standards to life." Adam Bellow, Founder of eduTecher / eduClipper Plainview, New York "Catlin Tucker provides great ideas for student use of technology tools that cross the curriculum areas and allow the students to showcase their mastery of content. Students will love how the traditional classroom assessments are transformed!" Kathy Schrock, Educational Technologist, Adjunct Instructor Wilkes University, PA

Creeper Invasion: An Unofficial Minetrapped Adventure, #5 (The Unofficial Minetrapped Adventure #5)

by Winter Morgan

The three friends trapped in their Minecraft game have never been closer to escaping the Overworld, and they can’t wait to return home after being trapped on the server for so long.But then a vicious horde of creepers attacks, delaying their escape. Soon the gang learns that there’s a new villain behind the attack: a griefer so twisted that he’d rather stay trapped in the Overworld than live a mundane life in the real world-and he has no qualms about keeping every other player trapped on the server with him. Can the friends and their new allies defeat the creepers, conquer their new enemy, and finally return home?Friends and enemies unite against evil in this exhilarating fifth book in bestselling author Winter Morgan’s Unofficial Minetrapped Adventure series.Sky Pony Press, with our Good Books, Racehorse and Arcade imprints, is proud to publish a broad range of books for young readers-picture books for small children, chapter books, books for middle grade readers, and novels for young adults. Our list includes bestsellers for children who love to play Minecraft; stories told with LEGO bricks; books that teach lessons about tolerance, patience, and the environment, and much more. While not every title we publish becomes a New York Times bestseller or a national bestseller, we are committed to books on subjects that are sometimes overlooked and to authors whose work might not otherwise find a home.

Critical Information Infrastructures Security: 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers (Lecture Notes in Computer Science #8985)

by Georgios Ellinas Elias Kyriakides Christos G. Panayiotou Marios M. Polycarpou

This bookconstitutes revised selected papers from the 9th International Conference onCritical Information Infrastructures Security, CRITIS 2014, held in Limassol,Cyprus, in October 2014. The 20 fulland 19 short papers presented in this volume were carefully reviewed andselected from 74 submissions. They are organized in topical sections named:cyber-physical systems and sensor networks; security of water systems; powerand energy system security; security and recovery policies, cyber security; andsecurity tools and protocols.

Critical Information Infrastructures Security: 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9578)

by Marianthi Theocharidou Erich Rome Stephen Wolthusen

This book constitutesrevised selected papers from the 10th International Conference on CriticalInformation Infrastructures Security, CRITIS 2015, held in Berlin, Germany, inOctober 2015. The 18 full and 6short papers presented in this volume were carefully reviewed and selected from54 submissions. They are organized in topical sections named: critical informationinfrastructure protection; critical infrastructure resilience assessment; emergencymanagement: critical infrastructure preparedness; modelling, simulation and analysisapproaches; electric grid protection and resilience; and CIPRNet young CRITIS awardcandidate papers.

Critical Infrastructure Protection Research: Results of the First Critical Infrastructure Protection Research Project in Hungary (Topics in Intelligent Engineering and Informatics #12)

by László Nádai József Padányi

This bookpresents recent research in the recognition of vulnerabilities of nationalsystems and assets which gained special attention for the CriticalInfrastructures in the last two decades. The book concentrates on R&Dactivities in the relation of Critical Infrastructures focusing on enhancingthe performance of services as well as the level of security. The objectives ofthe book are based on a project entitled "Critical InfrastructureProtection Researches" (TÁMOP-4. 2. 1. B-11/2/KMR-2011-0001) whichconcentrated on innovative UAV solutions, robotics, cybersecurity, surfaceengineering, and mechatornics and technologies providing safe operations ofessential assets. This report is summarizing the methodologies and effortstaken to fulfill the goals defined. The project has been performed by theconsortium of the Óbuda University and the National University of PublicService.

Critical Perspectives on Open Development: Empirical Interrogation of Theory Construction (International Development Research Centre)

by Arul Chib, Caitlin M. Bentley, and Matthew L. Smith

Theoretical and empirical analyses of whether open innovations in international development instrumentally advantages poor and marginalized populations.Over the last ten years, "open" innovations--the sharing of information without access restrictions or cost--have emerged within international development. But do these practices instrumentally advantage poor and marginalized populations? This book examines whether, for whom, and under what circumstances the free, networked, public sharing of information and communication resources contributes (or not) towards a process of positive social transformation. The contributors offer both theoretical and empirical analyses that cover a broad range of applications, emphasizing the underlying aspects of open innovations that are shared across contexts and domains.

Critical Systems: Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, Pisa, Italy, September 26-28, 2016, Proceedings (Lecture Notes in Computer Science #9933)

by Stefania Gnesi Alexander Knapp Maurice H. ter Beek

This book constitutes the refereed proceedings of the Joint 21st International Workshop on Formal Methods for Industrial Critical Systems and the 16th International Workshop on Automated Verification of Critical Systems, FMICS-AVoCS 2016, held in Pisa, Italy, in September 2016. The 11 full papers and 4 short papers presented together with one invited talk were carefully reviewed and selected from 24 submissions. They are organized in the following sections: automated verification techniques; model-based system analysis; and applications and case studies.

Cross-Cultural Computing: An Artist's Journey (Springer Series on Cultural Computing)

by Naoko Tosa

This exciting new book explores the relationship between cultural traditions and computers, looking at how people from very different cultures and backgrounds communicate and how the use of information technologies can support and enhance these dialogues. Historically we developed our understanding of other cultures through traditional means (museums, printed literature, etc. ) but the advent of information technologies has allowed us access to a plethora of material. Tosa asks the question "Can we understand other cultures using computers as media to supplement thinking and memorization?" Starting with a survey of art and technology, moving into the area of culture and technology, the book culminates with a vision of a new world based on an understanding of these relationships, allowing cultural creators and viewers the opportunity to reach a better and more profound understanding of the role information technology will play going forward.

Cross-Cultural Multimedia Computing: Semantic and Aesthetic Modeling (SpringerBriefs in Computer Science)

by Shlomo Dubnov Kevin Burns Yasushi Kiyoki

The ability to communicate cultural codes in multimedia depends on their meaning and beauty, as perceived by different audiences around the globe. In this book, the ongoing research on computational modeling of visual, musical and textual contents is described in terms of identifying and mapping their semantic representations across different cultures. The underlying psychology of sense-making is quantified through analysis of aesthetics in terms of organizational and structural aspects of the contents that influence an audience's formation of expectations for future signals, violations of these expectations, and explanations of their meaning. Complexity-accuracy tradeoffs in sound representation are further used to develop new computational methods that capture poietic and aesthetic aspects in music communication. Experimental studies are reported that try to characterize preferences for complexity in abstract, classical and traditional art and music across samples of Western and Far Eastern cultures. These experiments illustrate how aesthetics can be computed in terms of semantic and information measures, highlighting commonalities and uncovering differences in aesthetic preferences across cultures and individuals.

Crossing Fandoms: SuperWhoLock and the Contemporary Fan Audience

by Paul Booth

This book examines the fan-created combination of Doctor Who, Sherlock, and Supernatural as a uniquely digital fan experience, and as a metaphor for ongoing scholarship into contemporary fandom. What do you get when you cross the cult shows Doctor Who, Supernatural, and Sherlock? In this book, Paul Booth explores the fan-created crossover universe known as SuperWhoLock--a universe where Sherlock Holmes and Dean Winchester work together to fight monsters like the Daleks and the Weeping Angels; a world where John Watson is friends with Amy Pond; a space where the unique brands of fandom interact. Booth argues that SuperWhoLock represents more than just those three shows--it is a way of doing fandom. Through interviews with fans and analysis of fan texts, Crossing Fandoms: SuperWhoLock and the Contemporary Fan Audience also demonstrates how fan studies in the digital age can evolve to take into account changing fan activities and texts.

Crossy Road Guía de Juego

by António José Leite da Silva Correia Hiddenstuff Entertainment

Comrpando este guia de jogo avançado e detalhado, eis o que irás obter: - Dicas profissionais e estratégias. - Cheats e Hacks. - Segredos, dicas, cheats, desbloqueadores e truques usados pelos jogadores Pro! - Como obter dinheiro e moedas em abundância. - E MUITO MAIS! Todas as versões deste guia têm imagens que te ajudam a compreender melhor o jogo. Não há um guia tão compreensivo e avançado como este. Estarás satisfeito com este guia e irás beneficiar muito mais quando comparado com outros guias que andam por aí. Compra agora e derrota os teus adversários. Torna-te hoje um jogador Pro!

Crowdsourced Health: How What You Do on the Internet Will Improve Medicine

by Elad Yom-Tov

How data from our health-related Internet searches can lead to discoveries about diseases and symptoms and help patients deal with diagnoses. Most of us have gone online to search for information about health. What are the symptoms of a migraine? How effective is this drug? Where can I find more resources for cancer patients? Could I have an STD? Am I fat? A Pew survey reports more than 80 percent of American Internet users have logged on to ask questions like these. But what if the digital traces left by our searches could show doctors and medical researchers something new and interesting? What if the data generated by our searches could reveal information about health that would be difficult to gather in other ways? In this book, Elad Yom-Tov argues that Internet data could change the way medical research is done, supplementing traditional tools to provide insights not otherwise available. He describes how studies of Internet searches have, among other things, already helped researchers track to side effects of prescription drugs, to understand the information needs of cancer patients and their families, and to recognize some of the causes of anorexia. Yom-Tov shows that the information collected can benefit humanity without sacrificing individual privacy. He explains why people go to the Internet with health questions; for one thing, it seems to be a safe place to ask anonymously about such matters as obesity, sex, and pregnancy. He describes in detrimental effects of “pro-anorexia” online content; tells how computer scientists can scour search engine data to improve public health by, for example, identifying risk factors for disease and centers of contagion; and tells how analyses of how people deal with upsetting diagnoses help doctors to treat patients and patients to understand their conditions.

Cryptographic Hardware and Embedded Systems - CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings (Lecture Notes in Computer Science #9813)

by Axel Y. Poschmann Benedikt Gierlichs

This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.

Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9540)

by Enes Pasalic Lars R. Knudsen

This book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryption.

Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (Lecture Notes in Computer Science #10052)

by Sara Foresti and Giuseppe Persiano

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.

Cryptology Transmitted Message Protection: From Deterministic Chaos up to Optical Vortices (Signals and Communication Technology)

by Igor Izmailov Boris Poizner Ilia Romanov Sergey Smolskiy

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

The CS Detective: An Algorithmic Tale of Crime, Conspiracy, and Computation

by Jeremy Kubica

Meet Frank Runtime. Disgraced ex-detective. Hard-boiled private eye. Search expert.When a robbery hits police headquarters, it’s up to Frank Runtime and his extensive search skills to catch the culprits. In this detective story, you’ll learn how to use algorithmic tools to solve the case. Runtime scours smugglers’ boats with binary search, tails spies with a search tree, escapes a prison with depth-first search, and picks locks with priority queues. Joined by know-it-all rookie Officer Notation and inept tag-along Socks, he follows a series of leads in a best-first search that unravels a deep conspiracy. Each chapter introduces a thrilling twist matched with a new algorithmic concept, ending with a technical recap.Perfect for computer science students and amateur sleuths alike, The CS Detective adds an entertaining twist to learning algorithms.Follow Frank’s mission and learn:–The algorithms behind best-first and depth-first search, iterative deepening, parallelizing, binary search, and more–Basic computational concepts like strings, arrays, stacks, and queues–How to adapt search algorithms to unusual data structures–The most efficient algorithms to use in a given situation, and when to apply common-sense heuristic methods

CSR Racing 2 Hacks del Juego, Apk, Tips para descargar la Guía no Oficial

by Emmanuel Castro Hernández Joshua Abbott

CSR Racing 2 es la continuación de CSR Racing, y finalmente ha llegado. Lanzado por Zynga y Natural Motion. Aunque parece el mismo que la primera versión (carreras de arranques, mejorando tu propio coche y comprando otros) es, de hecho, diferente. Así que estamos aquí para ayudarte mientras te damos trampas, tips y trucos por escrito, ¡especialmente para este juego! Sólo recuerda, no uses esos tips en la vida real. ¡te meterías en problemas!

Refine Search

Showing 20,576 through 20,600 of 54,371 results