Browse Results

Showing 54,176 through 54,200 of 61,731 results

The Crossing of Heaven

by Karl Gustafson Ioannis Antoniou

Among the group of physics honors students huddled in 1957 on a Colorado mountain watching Sputnik bisect the heavens, one young scientist was destined, three short years later, to become a key player in America's own top-secret spy satellite program. One of our era's most prolific mathematicians, Karl Gustafson was given just two weeks to write the first US spy satellite's software. The project would fundamentally alter America's Cold War strategy, and this autobiographical account of a remarkable academic life spent in the top flight tells this fascinating inside story for the first time. Gustafson takes you from his early pioneering work in computing, through fascinating encounters with Nobel laureates and Fields medalists, to his current observations on mathematics, science and life. He tells of brushes with death, being struck by lightning, and the beautiful women who have been a part of his journey.

Schema Matching and Mapping

by Erhard Rahm Angela Bonifati Zohra Bellahsene

Schema Matching and Mapping provides an overview of the ways in which the schema and ontology matching and mapping tools have addressed information systems requirements. Topics include effective methods for matching data, mapping transformation verification, mapping-driven schema evolution and merging.

Vowel Inherent Spectral Change

by Geoffrey Stewart Morrison Peter F. Assmann

It has been traditional in phonetic research to characterize monophthongs using a set of static formant frequencies, i.e., formant frequencies taken from a single time-point in the vowel or averaged over the time-course of the vowel. However, over the last twenty years a growing body of research has demonstrated that, at least for a number of dialects of North American English, vowels which are traditionally described as monophthongs often have substantial spectral change. Vowel inherent spectral change has been observed in speakers' productions, and has also been found to have a substantial effect on listeners' perception. In terms of acoustics, the traditional categorical distinction between monophthongs and diphthongs can be replaced by a gradient description of dynamic spectral patterns. This book includes chapters addressing various aspects of vowel inherent spectral change (VISC), including theoretical and experimental studies of the perceptually relevant aspects of VISC, the relationship between articulation (vocal-tract trajectories) and VISC, historical changes related VISC, cross-dialect, cross-language, and cross-age-group comparisons of VISC, the effects of VISC on second-language speech learning, and the use of VISC in forensic voice comparison.

Intentional Perspectives on Information Systems Engineering

by Selmin Nurcan Jolita Ralyté Carine Souveyet Camille Salinesi

Requirements engineering has since long acknowledged the importance of the notion that system requirements are stakeholder goals--rather than system functions--and ought to be elicited, modeled and analyzed accordingly. In this book, Nurcan and her co-editors collected twenty contributions from leading researchers in requirements engineering with the intention to comprehensively present an overview of the different perspectives that exist today, in 2010, on the concept of intention in the information systems community. These original papers honor Colette Rolland for her contributions to this field, as she was probably the first to emphasize that 'intention' has to be considered as a first-class concept in information systems engineering. Written by long-term collaborators (and most often friends) of Colette Rolland, this volume covers topics like goal-oriented requirements engineering, model-driven development, method engineering, and enterprise modeling. As such, it is a tour d'horizon of Colette Rolland's lifework, and is presented to her on the occasion of her retirement at CaISE 2010 in Hammamet, the conference she once cofounded and which she helped to grow and prosper for more than 20 years.

Tests and Proofs

by Bernhard K. Aichernig Carlo A. Furia

This book constitutes the refereed proceedings of the 10th International Conference on Tests and Proofs, TAP 2016, held as part of STAF 2016, in Vienna, Austria, in July 2016. The 8 full papers, 2 short papers, and 1 tool demonstration paper presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited talk in full-paper length. The TAP conference promotes research in verification and formal methods that targets the interplay of proofs and testing: the advancement of techniques of each kind and their combination, with the ultimate goal of improving software and system dependability.

Intelligent Computing Systems

by Anabel Martin-Gonzalez Victor Uc-Cetina

This book contains the reviewed, accepted contributions ofthe First International Symposium on Intelligent Computing Systems (ISICS) that was held in Merida (Mexico) from 16-18 March 2016. We received 25 submissions from 13 countries. Eachsubmission had been evaluated by at least three members of the ProgramCommittee and external reviewers. Based on these reviews, 12 papers wereselected for long oral presentation. In addition to the contributed papers,four keynote speaker presentations were included in the conference program.

Risks and Security of Internet and Systems

by Javier Lopez Indrajit Ray Bruno Crispo

This book constitutes the thoroughly refereed post- conference proceedings of the Ninth International Conference on Risks and Security of Internet Systems, CRiSIS 2014, held in Trento, Italy, in August 2014. The 13 full papers and 6 short papers presented were selected from 48 submissions. They explore risks and security issues in Internet applications, networks and systems covering topics such as trust, security risks and threats, intrusion detection and prevention, access control and security modeling.

Measuring SIP Proxy Server Performance

by Rudra Dutta Sureshkumar V. Subramanian

Internet Protocol (IP) telephony is an alternative to the traditional Public Switched Telephone Networks (PSTN), and the Session Initiation Protocol (SIP) is quickly becoming a popular signaling protocol for VoIP-based applications. SIP is a peer-to-peer multimedia signaling protocol standardized by the Internet Engineering Task Force (IETF), and it plays a vital role in providing IP telephony services through its use of the SIP Proxy Server (SPS), a software application that provides call routing services by parsing and forwarding all the incoming SIP packets in an IP telephony network. SIP Proxy Server Performance closely examines key aspects to the efficient design and implementation of SIP proxy server architecture. Together, a strong design and optimal implementation can enable significant enhancements to the performance characteristics of SPS. Since SPS performance can be characterized by the transaction states of each SIP session, the book analyzes an existing M/M/1-network performance model for SIP proxy servers in light of key performance benchmarks, such as the average response time for processing the SIP calls and the average number of SIP calls in the system. It also presents several other real-world industrial case studies to aid in further optimizations. This book is intended for researchers, practitioners and professionals interested in optimizing SIP proxy server performance. Professionals working on other VoIP solutions will also find the book valuable.

Developing for Apple TV using tvOS and Swift

by Gary Bennett Stefan Kaczmarek Brad Lees

Gary Bennett, Brad Lees, and Stefan Kaczmarek, the team behind Swift 2 for Absolute Beginners, brings you a hands-on "Swift" introduction to the new tvOS SDK with a collection of app projects to try out. You'll learn how to create a BookStore app for the TV, including using Stack Views for book details, how to create a photo gallery app, and how to use collection view and split view controllers with a music collection app. Finally, you'll also learn how to store Apple TV app data in iCloud. The new Apple TV is here, and it's open for your native apps -- Developing for the Apple TV with tvOS and Swift will get you started developing right away. What you'll learn How to use stack views in tvOS How to use collection views and split view controllers How to store Apple TV app data in iCloud How to create native apps for books, photos, and music on the Apple TV Who this book is for Intermediate iOS developers who want to create native Apple TV apps using the new tvOS SDK. Table of Contents Chapter 1: Getting Started with the New Apple TV Chapter 2: The tvOS Weather App Chapter 3: Stack Views and the Focus Engine Chapter 4: Creating a Photo Gallery App Chapter 5: Adding an Album Browser to the Photo Gallery App Chapter 6: Adding a Dynamic Top Shelf to the Photo Gallery App Chapter 7: Storing and Sharing Data Chapter 8: CloudKit

Smart Multicore Embedded Systems

by Massimo Torquati Koen Bertels Sven Karlsson François Pacull

This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors' approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation.

Fundamentals of Matrix-Analytic Methods

by Qi-Ming He

Fundamentals of Matrix-Analytic Methods targets advanced-level students in mathematics, engineering and computer science. It focuses on the fundamental parts of Matrix-Analytic Methods, Phase-Type Distributions, Markovian arrival processes and Structured Markov chains and matrix geometric solutions. New materials and techniques are presented for the first time in research and engineering design. This book emphasizes stochastic modeling by offering probabilistic interpretation and constructive proofs for Matrix-Analytic Methods. Such an approach is especially useful for engineering analysis and design. Exercises and examples are provided throughout the book.

State Space Grids

by Tom Hollenstein

Human development from birth through adulthood is a complex interplay of many interacting forces. Children's internal processes are manifest in behaviors that are sculpted by their experiences, most notably with primary caregivers. Because the discipline of psychology explores human behavior and cognition, the techniques employed for developmental analysis must be able to describe, depict, and quantify these complex processes. State Space Grids provides the framework, basic method, rationale, and advanced techniques for translating the behavior of children, adolescents, and parents into visible, traceable data. This seminar-between-covers takes readers step by step from conceptualization through implementation of projects, with examples from a range of current research within and outside child development. Links are included for the GridWare software program and related user resources. And although state space grids need not be used only to analyze dynamic systems, they serve as an excellent tool for honing systemic thinking. Key coverage in this volume includes: Dynamic systems and the origins of state space grids. The state of research using state space grids. Introducing GridWare and how it works. How to use state space grids, from idea through finished project. Within-grid and between-grid analysis. Conducting advanced analysis. State Space Grids is an essential reference for researchers across such disciplines as psychology, neuroscience, economics, computer science, and agricultural science.

Disney Stories

by Newton Lee Krystina Madej

Disney Stories: Getting to Digital explores how Disney, the man and the company, used technological innovation to create characters and stories that engage audiences in many different media, in particular in Video Games and on the Internet. Drawing on Disney films from the twenties and thirties, as well as the writings of historians, screenwriters and producers, Disney Stories: Getting to Digital explains how new film and animation techniques, many developed by Disney, worked together to evolve character and content development and produce entertaining stories that riveted audiences. Through an insider's perspective of Disney's legendary creation process, the book closely examines how the Disney Company moved its stories into the digital world in the 1990s and the virtual, online communities of the 2000s. By embracing the digital era, Disney led storytelling and technological innovation by granting their audience the unique opportunity to take part in their creation process through their online games, including The Lion King Animated Story Book, Disney Blast and Toontown. Disney Stories: Getting to Digital is intended for Disney fans and current practitioners looking to study the creation process of one of the most famous animation studios in existence. Professors teaching courses in new media, animation and interactive storytelling will also find this book a valuable asset.

Using Event-B for Critical Device Software Systems

by Neeraj Kumar Singh

Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation). This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into established critical systems development processes - to be discussed in a highly effective and informative way. Using Event-B for Critical Device Software Systems serves as a valuable resource for researchers and students of formal methods. The assessment of critical systems development is applicable to all industries, but engineers and physicians from the health domain will find the cardiac pacemaker case study of particular value.

Next-Generation Wireless Technologies: 4G and Beyond

by Sherali Zeadally Hakima Chaouchi Naveen Chilamkurti

This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet of Things' from both a communications and a service perspective; discusses the machine-to-machine communication model, important applications of wireless technologies in healthcare, and security issues in state-of-the-art networks.

Supporting Real Time Decision-Making

by Frada Burstein Arkady Zaslavsky Patrick Brézillon

This volume of Annals of Information Systems will acknowledge the twentieth anniversary of the founding of the International Society for Decision Support Systems (ISDSS) by documenting some of the current best practices in teaching and research and envisioning the next twenty years in the decision support systems field. The volume is intended to complement existing DSS literature by offering an outlet for thoughts and research particularly suited to the theme of describing the next twenty years in the area of decision support. Several subthemes are planned for the volume. One subtheme draws on the assessments of internationally known DSS researchers to evaluate where the field has been and what has been accomplished. A second subtheme of the volume will be describing the current best practices of DSS research and teaching efforts. A third subtheme will be an assessment by top DSS scholars on where the DSS discipline needs to focus in the future. The tone of this volume is one of enthusiasm for the potential contributions to come in the area of DSS; contributions that must incorporate an understanding of what has been accomplished in the past, build on the best practices of today, and be integrated into future decision making practices.

Movie Analytics

by Dominique Haughton Mark-David Mclaughlin Kevin Mentzer Changan Zhang

Movies will never be the same after you learn how to analyze movie data, including key data mining, text mining and social network analytics concepts. These techniques may then be used in endless other contexts. In the movie application, this topic opens a lively discussion on the current developments in big data from a data science perspective. This book is geared to applied researchers and practitioners and is meant to be practical. The reader will take a hands-on approach, running text mining and social network analyses with software packages covered in the book. These include R, SAS, Knime, Pajek and Gephi. The nitty-gritty of how to build datasets needed for the various analyses will be discussed as well. This includes how to extract suitable Twitter data and create a co-starring network from the IMDB database given memory constraints. The authors also guide the reader through an analysis of movie attendance data via a realistic dataset from France.

High-Bandwidth Memory Interface

by Chulwoo Kim Junyoung Song Hyun-Woo Lee

This book provides an overview of recent advances in memory interface design at both the architecture and circuit levels. Coverage includes signal integrity and testing, TSV interface, high-speed serial interface including equalization, ODT, pre-emphasis, wide I/O interface including crosstalk, skew cancellation, and clock generation and distribution. Trends for further bandwidth enhancement are also covered.

Enabling Real-Time Business Intelligence

by Malu Castellanos Umeshwar Dayal Torben Bach Pedersen Nesime Tatbul

This book constitutes the thoroughly refereed conference proceedings of the 7th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2013, held in Riva del Garda, Italy, in August 2013 and of the 8th International Workshop on Business Intelligence for the Real-Time Enterprise, BIRTE 2014, held in Hangzhou, China, in September 2014, in conjunction with VLDB 2013 and 2014, the International Conference on Very Large Data Bases. The BIRTE workshop series provides a forum for the discussion and advancement of the science and engineering enabling real-time business intelligence and the novel applications that build on these foundational techniques. This volume contains five full, two short, and two demo papers, which were carefully reviewed and selected with an acceptance rate of 45%. In addition, one keynote and three invited papers are included.

Model-Based Reasoning in Science and Technology: Theoretical and Cognitive Issues

by Lorenzo Magnani

This book contains contributions presented during the international conference on Model-Based Reasoning (MBR´012), held on June 21-23 in Sestri Levante, Italy. Interdisciplinary researchers discuss in this volume how scientific cognition and other kinds of cognition make use of models, abduction, and explanatory reasoning in order to produce important or creative changes in theories and concepts. Some of the contributions analyzed the problem of model-based reasoning in technology and stressed the issues of scientific and technological innovation. The book is divided in three main parts: models, mental models, representations; abduction, problem solving and practical reasoning; historical, epistemological and technological issues. The volume is based on the papers that were presented at the international

Intelligent Audio Analysis

by Björn W. Schuller

This book provides the reader with the knowledge necessary for comprehension of the field of Intelligent Audio Analysis. It firstly introduces standard methods and discusses the typical Intelligent Audio Analysis chain going from audio data to audio features to audio recognition. Further, an introduction to audio source separation, and enhancement and robustness are given. After the introductory parts, the book shows several applications for the three types of audio: speech, music, and general sound. Each task is shortly introduced, followed by a description of the specific data and methods applied, experiments and results, and a conclusion for this specific task. The books provides benchmark results and standardized test-beds for a broader range of audio analysis tasks. The main focus thereby lies on the parallel advancement of realism in audio analysis, as too often today's results are overly optimistic owing to idealized testing conditions, and it serves to stimulate synergies arising from transfer of methods and leads to a holistic audio analysis.

Dynamische Disposition

by Timm Gudehus

Die dynamische Disposition ermöglicht marktgerechte Lieferzeiten und kostenoptimale Lieferfähigkeit, sie verhindert überhöhte oder unzureichende Bestände. In dem Buch werden Strategien, Algorithmen und Verfahren der dynamischen Auftrags-, Bestands- und Fertigungsdisposition allgemein verständlich beschrieben und anhand von Beispielen demonstriert. Mithilfe des Regelwerks kann die dynamische Disposition in allen Branchen organisiert und implementiert werden. Die erweiterte 3. Auflage zeigt Potenziale für Serviceverbesserung und Kosteneinsparung auf.

Deterministic Extraction from Weak Random Sources

by Ariel Gabizon

A deterministic extractor is a function that extracts almost perfect random bits from a weak random source. In this research monograph the author constructs deterministic extractors for several types of sources. A basic theme in this work is a methodology of recycling randomness which enables increasing the output length of deterministic extractors to near optimal length. The author's main work examines deterministic extractors for bit-fixing sources, deterministic extractors for affine sources and polynomial sources over large fields, and increasing the output length of zero-error dispersers. This work will be of interest to researchers and graduate students in combinatorics and theoretical computer science.

Experimental IR Meets Multilinguality, Multimodality, and Interaction

by Paulo Quaresma Norbert Fuhr Teresa Gonçalves Birger Larsen Krisztian Balog Craig Macdonald Linda Cappellato Nicola Ferro

This book constitutes the refereed proceedings of the 7th International Conference of the CLEF Initiative, CLEF 2016, held in Toulouse, France, in September 2016. The 10 full papers and 8 short papers presented together with 5 best of the labs papers were carefully reviewed and selected from 36 submissions. In addition to these talks, this volume contains the results of 7 benchmarking labs reporting their year long activities in overview talks and lab sessions. The papers address all aspects of information access in any modality and language and cover a broad range of topics in the fields of multilingual and multimodal information access evaluation.

Detection of Intrusions and Malware, and Vulnerability Assessment

by Juan Caballero Urko Zurutuza Ricardo J. Rodríguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Refine Search

Showing 54,176 through 54,200 of 61,731 results