Research & information: general Books

Sidebar Sidebar Sidebar
  • Complex Strategic Choices Complex Strategic Choices
    Add to Cart The item has been added

    Complex Strategic Choices

    Effective decision making requires a clear methodology, particularly in complex, globally relevant situations. Institutions and companies in all disciplines and sectors are faced with increasingly multi-faceted areas of uncertainty which cannot always be...
    $220.00

    Add to Cart The item has been added
  • High-Performance Scientific Computing High-Performance Scientific Computing
    Add to Cart The item has been added

    High-Performance Scientific Computing

    This book presents the state of the art in parallel numerical algorithms, applications, architectures, and system software. The book examines various solutions for issues of concurrency, scale, energy efficiency, and programmability, which are discussed...
    $184.00

    Add to Cart The item has been added
  • Identity-Based Encryption Identity-Based Encryption
    Add to Cart The item has been added

    Identity-Based Encryption

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the main ideas that would enable users to pursue further work...
    $227.00

    Add to Cart The item has been added
  • Technologies for Active Aging Technologies for Active Aging
    Add to Cart The item has been added

    Technologies for Active Aging

    The challenge of population aging requires innovative approaches to meet the needs of increasing numbers of older people. Emerging information and communication technologies (ICTs), such as pervasive computing and ambient assistive technology, have...
    $184.00

    Add to Cart The item has been added
  • Fault Detection and Isolation Fault Detection and Isolation
    Add to Cart The item has been added

    Fault Detection and Isolation

    "Fault Detection and Isolation: Multi-Vehicle Unmanned System" deals with the design and development of fault detection and isolation algorithms for unmanned vehicles such as spacecraft, aerial drones and other related vehicles. Addressing fault...
    $227.00

    Add to Cart The item has been added
  • Geometric Design of Linkages Geometric Design of Linkages
    Add to Cart The item has been added

    Geometric Design of Linkages

    This book is an introduction to the mathematical theory of design for articulated mechanical systems known as linkages. The focus is on sizing mechanical constraints that guide the movement of a work piece, or end-effector, of the system. The function of...
    $220.00

    Add to Cart The item has been added
  • Quantum Attacks on Public-Key Cryptosystems Quantum Attacks on Public-Key Cryptosystems
    Add to Cart The item has been added

    Quantum Attacks on Public-Key Cryptosystems

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The...
    $227.00

    Add to Cart The item has been added
  • Preserving Privacy in Data Outsourcing Preserving Privacy in Data Outsourcing
    Add to Cart The item has been added

    Preserving Privacy in Data Outsourcing

    Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties...
    $227.00

    Add to Cart The item has been added
  • The P=NP Question and Gödel's Lost Letter The P=NP Question and Gödel's Lost Letter
    Add to Cart The item has been added

    The P=NP Question and Gödel's Lost Letter

    ? DoesP=NP. In just ?ve symbols Dick Karp -in 1972-captured one of the deepest and most important questions of all time. When he ?rst wrote his famous paper, I think it's fair to say he did not know the depth and importance of his question. Now over...
    $227.00

    Add to Cart The item has been added
  • Open Networked "i-Learning" Open Networked "i-Learning"
    Add to Cart The item has been added

    Open Networked "i-Learning"

    Open Source Applications Springer Book Series Editor: Ernesto Damiani, University of Milan, Italy http://sesar.dti.unimi.it/ossbook/A new overall interdisciplinary framework called "i learning" integrates managerial organization and technology aspects...
    $227.00

    Add to Cart The item has been added
  • Adaptive Cryptographic Access Control Adaptive Cryptographic Access Control
    Add to Cart The item has been added

    Adaptive Cryptographic Access Control

    Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access...
    $227.00

    Add to Cart The item has been added
  • Web Service Mining Web Service Mining
    Add to Cart The item has been added

    Web Service Mining

    The new computing environment enabled by advances in service oriented arc- tectures, mashups, and cloud computing will consist of service spaces comprising data, applications, infrastructure resources distributed over the Web. This envir- ment embraces a...
    $227.00

    Add to Cart The item has been added
  • Dynamics of Information Systems Dynamics of Information Systems
    Add to Cart The item has been added

    Dynamics of Information Systems

    "Dynamics of Information Systems" presents state-of-the-art research explaining the importance of information in the evolution of a distributed or networked system. This book presents techniques for measuring the value or...
    $184.00

    Add to Cart The item has been added
  • Digital Libraries and Multimedia Digital Libraries and Multimedia
    Add to Cart The item has been added

    Digital Libraries and Multimedia

    Digital Libraries and Multimedia brings together in one place important contributions and up-to-date research results in this fast moving area. Digital Libraries and Multimedia serves as an excellent reference, providing...
    $184.00

    Add to Cart The item has been added
  • Principles of Computer Graphics Principles of Computer Graphics
    Add to Cart The item has been added

    Principles of Computer Graphics

    The Basics.- From Pixels to Shapes.- Making Them Move.- Pixels, Images and Image Files.- Let The Games Begin.- It's 3D Time!.- 3D Modeling.- Rendering: Shading and Lighting.- Advanced Techniques.- And Finally, Introducing Maya.- Making Them Move.-...
    $227.00

    Add to Cart The item has been added
  • Knowledge Discovery and Data Mining Knowledge Discovery and Data Mining
    Add to Cart The item has been added

    Knowledge Discovery and Data Mining

    This book presents a specific and unified approach to Knowledge Discovery and Data Mining, termed IFN for Information Fuzzy Network methodology. Data Mining (DM) is the science of modelling and generalizing common patterns from...
    $227.00

    Add to Cart The item has been added
  • Access Control Systems Access Control Systems
    Add to Cart The item has been added

    Access Control Systems

    Foundations of Security and Access Control in Computing.- to Identity-Management Models.- Elements of Trust Paradigms in Computing.- Mandatory-Access-Control Model.- Discretionary-Access Control and the Access-Matrix Model.- The Take-Grant Protection...
    $227.00

    Add to Cart The item has been added
  • Stabilization of Control Systems Stabilization of Control Systems
    Add to Cart The item has been added

    Stabilization of Control Systems

    The problem of controlling or stabilizing a system of differential equa­ tions in the presence of random disturbances is intuitively appealing and has been a motivating force behind a wide variety of results grouped loosely...
    $227.00

    Add to Cart The item has been added
  • Multimedia Data Hiding Multimedia Data Hiding
    Add to Cart The item has been added

    Multimedia Data Hiding

    Comprehensive coverage of an important and current hot topic.; Details both theoretical as well as practical aspects.; Presents new data hiding algorithms for images and videos.; Reveals a number of attacks and countermeasures...
    $227.00

    Add to Cart The item has been added
  • Cryptographic Security Architecture Cryptographic Security Architecture
    Add to Cart The item has been added

    Cryptographic Security Architecture

    Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the...
    $227.00

    Add to Cart The item has been added
  • Information and Complexity in Statistical Modeling Information and Complexity in Statistical Modeling
    Add to Cart The item has been added

    Information and Complexity in Statistical Modeling

    Information and Coding.- Shannon-Wiener Information.- Coding of Random Processes.- Statistical Modeling.- Kolmogorov Complexity.- Stochastic Complexity.- Structure Function.- Optimally Distinguishable Models.- The MDL Principle.- Applications.
    $227.00

    Add to Cart The item has been added
  • Control of Complex Systems Control of Complex Systems
    Add to Cart The item has been added

    Control of Complex Systems

    "Control of Complex Systems: Structural Constraints and Uncertainty" focuses on control design under information structure constraints, with a particular emphasis on large-scale systems. The complexity of such systems poses serious computational...
    $220.00

    Add to Cart The item has been added
  • Model-Based Control Model-Based Control
    Add to Cart The item has been added

    Model-Based Control

    Model-Based Control will be a collection of state-of-the-art contributions in the field of modelling, identification, robust control and optimization of dynamical systems, with particular attention to the application domains of motion control systems...
    $227.00

    Add to Cart The item has been added
  • Encryption for Digital Content Encryption for Digital Content
    Add to Cart The item has been added

    Encryption for Digital Content

    Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised...
    $227.00

    Add to Cart The item has been added
  • Hierarchy in Natural and Social Sciences Hierarchy in Natural and Social Sciences
    Add to Cart The item has been added

    Hierarchy in Natural and Social Sciences

    Hierarchy is a form of organisation of complex systems that rely on or produce a strong differentiation in capacity (power and size) between the parts of the system. It is frequently observed within the natural living world as...
    $227.00

    Add to Cart The item has been added
  • Coordinated Multiuser Communications Coordinated Multiuser Communications
    Add to Cart The item has been added

    Coordinated Multiuser Communications

    Coordinated Multiuser Communications provides for the first time a unified treatment of multiuser detection and multiuser decoding in a single volume. Many communications systems, such as cellular mobile radio and wireless...
    $227.00

    Add to Cart The item has been added
  • Existing in the Information Dimension Existing in the Information Dimension
    Add to Cart The item has been added

    Existing in the Information Dimension

    This book presents new insights into the nature of the human mind as a product of the brain. It discusses how biological and technological information systems differ from their counterparts with physical functions, presenting Emergent Information Theory...
    $347.00

    Add to Cart The item has been added
  • Decoding Black Swans and Other Historic Risk Events Decoding Black Swans and Other Historic Risk Events
    Add to Cart The item has been added

    Decoding Black Swans and Other Historic Risk Events

    The field of risk science is continuously evolving to develop principles and practices that people to manage future risk. Risk and uncertainty are prevalent yet, it is important to consider what is on the horizon, anticipate the possibility of future...
    $131.00

    Add to Cart The item has been added
  • PRMIA PRMIA
    Add to Cart The item has been added

    PRMIA

    Operational risk managers in the financial services industry must have a solid understanding of the best practices for the implementation of an effective risk management framework and the management of operational risk. Practices for Operational Risk...
    $140.00

    Add to Cart The item has been added
  • PRAGYANLOKAH PRAGYANLOKAH
    Add to Cart The item has been added

    PRAGYANLOKAH

    In all the folk festivals of Kosal region (Western Odisha) where-ever there is varua tattwa the principles of Astanga Yoga play their parts. One may wonder at this metaphysical discovery made by this author, but it is as true as broad daylight. To...
    $25.00

    Add to Cart The item has been added
  • Literary Sprouts Literary Sprouts
    Add to Cart The item has been added

    Literary Sprouts

    This book is a collection of critical appreciations of various literatures and genres. It is comprised with the collection of different writers from various literatures such as Margaret Atwood, Bhabani Bhattacharya, Aravind Adiga, Kamala Das, Toru Dutt,...
    $29.00

    Add to Cart The item has been added
  • Risk Management for Academicians and Practitioners Risk Management for Academicians and Practitioners
    Add to Cart The item has been added

    Risk Management for Academicians and Practitioners

    The book caters to the need of both beginners and experienced risk management professionals. The first ten chapters cover the fundamentals of risk management. Anyone without any background in risk management can gain a good understanding of the subject...
    $39.00

    Add to Cart The item has been added
  • Advancing Cyber Security Through Quantum Cryptography Advancing Cyber Security Through Quantum Cryptography
    Add to Cart The item has been added

    Advancing Cyber Security Through Quantum Cryptography

    With the increasing power of computing, cybersecurity faces mounting threats, making digital systems more vulnerable to attacks. While modern cryptography used to be compelling, it now shows vulnerabilities against rapidly growing computational...
    $480.00

    Add to Cart The item has been added
  • Innovations in Modern Cryptography Innovations in Modern Cryptography
    Add to Cart The item has been added

    Innovations in Modern Cryptography

    In today's interconnected digital landscape, cybersecurity threats pose significant challenges to individuals, organizations, and governments worldwide. Cyberattacks, data breaches, and malicious activities continue to escalate in sophistication and...
    $948.00

    Add to Cart The item has been added
  • Real-Time Data Decisions With AI and ChatGPT Techniques Real-Time Data Decisions With AI and ChatGPT Techniques
    Add to Cart The item has been added

    Real-Time Data Decisions With AI and ChatGPT Techniques

    Modern businesses face the challenge of how to most effectively harness the power of Artificial Intelligence (AI) to enhance customer engagement and streamline operations. The proliferation of AI tools like ChatGPT offers immense potential. Yet,...
    $469.00

    Add to Cart The item has been added
  • AI and Data Engineering Solutions for Effective Marketing AI and Data Engineering Solutions for Effective Marketing
    Add to Cart The item has been added

    AI and Data Engineering Solutions for Effective Marketing

    In the world of contemporary marketing, a challenge exists - the relationship between data engineering, artificial intelligence, and the essential elements of effective marketing. Businesses find themselves at a crossroads, grappling with the imperative...
    $665.00

    Add to Cart The item has been added
  • Utilizing AI Tools in Academic Research Writing Utilizing AI Tools in Academic Research Writing
    Add to Cart The item has been added

    Utilizing AI Tools in Academic Research Writing

    Those entrenched in academia often have daunting processes of formulating research questions, data collection, analysis, and scholarly paper composition. Artificial intelligence (AI) emerges as an invaluable ally, simplifying these processes and...
    $396.00

    Add to Cart The item has been added
  • Industrial Applications of Big Data, AI, and Blockchain Industrial Applications of Big Data, AI, and Blockchain
    Add to Cart The item has been added

    Industrial Applications of Big Data, AI, and Blockchain

    Blockchain has become the cornerstone of technologies, supported by others including Big Data and Artificial Intelligence (AI). Originating from cryptocurrency, it transcends boundaries, finding resonance in finance, healthcare, e-governance, and beyond...
    $475.00

    Add to Cart The item has been added
Research & information: general