Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book presents a study on how thread and data mapping techniques can be used to improve the performance of multi-core architectures.It describes how the memory hierarchy introduces non-uniform memory access, and how mapping can be used to reduce the memory access latency in current hardware architectures.On the software side, this book describes the characteristics present in parallel applications that are used by mapping techniques to improve memory access.Several state-of-the-art methods are analyzed, and the benefits and drawbacks of each one are identified.
It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band.
This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine learning.
This Open Access book will explore questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and ΓÇônowΓÇô connected human societies? Physicists have good models for describing the evolution of the universe since the Big Bang, but can we apply the same concepts to the evolution of aggregated matter ΓÇôliving matter included? The Amazing Journey analyzes the latest results in chemistry, biology, neuroscience, anthropology and sociology under the light of the evolution of intelligence, seen as the ability of processing information. The main strength of this book is using just two concepts used in physics ΓÇôinformation and energyΓÇô to explain: The emergence and evolution of life: procaryotes, eukaryotes and complex organismsThe emergence and evolution of the brainThe emergence and evolution of societies (human and not)Possible evolution of our "internet society" and the role that Artificial Intelligence is playing
This book presents a comprehensive review of heterogeneous face analysis and synthesis, ranging from the theoretical and technical foundations to various hot and emerging applications, such as cosmetic transfer, cross-spectral hallucination and face rotation.
This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.
This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.
This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.
This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence.
This book addresses software faults-a critical issue that not only reduces the quality of software, but also increases their development costs.
The considered problems include homogeneity testing (the so-called two sample problem), clustering with respect to distribution, clustering with respect to independence, change point estimation, identity testing, and the general problem of composite hypotheses testing.
This Brief investigates the intersections that occur between three different areas of study that normally would not touch each other: ODF, spline theory, and topology.The Least Squares Orthogonal Distance Fitting (ODF) method has become the standard technique used to develop mathematical models of the physical shapes of objects, due to the fact that it produces a fitted result that is invariant with respect to the size and orientation of the object. It is normally used to produce a single optimum fit to a specific object; this work focuses instead on the issue of whether the fit responds continuously as the shape of the object changes. The theory of splines develops user-friendly ways of manipulating six different splines to fit the shape of a simple family of epiTrochoid curves: two types of Bézier curve, two uniform B-splines, and two Beta-splines. This work will focus on issues that arise when mathematically optimizing the fit. There are typically multiple solutions to the ODF method, and the number of solutions can often change as the object changes shape, so two topological questions immediately arise: are there rules that can be applied concerning the relative number of local minima and saddle points, and are there different mechanisms available by which solutions can either merge and disappear, or cross over each other and interchange roles. The author proposes some simple rules which can be used to determine if a given set of solutions is internally consistent in the sense that it has the appropriate number of each type of solution.
The vast amounts of ontologically unstructured information on the Web, including HTML, XML and JSON documents, natural language documents, tweets, blogs, markups, and even structured documents like CSV tables, all contain useful knowledge that can present a tremendous advantage to the Artificial Intelligence community if extracted robustly, efficiently and semi-automatically as knowledge graphs. Domain-specific Knowledge Graph Construction (KGC) is an active research area that has recently witnessed impressive advances due to machine learning techniques like deep neural networks and word embeddings. This book will synthesize Knowledge Graph Construction over Web Data in an engaging and accessible manner. The book describes a timely topic for both early -and mid-career researchers. Every year, more papers continue to be published on knowledge graph construction, especially for difficult Web domains. This book serves as a useful reference, as well as an accessible but rigorous overview of this body of work. The book presents interdisciplinary connections when possible to engage researchers looking for new ideas or synergies. The book also appeals to practitioners in industry and data scientists since it has chapters on both data collection, as well as a chapter on querying and off-the-shelf implementations.
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
As an introduction to programming for the Digital Humanities (DH), this book presents six key assignments oriented on DH topics.
Second, the high-level classification scheme illustrated above provides a gentle introduction into the system space of data management: Abstracting from the extreme system diversity in this field, it helps readers build a mental model of the available options.
This SpringerBrief describes how to build a rigorous end-to-end mathematical framework for deep neural networks. In particular, the authors derive gradient descent algorithms in a unified way for several neural network structures, including multilayer perceptrons, convolutional neural networks, deep autoencoders and recurrent neural networks.
This book examines how digital technology is being used to assist the artists and designers. Augmented and virtual reality techniques can be used to preview designs before they are finalized and implemented. Art and design have shaped the values, social structures, communications, and the culture of communities and civilisations.
As more and more industries are experiencing digital disruption, using information technology to enable a competitive advantage becomes a critical success factor for all enterprises. This book covers the authors' insights on how AI technologies can fundamentally reshape the IT services delivery lifecycle to deliver better business outcomes through a data-driven and knowledge-based approach. Three main challenges and the technologies to address them are discussed in detail:· Gaining actionable insight from operational data for service management automation and improved human decision making· Capturing and enhancing expert knowledge throughout the lifecycle from solution design to ongoing service improvement · Enabling self-service for service requests and problem resolution, through intuitive natural language interfacesThe authors are top researchers and practitioners with deep experience in the fields of artificial intelligence and IT service management and are discussing both practical advice for IT teams and advanced research results. The topics appeal to CIOs and CTOs as well as researchers who want to understand the state of the art of applying artificial intelligence to a very complex problem space. Although the book is concise, it comprehensively discuss topics like gaining insight from operational data for automatic problem diagnosis and resolution as well as continuous service optimization, AI for solution design and conversational self-service systems.
This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network.
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects.
For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.
Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree.
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases.
however, classical belief revision is not well suited for logics such as Description Logics.Belief Revision in Non-Classical Logics presents a framework which can be applied to a wide class of logics that include - besides most Description Logics such as the ones behind OWL - Horn Logic and Intuitionistic logic, amongst others.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.