Account
Orders
Advanced search
This books reviews recent theoretical and practical advances on suffix sorting and introduces algorithmic solutions to problems of wide interest for the construction of fundamental data structures that operate efficiently on strings namely, constructing the suffix...
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
The author considers the problem of sequential probability forecasting in the most general setting, where the observed data may exhibit an arbitrary form of stochastic dependence. All the results presented are theoretical, but they concern the foundations of some...
This book focuses on the clarification of what actually a handbook is, the systematic identification of what ought to be considered as “settled knowledge” (extracted from historic repositories) for inclusion into such a handbook, and the “assembly” of such...
This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine...
This book explores the key idea that the dynamical properties of complex systems can be determined by effectively calculating specific structural features using network science-based analysis. Furthermore, it argues that certain dynamical behaviours can stem from the...
This Open Access book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and –now– connected human societies? Physicists have good models for describing the evolution of the universe since the Big...
This book introduces the software defined system concept, architecture, and its enabling technologies such as software defined sensor networks (SDSN), software defined radio, cloud/fog radio access networks (C/F-RAN), software defined networking (SDN), network function...
This book provides the readers with retrospective and prospective views with detailed explanations of component technologies, speech recognition, language translation and speech synthesis.Speech-to-speech translation system (S2S) enables to break language barriers,...
This book describes several approaches to adaptability that are applied for the optimization of parallel applications, such as thread-level parallelism exploitation and dynamic voltage and frequency scaling on multicore systems.This book explains how software developers...
This book discusses non-orthogonal multiple access (NOMA) and the various issues in NOMA networks, including capability, sustainability, and security.This book starts from the basics and key techniques of NOMA. Subsequently, the authors discuss three critical issues in...
This Springerbrief presents an overview of problems and technologies behind segmentation and separation of overlapped latent fingerprints, which are two fundamental steps in the context of fingerprint matching systems. It addresses five main aspects: (1) the need for...
This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms,...
This SpringerBrief discusses the most recent research in the field of multimedia QoE evaluation, with a focus on how to evaluate subjective multimedia QoE problems from objective techniques. Specifically, this SpringerBrief starts from a comprehensive overview of...
This book is about quantum computing and quantum algorithms. The book starts with a chapter introducing the basic rules of quantum mechanics and how they can be used to build quantum circuits and perform computations.Further, Grover's algorithm is presented for...
In this book, the authors discuss the recent developments in computational techniques for automated non-invasive facial emotion detection and analysis with particular focus on the smile. By way of applications, they discuss how genuine and non-genuine smiles can be...
This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Further, it analyses sentiments in Twitter blogs from both textual and visual content using hierarchical deep learning networks: hierarchical gated feedback...
This book addresses software faults—a critical issue that not only reduces the quality of software, but also increases their development costs. Various models for predicting the fault-proneness of software systems have been proposed; however, most of them provide...
This book is about a new approach in the field of computational linguistics related to the idea of constructing n-grams in non-linear manner, while the traditional approach consists in using the data from the surface structure of texts, i.e., the linear structure.In...
Stationarity is a very general, qualitative assumption, that can be assessed on the basis of application specifics. It is thus a rather attractive assumption to base statistical analysis on, especially for problems for which less general qualitative assumptions,...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers