You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
As we increase our reliance on computer-generated information, often using it as part of our decision-making process, we must devise tools to assess the correctness of that information. Consider, for example, software embedded on vehicles, used for simulating aircraft performance, or used in medical imaging. In those cases, software correctness is of paramount importance as there's little room for error. Software verification is one of the tools available to attain such goals. Verification is a well known and widely studied subfield of computer science and computational science and the goal is to help us increase confidence in the software implementation by verifying that the software does w...
Boundaries and Hulls of Euclidean Graphs: From Theory to Practice presents concepts and algorithms for finding convex, concave and polygon hulls of Euclidean graphs. It also includes some implementations, determining and comparing their complexities. Since the implementation is application-dependent, either centralized or distributed, some basic concepts of the centralized and distributed versions are reviewed. Theoreticians will find a presentation of different algorithms together with an evaluation of their complexity and their utilities, as well as their field of application. Practitioners will find some practical and real-world situations in which the presented algorithms can be used.
The 7 revised full papers, 11 revised medium-length papers, 6 revised short, and 7 demo papers presented together with 10 poster/abstract papers describing late-breaking work were carefully reviewed and selected from numerous submissions. Provenance has been recognized to be important in a wide range of areas including databases, workflows, knowledge representation and reasoning, and digital libraries. Thus, many disciplines have proposed a wide range of provenance models, techniques, and infrastructure for encoding and using provenance. The papers investigate many facets of data provenance, process documentation, data derivation, and data annotation.
One of the greatest scientific challenges of the 21st century is how to master, organize and extract useful knowledge from the overwhelming flow of information made available by today’s data acquisition systems and computing resources. Visualization is the premium means of taking up this challenge. This book is based on selected lectures given by leading experts in scientific visualization during a workshop held at Schloss Dagstuhl, Germany. Topics include user issues in visualization, large data visualization, unstructured mesh processing for visualization, volumetric visualization, flow visualization, medical visualization and visualization systems. The book contains more than 350 color illustrations.
Linked Data (LD) is a well-established standard for publishing and managing structured information on the Web, gathering and bridging together knowledge from different scientific and commercial domains. The development of Linked Data Visualization techniques and tools has been followed as the primary means for the analysis of this vast amount of information by data scientists, domain experts, business users, and citizens. This book covers a wide spectrum of visualization issues, providing an overview of the recent advances in this area, focusing on techniques, tools, and use cases of visualization and visual analysis of LD. It presents the basic concepts related to data visualization and the...
The algorithms involve using techniques from computer science and mathematics to solve combinatorial problems whose associated data require the use of a hierarchy of storage devices. The 15 papers discuss such topics as synopsis data structures for massive data sets, maximum clique problems in very large graphs, concrete software libraries, computing on data streams, efficient cross-trees for external memory, efficient schemes for distributing data on parallel memory systems, and external memory techniques for iso-surface extraction in scientific visualization. Annotation copyrighted by Book News, Inc., Portland, OR.
This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, IPAW 2006, held in Chicago, Il, USA in May 2006. The 26 revised full papers presented together with two keynote papers were carefully selected for presentation during two rounds of reviewing and improvement. The papers are organized in topical sections.
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enha...
Beschrijving van vijfentwintig open source applicaties.