You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 11th Algorithms and Data Structures Symposium, WADS 2009, held in Banff, Canada, in August 2009. The Algorithms and Data Structures Symposium - WADS (formerly "Workshop on Algorithms and Data Structures") is intended as a forum for researchers in the area of design and analysis of algorithms and data structures. The 49 revised full papers presented in this volume were carefully reviewed and selected from 126 submissions. The papers present original research on algorithms and data structures in all areas, including bioinformatics, combinatorics, computational geometry, databases, graphics, and parallel and distributed computing.
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
Rapid advancements in mobile computing and communication technology and recent technological progress have opened up a plethora of opportunities. These advancements have expanded knowledge, facilitated global business, enhanced collaboration, and connected people through various digital media platforms. While these virtual platforms have provided new avenues for communication and self-expression, they also pose significant threats to our privacy. As a result, we must remain vigilant against the propagation of electronic violence through social networks. Cyberbullying has emerged as a particularly concerning form of online harassment and bullying, with instances of racism, terrorism, and vari...
In the last decades, various mathematical problems have been solved by computer-assisted proofs, among them the Kepler conjecture, the existence of chaos, the existence of the Lorenz attractor, the famous four-color problem, and more. In many cases, computer-assisted proofs have the remarkable advantage (compared with a “theoretical” proof) of additionally providing accurate quantitative information. The authors have been working more than a quarter century to establish methods for the verified computation of solutions for partial differential equations, mainly for nonlinear elliptic problems of the form -∆u=f(x,u,∇u) with Dirichlet boundary conditions. Here, by “verified computati...
This volume provides the academic and industrial community with a medium for presenting original research and applications related to information assurance and security using computational intelligence techniques. It details current research on information assurance and security regarding both the theoretical and methodological aspects, as well as various applications in solving real world problems using computational intelligence.
Global optimization is concerned with the computation and characterization of global optima of nonlinear functions. During the past three decades the field of global optimization has been growing at a rapid pace, and the number of publications on all aspects of global optimization has been increasing steadily. Many applications, as well as new theoretical, algorithmic, and computational contributions have resulted. The Handbook of Global Optimization is the first comprehensive book to cover recent developments in global optimization. Each contribution in the Handbook is essentially expository in nature, but scholarly in its treatment. The chapters cover optimality conditions, complexity results, concave minimization, DC programming, general quadratic programming, nonlinear complementarity, minimax problems, multiplicative programming, Lipschitz optimization, fractional programming, network problems, trajectory methods, homotopy methods, interval methods, and stochastic approaches. The Handbook of Global Optimization is addressed to researchers in mathematical programming, as well as all scientists who use optimization methods to model and solve problems.
This book discusses Internet of Things (IoT) as it relates to enterprise applications, systems, and infrastructures. The authors discuss IoT and how it’s disrupting industries such as enterprise manufacturing, enterprise transportation, enterprise smart market, enterprise utilities, and enterprise healthcare. They cover how IoT in the enterprise will have a major impact on the lives of consumers and professionals around the world and how it will change the way we think about professional and consumer networks. The book's topics include IoT enterprise system architecture, IoT enabling enterprise technologies, and IoT enterprise services and applications. Examples include enterprise on demand, market impacts, and implications on smart technologies, big data enterprise management, and future enterprise Internet design for various IoT use cases, such as share markets, healthcare, smart cities, smart environments, smart communications and smart homes.
"This book examines the current state of global media distribution today, including legacy and born-digital media industries, and the social, cultural, and economic impact of the digital distribution ecosystem"--
Revised and updated, this second edition of Walter Gautschi's successful Numerical Analysis explores computational methods for problems arising in the areas of classical analysis, approximation theory, and ordinary differential equations, among others. Topics included in the book are presented with a view toward stressing basic principles and maintaining simplicity and teachability as far as possible, while subjects requiring a higher level of technicality are referenced in detailed bibliographic notes at the end of each chapter. Readers are thus given the guidance and opportunity to pursue advanced modern topics in more depth. Along with updated references, new biographical notes, and enhanced notational clarity, this second edition includes the expansion of an already large collection of exercises and assignments, both the kind that deal with theoretical and practical aspects of the subject and those requiring machine computation and the use of mathematical software. Perhaps most notably, the edition also comes with a complete solutions manual, carefully developed and polished by the author, which will serve as an exceptionally valuable resource for instructors.
Social Media and Society brings together a range of scholars working at the intersection of discourse studies, digital media, and society. It is meant to respond to changes in discourse technologies, i.e. the techno-discursive dynamic of social media discourses. The book critically engages with the digital dynamics of representations around discourses of identity, politics, and culture. Other than its topical focus on highly pertinent discourses, the book aspires to offer some fresh insights into the theory, methods, and implementation of CDS in digital environments. The book can be viewed as part of the developing research framework of Social Media Critical Discourse Studies which seeks to integrate the impact of new mediation technologies on discursive meaning-making with its critical contextualisation. In addition to its strongly global outlook, the book incorporates a wide range of research perspectives including CDA, sociolinguistics, political discourse studies, media and technology, discourse theory, popular culture, feminism etc.