Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Flexibility analysis and regulation technology of clean energy system
  • Language: en
  • Pages: 234
Computational Intelligence
  • Language: en
  • Pages: 1363

Computational Intelligence

This is the proceedings of the International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 2006. The book presents 165 revised full papers, carefully chosen and reviewed, organized in topical sections on fuzzy systems, fuzzy-neuro-evolutionary hybrids, supervised, unsupervised and reinforcement learning, intelligent agent and Web applications, intelligent fault diagnosis, natural language processing and expert systems, natural language human-machine interface using artificial neural networks, and intelligent financial engineering.

Advances in Swarm Intelligence
  • Language: en
  • Pages: 631

Advances in Swarm Intelligence

  • Type: Book
  • -
  • Published: 2012-06-13
  • -
  • Publisher: Springer

This book and its companion volume, LNCS vols. 7331 and 7332, constitute the Proceedings of the Third International conference on Swarm Intelligence, ICSI 2012, held in Shenzhen, China in June 2012. The 145 full papers presented were carefully reviewed and selected from 247 submissions. The papers are organized in 27 cohesive sections covering all major topics of swarm intelligence research and developments.

Versatile Cybersecurity
  • Language: en
  • Pages: 286

Versatile Cybersecurity

  • Type: Book
  • -
  • Published: 2018-10-17
  • -
  • Publisher: Springer

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. Th...

Database Systems for Advanced Applications
  • Language: en
  • Pages: 820

Database Systems for Advanced Applications

The 4 volume set LNCS 12112-12114 constitutes the papers of the 25th International Conference on Database Systems for Advanced Applications which will be held online in September 2020. The 119 full papers presented together with 19 short papers plus 15 demo papers and 4 industrial papers in this volume were carefully reviewed and selected from a total of 487 submissions. The conference program presents the state-of-the-art R&D activities in database systems and their applications. It provides a forum for technical presentations and discussions among database researchers, developers and users from academia, business and industry.

Non-Volatile Memory Database Management Systems
  • Language: en
  • Pages: 173

Non-Volatile Memory Database Management Systems

This book explores the implications of non-volatile memory (NVM) for database management systems (DBMSs). The advent of NVM will fundamentally change the dichotomy between volatile memory and durable storage in DBMSs. These new NVM devices are almost as fast as volatile memory, but all writes to them are persistent even after power loss. Existing DBMSs are unable to take full advantage of this technology because their internal architectures are predicated on the assumption that memory is volatile. With NVM, many of the components of legacy DBMSs are unnecessary and will degrade the performance of data-intensive applications. We present the design and implementation of DBMS architectures that...

Information Security and Cryptology - ICISC 2011
  • Language: en
  • Pages: 522

Information Security and Cryptology - ICISC 2011

  • Type: Book
  • -
  • Published: 2012-07-16
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed conference proceedings of the 14th International Conference on Information Security and Cryptology, held in Seoul, Korea, in November/December 2011. The 32 revised full papers presented were carefully selected from 126 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on hash function, side channel analysis, public key cryptography, network and mobile security, digital signature, cryptanalysis, efficient implementation, cryptographic application, and cryptographic protocol.

Streaming Data Mesh
  • Language: en
  • Pages: 226

Streaming Data Mesh

Data lakes and warehouses have become increasingly fragile, costly, and difficult to maintain as data gets bigger and moves faster. Data meshes can help your organization decentralize data, giving ownership back to the engineers who produced it. This book provides a concise yet comprehensive overview of data mesh patterns for streaming and real-time data services. Authors Hubert Dulay and Stephen Mooney examine the vast differences between streaming and batch data meshes. Data engineers, architects, data product owners, and those in DevOps and MLOps roles will learn steps for implementing a streaming data mesh, from defining a data domain to building a good data product. Through the course of the book, you'll create a complete self-service data platform and devise a data governance system that enables your mesh to work seamlessly. With this book, you will: Design a streaming data mesh using Kafka Learn how to identify a domain Build your first data product using self-service tools Apply data governance to the data products you create Learn the differences between synchronous and asynchronous data services Implement self-services that support decentralized data