1 - 20
Next
- Tsukerman, Emmanuel.
- Birmingham : Packt Publishing, Limited, 2019.
- Description
- Book — 1 online resource (338 pages)
- Summary
-
- Cover
- Title Page
- Copyright and Credits
- About Packt
- Contributors
- Table of Contents
- Preface
- Chapter 1: Machine Learning for Cybersecurity
- Technical requirements
- Train-test-splitting your data
- Getting ready
- How to do it ...
- How it works ...
- Standardizing your data
- Getting ready
- How to do it ...
- How it works ...
- Summarizing large data using principal component analysis
- Getting ready
- How to do it ...
- How it works ...
- Generating text using Markov chains
- Getting ready
- How to do it ...
- How it works ...
- Performing clustering using scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Training an XGBoost classifier
- Getting ready
- How to do it ...
- How it works ...
- Analyzing time series using statsmodels
- Getting ready
- How to do it ...
- How it works ...
- Anomaly detection with Isolation Forest
- Getting ready
- How to do it ...
- How it works ...
- Natural language processing using a hashing vectorizer and tf-idf with scikit-learn
- Getting ready
- How to do it ...
- How it works ...
- Hyperparameter tuning with scikit-optimize
- Getting ready
- How to do it ...
- How it works ...
- Chapter 2: Machine Learning-Based Malware Detection
- Technical requirements
- Malware static analysis
- Computing the hash of a sample
- Getting ready
- How to do it ...
- How it works ...
- YARA
- Getting ready
- How to do it ...
- How it works ...
- Examining the PE header
- Getting ready
- How to do it ...
- How it works ...
- Featurizing the PE header
- Getting ready
- How to do it ...
- How it works ...
- Malware dynamic analysis
- Getting ready
- How to do it ...
- How it works ...
- Using machine learning to detect the file type
- Scraping GitHub for files of a specific type
- Getting ready
- How to do it ...
- How it works ...
- Classifying files by type
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two strings
- Getting ready
- How to do it ...
- How it works ...
- Measuring the similarity between two files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams
- Getting ready
- How to do it ...
- How it works ...
- Selecting the best N-grams
- Getting ready
- How to do it ...
- How it works ...
- Building a static malware detector
- Getting ready
- How to do it ...
- How it works ...
- Tackling class imbalance
- Getting ready
- How to do it ...
- How it works ...
- Handling type I and type II errors
- Getting ready
- How to do it ...
- How it works ...
- Chapter 3: Advanced Malware Detection
- Technical requirements
- Detecting obfuscated JavaScript
- Getting ready
- How to do it ...
- How it works ...
- Featurizing PDF files
- Getting ready
- How to do it ...
- How it works ...
- Extracting N-grams quickly using the hash-gram algorithm
- Getting ready
- How to do it ...
- How it works ...
- See also
- Building a dynamic malware classifier
- International Summit on Internet of Things (1st : 2014 : Rome, Italy)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xxxii, 388 pages) : illustrations Digital: text file.PDF.
- Summary
-
- PowerOnt: An Ontology-based Approach for Power Consumption Estimation in Smart Homes
- A Learning Approach for Energy Efficiency Optimization by Occupancy Detection
- Intelligent Multi-platform Middleware for Wireless Sensor and Actuator Networks
- Sense-Deliberate-Act Cognitive Agents for Sense-Compute-Control Applications in the Internet of Things & amp Services
- A novel Term-Term similarity score based information foraging assessment
- A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applications
- Design and Implementation of IoT-based Intelligent Condition Management System for the Industrial Facilities
- A Cognitive Approach to Affordance Learning in Robotic Ecologies
- Resource Constrained Devices
- A Reputation-based Distributed District Scheduling Algorithm for Smart Grids
- Eliciting Affordances for Smart Objects in IoT Era
- The Role of Affordance in Cyber-Physical Systems for Behavioral Change
- Cognitive Load Detection on Commercial EEG Devices: An Optimized Signal Processing Chain
- From Language to Action: Extraction and Disambiguation of Affordances in ModelAct
- Understanding Stroke Patients' Motivation for Motivation-driven Rehabilitative Game Design
- A Game-Based Solution for In-Home Rehabilitation
- Evaluation of Pervasive Games: Recruitment of Qualified Participants through Preparatory Game Phases
- Internet of Things based Multiplayer Pervasive Games: An architectural analysis 20 PacMap: Transferring PacMan to the Physical Realm
- Exergames for Elderly in Ambient Assisted Living Environments
- Determinants for performance and technology Acceptance
- IoT Meets Caregivers: a Healthcare Support System in Assisted Living Facilities
- Development of a Remote Monitoring System for Respiratory Analysis
- HeartSense: Estimating Heart Rate from Smartphone Photoplethysmogram using Adaptive Filter and Interpolation
- A Trustworthy Mobile Solution for Healthcare based on Internet of Things
- Security and Privacy Issues in Wireless Sensor Networks for Healthcare
- Multilingual Voice Control for Endoscopic Procedures
- Recognition of Low Amplitude Body Vibrations via Inertial Sensors for Wearable Computing
- Preventing health emergencies in an unobtrusive way
- Web-Enabled Intelligent Gateways for eHealth.
- Cham : Springer, 2018.
- Description
- Book — 1 online resource (IX, 275 pages) : 83 illustrations Digital: text file; PDF.
- Summary
-
- A New Approach for Learning User Preferences for a Ridesharing Application.- An Altruistic-based Utility Function for Group Recommendation.- Two-Stage Reinforcement Learning Algorithm for Quick Cooperation in Repeated Games.- Recursive Reductions of Action Dependencies for Coordination-based Multiagent Planning.- Controlling a single transport robot in a flexible job shop environment by hybrid metaheuristics.- Can Evolution Strategies Benefit from Shrinkage Estimators?.- An Emotional Multi-Personality Architecture for Intelligent Conversational Agents.- Towards General Cooperative Game Playing.- Comparing the Effects of Disturbances in Self-Adaptive Systems - A Generalised Approach for the Quantification of Robustness.- Analysis of Perceived Helpfulness in Adaptive Autonomous Agent Populations.- Evaluating Task-Allocation Strategies for Emergency Repair in MAS.
- .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
4. API management : an architect's guide to developing and managing APIs for your organization [2017]
- De, Brajesh, author.
- First edition. - New York : Apress, [2017]
- Description
- Book — 1 online resource : illustrations Digital: text file; PDF.
- Summary
-
- 1. Introduction to API
- s2. Concepts and Technologies for API Managemen
- t3. Designing RESTful API Interface
- s4. API Documentatio
- n5. API Pattern
- s6. API Version Managemen
- t7. API Securit
- y8. API Monetizatio
- n9. API Testing Strateg
- y10. API Analytic
- s11. API Developer Porta
- l12. API Governance.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Plikynas, Darius, author.
- Cham : Springer, 2016.
- Description
- Book — 1 online resource (325 pages)
- Summary
-
- Intro; Foreword by Prof. Andrea Omicini; Foreword by Prof. John T. Cacioppo; Preface; Contents; Abbreviations; 1 Synopsis; 2 Towards Wave-like Approach; 3 Oscillation-Based Social Simulation Paradigm: The Conceptual Premises; 4 From Baseline Individual to Social Neurodynamics: Experimental Framework; 5 Oscillations-Based Simulation of Human Brain EEG Signal Dynamics Using Coupled Oscillators Energy Exchange Model (COEEM); 6 Mind-Field States and Transitions: Quantum Approach; 7 OAM Simulation Setup and Results Using Entropy and Free Energy Terms.
- 8 OAM-Based MAS: Collective Circadian Rhythms' Simulation Setup and Results9 Agent-Based Modeling of Excitable Social Media Fluctuations; 10 Agent-Based Modeling of Fluctuations in Automated Trading Systems; 11 Epilogue; Appendix A: Autopoietic Systems1; Appendix B: Global Workspace Theory7; Appendix C: Embodied and Distributed Cognition11; Appendix D: Cognition, Categorization, and Adaptive Resonance12; References; 2.1 Overview; 2.2 Evolving Economic Systems; 2.3 Methodological Framework; 2.4 Pervasive Information Field (PIF) Concept; 2.5 Wave-like Interaction Mechanism (WIM)
- 3.1 General Outlines3.2 The OSIMAS Paradigm: Basic Hypothesis, Assumptions, and Postulates; 3.3 The Pervasive Information Field (PIF): Extended Conceptual Framework; 3.4 Information Versus Order in the Case of Coherent Oscillations; 3.5 Related Other Approaches; 4.1 Overview of the Related Research Scope; 4.2 The OSIMAS Paradigm: Conceptual and Experimental Framework; 4.3 EEG Experimental Setup: Cross-Correlation of Individual Mind States; 4.4 Further Prospects; 5.1 Neuroscience Context; 5.2 The COEEM Setup and Phase-Locking Mechanism.
- 5.3 COEEM Refind with Narrow Spectral Bands Superposition Approach5.4 The Results of the COEEM Simulation for Short and Long Periods; 5.5 Concluding Remarks; 6.1 Stylized Quantum States Model; 6.2 Constraints and Conditions; 7.1 OAM in Terms of Free Energy and Negentropy; 7.2 Bridging the Gap: Quantum Beats Approach; 7.3 OAM Construction Framework; 7.4 BMS as Dynamic Processes; 7.5 Simulation Setup: Circadian Cycles Case; 7.6 Simulation Results; 8.1 OAM-Based MAS Construction Principles; 8.2 Simulation Setup: Coherent Collective Circadian Cycles; 8.3 Simulation Results; 9.1 Overview.
- 9.2 The Basic Model9.3 Social Media Model Composed of Several Agent Groups; 9.4 Propagation of Two Competing Signals in Populations of Agents; 10.1 Introduction; 10.2 Mimicking of Financial Times Series by Excitable Agent Media; 10.3 Portfolio Management Rules in High-Dimensional Situations; 10.4 Data Used and Its Preliminary Analysis; 2.5.1 The Latent (Involuntary) Emission and Absorption Process; 2.5.2 The Active (Voluntary) Emission and Absorption Process.
- ANTS (Conference : Swarm intelligence) (11th : 2018 : Rome, Italy)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xiv, 438 pages) : illustrations. Digital: text file; PDF.
- Summary
-
- Full Papers.- Short Papers.- Extended Abstracts.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- APWeb-WAIM (Conference) (2nd : 2018 : Macau, China)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xiii, 394 pages) : illustrations. Digital: text file; PDF.
- Summary
-
- Mobile web data analytics.- Big data analytics for healthcare.- Knowledge graph management and analysis.- Data management and mining on MOOCs.- Data science. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Drescher, Daniel, author.
- New York, NY : Apress, [2017]
- Description
- Book — 1 online resource (xv, 255 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Stage 1: Terminology and Technical Foundations.-
- Step 1: Thinking in Layers and Aspects.-
- Step 2: Seeing the Big Picture.-
- Step 3: Recognizing the Potential.-
- Stage 2: Why the Blockchain Is Needed.-
- Step 4: Discovering the Core Problem.-
- Step 5: Disambiguating the Term.-
- Step 6: Understanding the Nature of Ownership.-
- Step 7: Spending Money Twice.-
- Stage 3: How the Blockchain Works.-
- Step 8: Planning the Blockchain.-
- Step 9: Documenting Ownership.-
- Step 10: Hashing Data.-
- Step 11: Hashing in the Real World.-
- Step 12: Identifying and Protecting User Accounts.-
- Step 13: Authorizing Transactions.-
- Step 14: Storing Transaction Data.-
- Step 15: Using the Data Store.-
- Step 16: Protecting the Data Store.-
- Step 17: Distributing the Data Store Among Peers.-
- Step 18: Verifying and Adding Transactions.-
- Step 19: Choosing a Transaction History.-
- Step 20: Paying for Integrity.-
- Step 21: Bringing the Pieces Together.-
- Stage 4: Limitations and Their Solutions.-
- Step 22: Seeing the Limitations.-
- Step 23: Reinventing the Blockchain.-
- Stage 5: Using the Blockchain, Summary, and Outlook
- Step 24: Using the Blockchain.- Step 25: Summarizing and Going Further.-
- Bibliography.-.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- SAFECOMP (Conference) (37th : 2018 : Västerås, Sweden)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xxi, 312 pages) : illustrations. Digital: text file; PDF.
- Summary
-
- Automotive Safety Standards and Cross-domain Reuse Potential.- Autonomous Driving and Safety Analysis.- Verification.- Multi-concern Assurance.- Fault Tolerance.- Safety and Security Risk.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
10. The Autonomous Enterprise : Powered by AI [2022]
- Burnett, Sarah author.
- Swindon, UK : BCS, The Chartered Institute for IT, [2022]
- Description
- Book — 1 online resource (221 pages)
- Summary
-
- Introduction and Overview
- What You Need to Know About AI
- AI for Innovation
- AI for Efficiency
- The Bionic Customer Service Agent at Siemens Global Business Services
- Retaining the Human Touch at Calderdale Council
- Artificial Intelligence Improving Stroke Care at the Royal Berkshire NHS Foundation Trust
- AI in Sales Optimization at Wärtsilä
- The Autonomous Enterprise
- Automation and Society
11. The Autonomous Enterprise : Powered by AI [2022]
- Burnett, Sarah author.
- Swindon, UK : BCS, The Chartered Institute for IT, [2022]
- Description
- Book — 1 online resource (221 pages)
- Summary
-
- Introduction and Overview What You Need to Know About AI AI for Innovation AI for Efficiency The Bionic Customer Service Agent at Siemens Global Business Services Retaining the Human Touch at Calderdale Council Artificial Intelligence Improving Stroke Care at the Royal Berkshire NHS Foundation Trust AI in Sales Optimization at Wartsila The Autonomous Enterprise Automation and Society.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Cham : Springer, [2016]
- Description
- Book — 1 online resource (xxvi, 680 pages) : illustrations (some color) Digital: text file.PDF.
- Summary
-
- Intro; Foreword; Preface; Donation for Life; Contents; Contributors; Abbreviations; 1 Introduction to the Microsatellite Platform; 2 The FLP Platform Operability; 3 Data Handling and Control Concept; 4 Core Data Handling Subsystem; 5 Power Supply Subsystem; 6 Platform Communication Subsystem; 7 Attitude Control Subsystem; 8 Thermal Control Subsystem; 9 Payload Control Subsystem ; 10 Failure Detection, Isolation and Recovery Concept; 11 Satellite Mission Phases and Planning; 12 Stuttgart Mission Control Infrastructure ; 13 Stuttgart/DLR Infrastructure for LEOP.
- 14 Earth Observation Mission Planning15 Flight Procedures; 16 FLP Mission Information Database; 17 Annexes and Data Sheets; References; Index; Abstract; 1.1 The University Small Satellite Program; 1.2 Satellite Orbit; 1.3 Mechanical Design and Launcher Interface; 1.4 Technology and Payloads; 1.5 Platform Re-usability; 1.6 Platform Redundancy Concept; 1.7 Power Subsystem and Electrical Block Diagram; 1.8 Core Data Handling Subsystem; 1.9 FLP Payload Control Computer; 1.10 Attitude Control Subsystem; 1.11 Reaction Control Subsystem; 1.12 Communication Subsystem; 1.13 Thermal Control Subsystem.
- 1.14 Satellite Deorbiting at End of Life1.15 Possible Mechanical Platform Configurations; Abstract; 2.1 Spacecraft Configuration Handling Concept; 2.2 Spacecraft Telecommand and Telemetry Structure; 2.3 Application Process ID Definitions (APIDs); 2.4 PUS Tailoring Concept; 2.5 Spacecraft Commandability and Observability; 2.6 Spacecraft On-board Time Management; Abstract; 3.1 Onboard Software Architecture; 3.2 OBSW Object Types; 3.3 Observability Functions Provided by the OBSW; 3.4 FLP Software Dynamic Architecture; 3.5 Onboard Software Death Report; Abstract.
- 4.1 On-Board Data Handling Subsystem4.2 Combined Data and Power Management Infrastructure; 4.3 Data Management; 4.4 System Boot at Launcher Separation; 4.5 OBSW Controlled Functions; 4.6 Core DHS Subsystem Control; Abstract; 5.1 Subsystem Overview; 5.2 Solar Panels; 5.3 Solar Array Deployment Mechanism; 5.4 Battery; 5.5 Power Control and Distribution Unit; 5.6 Power Subsystem Control; Abstract; 6.1 TTC Subsystem Overview; 6.2 Signal Acquisition Procedure; 6.3 TTC Subsystem Control; Abstract; 7.1 Subsystem Overview; 7.2 Mission Objectives and ACS Subsystem Modes; 7.3 Magnetometers.
- 7.4 Sun Sensor Unit7.5 GPS Receiver System; 7.6 Fiberoptic Gyroscopes; 7.7 Star Tracker; 7.8 Reaction Wheels; 7.9 Magnetotorquers; 7.10 Extensions for FLP Generation 2; 7.11 ACS Subsystem Control; Abstract; 8.1 Thermal Subsystem Overview; 8.2 Sensors, Calibration, Limits; 8.3 TCS Subsystem Control; Abstract; 9.1 Aspects of Payload Control and Data Handling; 9.2 Payload Control on the First FLP Based Satellite; 9.3 Payload Control in Network-Centric Architectures; Abstract; 10.1 General Principles; 10.2 Core DHS FDIR; 10.3 Power FDIR; 10.4 Equipment FDIR; 10.5 TTC FDIR; 10.6 ACS FDIR.
- Madry, Scott, author.
- New York : Springer, [2015]
- Description
- Book — 1 online resource : illustrations (some color) Digital: text file; PDF.
- Summary
-
- Chapter 1. Global Navigation Satellite Systems
- Chapter 2. Doppler Satellite Positioning, Telemetry and Data Systems
- Chapter 3. Precision and Navigational PNT Systems
- Chapter 4. Aided and Augmentation Systems, and Differential GPS
- Chapter 5. Applications of PNT Systems
- Chapter 6. National and International Governmental Policy Issues
- Chapter 7. Conclusions and Future Directions
- 8. Top Ten Things to Know About GNSS
- Appendix 1. Key Terms and Acronyms
- Appendix 2. Selected Bibliography
- Appendix 3. Selected Websites.
- European Conference on Computer Vision (15th : 2018 : Munich, Germany)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xxxi, 847 pages) : illustrations
- Summary
-
- Learning for vision
- Computational photography
- Human analysis
- Human sensing
- Stereo and reconstruction
- Optimization
- Matching and recognition
- Video attention
- Poster sessions.
- Switzerland : Springer, 2016.
- Description
- Book — 1 online resource (xvi, 421 pages) : illustrations (some color)
- Summary
-
- 1 Introduction.- 2 Contributing Disciplines.- 3 Design of Serious Games.- 4 Authoring Processes and Tools.- 5 Content and Content Production.- 6 Game Engines.- 7 Personalization and Adaptation.- 8 Multiplayer Serious Games.- 9 Player Experience.- 10 Performance Assessment in Serious Games.- 11 Serious Games - Economic and Legal Issues.- 12 Serious Games Application Examples.- About the Authors.- Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Summit on Internet of Things (1st : 2014 : Rome, Italy)
- Cham : Springer, 2015.
- Description
- Book — 1 online resource (xxvii, 332 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Part 1 User-centric IoT.
- Part 2 IoT infrastructures.
- Mignault, Francis, author.
- [New York] : Apress, [2016]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Part I: APEX Overview
- 1. About APEX Part II: Architectur
- e2. APEX in the Databas
- e3. Middle-tie
- r4. Database Advanced Securit
- y5. APEX and Oracle E-Business Suit
- e6. High Availabilit
- y7. APEX in Multitenant Deployment Part III: Configuratio
- n8. Installin
- g9. Upgrading and Patchin
- g10. Configurin
- g11. Administer APEX in Runtime Only Mode
- 12. Database and APEX Backup
- s13. Self-Provisioning Workspaces Part IV: Tuning
- 14. Monitorin
- g15. Performance and Tunin
- g16. Resource Manager and APEX.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mignault, Francis, author.
- [New York] : Apress, [2016]
- Description
- Book — 1 online resource Digital: text file.PDF.
- Summary
-
- Part I: APEX Overview
- 1. About APEX Part II: Architectur
- e2. APEX in the Databas
- e3. Middle-tie
- r4. Database Advanced Securit
- y5. APEX and Oracle E-Business Suit
- e6. High Availabilit
- y7. APEX in Multitenant Deployment Part III: Configuratio
- n8. Installin
- g9. Upgrading and Patchin
- g10. Configurin
- g11. Administer APEX in Runtime Only Mode
- 12. Database and APEX Backup
- s13. Self-Provisioning Workspaces Part IV: Tuning
- 14. Monitorin
- g15. Performance and Tunin
- g16. Resource Manager and APEX.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- German Conference on Artificial Intelligence (41st : 2018 : Berlin, Germany)
- Cham, Switzerland : Springer, 2018.
- Description
- Book — 1 online resource (xiv, 424 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Keynote Talks.- Keynote: Session-based Recommendation - Challenges and Recent Advances.- Reasoning.- Model Checking for Coalition Announcement Logic.- Fusing First-order Knowledge Compilation and the Lifted Junction Tree Algorithm.- Towards Preventing Unnecessary Groundings in the Lifted Dynamic Junction Tree Algorithm.- Acquisition of Terminological Knowledge in Probabilistic Description Logic.- Multi-Agent Systems.- Group Envy Freeness and Group Pareto Efficiency in Fair Division with Indivisible Items.- Approximate Probabilistic Parallel Multiset Rewriting using MCMC.- Efficient Auction Based Coordination for Distributed Multi-Agent Planning in Temporal Domains Using Resource Abstraction.- Maximizing Expected Impact in an Agent Reputation Network.- Developing a Distributed Drone Delivery System with a Hybrid Behavior Planning System.- Robotics.- A Sequence-Based Neuronal Model for Mobile Robot Localization.- Acquiring knowledge of object arrangements from human examples for household robots.- Learning.- Solver Tuning and Model Configuration.- Condorcet's Jury Theorem for Consensus Clustering.- Sparse Transfer Classification for Text Documents.- Towards Hypervector Representations for Learning and Planning with Schemas.- LEARNDIAG: A Direct Diagnosis Algorithm Based On Learned Heuristics.- Planning.- Assembly Planning in Cluttered Environments through Heterogeneous Reasoning.- Extracting Planning Operators from Instructional Texts for Behaviour Interpretation.- Risk-Sensitivity in Simulation Based Online Planning.- Neural Networks.- Evolutionary Structure Minimization of Deep Neural Networks for Motion Sensor Data.- Knowledge Sharing For Population Based Neural Network Training.- Limited Evaluation Evolutionary Optimization of Large Neural Networks.- Understanding NLP Neural Networks by the Texts They Generate.- Visual Search Target Inference using Bag of Deep Visual Words.- Analysis and Optimization of Deep Counterfactual Value Networks.- Search. -A Variant of Monte-Carlo Tree Search for Referring Expression Generation.- Preference-Based Monte Carlo Tree Search.- Belief Revision.- Probabilistic Belief Revision via Similarity of Worlds Modulo Evidence.- Intentional Forgetting in Artificial Intelligence Systems: Perspectives and Challenges.- Kinds and Aspects of Forgetting in Common-Sense Knowledge and Belief Management.- Context Aware Systems.- Bounded-Memory Stream Processing.- An Implementation and Evaluation of User-centered Requirements for Smart In-House Mobility Services.- Cognitive Approach.- Predict the Individual Reasoner: A New Approach.- The Predictive Power of Heuristic Portfolios in Human Syllogistic Reasoning.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- CWSN (Conference) (8th : 2014 : Xi'an, China)
- Heidelberg : Springer, 2015.
- Description
- Book — 1 online resource (xviii, 701 pages) : illustrations Digital: text file.PDF.
- Summary
-
- Power control and management
- Network architecture and deployment
- Positioning and location-based services in wireless sensor networks
- Security and privacy
- Wireless communication systems and protocols
- Routing algorithm and transport protocols in wireless sensor networks
- Wireless communication protocols and sensor data quality, integrity and trustworthiness
- Internet of Things
- Wireless mobile network architecture, in-vehicle network
- Indoor positioning and location-based services
- Applications of wireless sensor networks.
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.