Speech is the natural medium of human communication, but audible speech can be overheard by bystanders and excludes speech-disabled people. This work presents a speech recognizer based on surface electromyography, where electric potentials of the…
This open access book presents a collection of papers focusing on current 3D research challenges in the domain of digital cultural heritage. 3D technologies find considerable use within the field of cultural heritage at the beginning of the 21st…
n this work we present a stand-off, long wave infrared (LWIR) spectroscopy system for remote detection of hazardous substances. The principle is based upon wavelength selective illumination using External Cavity Quantum Cascade Lasers, that are…
The goal of this work is to provide building blocks for resource-aware robot architectures. The topic of these blocks are data-driven generation of context-sensitive resource models, prediction of future resource utilizations, and resource-aware…
The goal of this work is to provide building blocks for resource-aware robot architectures. The topic of these blocks are data-driven generation of context-sensitive resource models, prediction of future resource utilizations, and resource-aware…
A Different Road To College: A Guide For Transitioning Non-Traditional Students is designed to introduce students to the contextual issues of college. Non-traditional students have an ever-growing presence on college campuses, especially community…
This Open Access book is a guide to good, responsible research at each step of the process of research discovery, so that a researcher at the beginning of a scientific career has a clear pathway to doing good research and producing reliable results.…
This Open Access book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical systems. The contributions in the book summarize the content of invited lectures given at the workshop “Embedded…
The Biology 256 Laboratory course was designed to provide students with hands-on access to modern techniques in human physiological analyses using the course-based research pedagogical approach. In this course, students will learn how to perform…
This open access book examines how the form of the list features as a tool for meaning-making in the genre of detective fiction from the nineteenth to the twenty-first century. The book analyzes how both readers and detectives rely on listing as an…
Digital technologies old and new are not objects that can be packed inside a box. They are a seamless, indivisible combination of people, organizations, policies, economies, histories, cultures, knowledge, and material things that are continuously…
Many modern computer systems, including homogeneous and heterogeneous architectures, support shared memory in hardware. In a shared memory system, each of the processor cores may read and write to a single shared address space. For a shared memory…
Written for students and instructors in an advanced legal research course, this book uses the steps of the legal research process to facilitate skills practice, collaboration, and reflection. It proposes a hypothetical as a basis for practicing the…
Written for students and instructors in an advanced legal research course, this book uses the steps of the legal research process to facilitate skills practice, collaboration, and reflection. It proposes a hypothetical as a basis for practicing the…
his work develops a set of advanced signaling concepts for IP-based networks. It proposes a design for secure and authentic signaling and provides QoS signaling support for mobile users. Furthermore, this work develops methods which allow for…
Advanced Virtual Assistants (AVAs) are computer programs that use artificial intelligence (AI) to perform various tasks for human users. These AI-powered assistants can help with multiple activities, including scheduling appointments, answering…
This open access book pertains to the "International Conference on Cultural Tourism Advances," held on June 27 and 28, 2023, at KU Leuven, Belgium. It focuses on advancing understanding of the sustainable development potential of cultural tourism by…
Given the current research direction toward ubiquitous information sharing and digitalization, the huge amount of documents in the world’s largest libraries and archives are stored as digital data in big data centers, including those of Google,…
This open access book constitutes the proceedings of the 18th International Conference on Intelligent Data Analysis, IDA 2020, held in Konstanz, Germany, in April 2020. The 45 full papers presented in this volume were carefully reviewed and selected…
This open access book constitutes the proceedings of the 21st International Conference on Agile Software Development, XP 2020, which was planned to be held during June 8-12, 2020, at the IT University of Copenhagen, Denmark. However, due to the…
This open access book constitutes the proceedings of the 23rd International Conference on Agile Software Development, XP 2022, which was held in Copenhagen, Denmark, in June 2022. XP is the premier agile software development conference combining…
This open access book constitutes the proceedings of the 22nd International Conference on Agile Software Development, XP 2021, which was held virtually during June 14-18, 2021. XP is the premier agile software development conference combining…
This open access book constitutes the proceedings of the 23rd International Conference on Agile Software Development, XP 2022, which was held in Copenhagen, Denmark, in June 2022. XP is the premier agile software development conference combining…
This open access book constitutes the proceedings of the 24th International Conference on Agile Software Development, XP 2023, which took place in Amsterdam, The Netherlands, during June 13-16, 2023. XP is the premier agile software development…
This open access book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile…
This open access book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic neural network, which is an important theoretical branch of deep reinforcement learning. In order to enhance the…
This open Access book constitutes the refereed proceedings of the First International Workshop on AI in Drug Discovery, AIDD 2024, held as a part of the 33rd International Conference on Artificial Neural Networks, ICANN 2024, in Lugano, Switzerland,…
AI (Artificial Intelligence) is predicted to radically change teaching and learning in both schools and industry causing radical disruption of work. AI can support well-being initiatives and lifelong learning but educational institutions and…
AI (Artificial Intelligence) is predicted to radically change teaching and learning in both schools and industry causing radical disruption of work. AI can support well-being initiatives and lifelong learning but educational institutions and…
This open access book constitutes the revised selected papers of the First International Symposium on AI, Data and Digitalization, SAIDD 2023, held in Sogndal, Norway, during May 9–10, 2023. The 13 full papers included in this volume were carefully…
"Air Safety Investigation – The Journey" is an introductory book that explores the world of air safety investigation. Unlike a how-to manual for investigating aviation accidents, this book focuses on the essential knowledge and mindset required to…
This book is designed for use in an introductory course on digital logic design, typically offered in computer engineering, electrical engineering, computer science, and other related programs. Such a course is usually offered at the sophomore level.…
An introductory text for college or graduate course in computer networks, with a balance between practical matters and underlying principles. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP.
This textbook serves as a gentle introduction for undergraduates to theoretical concepts in data structures and algorithms in computer science while providing coverage of practical implementation (coding) issues. The field of computer science (CS)…
This work focuses the recognition of complex human activities in video data. A combination of new features and techniques from speech recognition is used to realize a recognition of action units and their combinations in video sequences. The…
The number of Android devices running on Intel processors has gradually increased ever since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel…
We wrote Android on x86: an Introduction to Optimizing for Intel® Architecture to provide a one-stop, detailed resource for the topic’s best practices and procedures. The book encompasses the installation issues, hardware optimization issues,…
This book has been replaced by the omnibus edition of The Busy Coder's Guide to Android Development, and so this book is no longer available in digital form as a separate title. Visit the page for The Busy Coder's Guide to Android Development to…
Heptafluoropropane (R227ea) is a good refrigerant that reduces greenhouse effects and ozone depletion. In practical applications, we usually have to know the compressed liquid densities at different temperatures and pressures. However, the measurement…
Quality attributes, such as performance or reliability, are crucial for the success of a software system and largely influenced by the software architecture. Their quantitative prediction supports systematic, goal-oriented software design and forms a…
This open access book presents the first comprehensive overview of general methods in Automated Machine Learning (AutoML), collects descriptions of existing systems based on these methods, and discusses the first series of international challenges of…
The explosive growth of the Internet has fundamentally changed the
global society. The emergence of concepts like service-oriented architecture
(SOA), Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS),…
In Basic Engineering Data Collection and Analysis, Stephen B. Vardeman and J. Marcus Jobe stress the practical over the theoretical. Step by step, students get real engineering data and scenario examples along with chapter-long case studies that…
This textbook was written for a community college introductory course in spreadsheets utilizing Microsoft Excel. While the figures shown utilize Excel 2016, the textbook was written to be applicable to other versions of Excel as well. The book…
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor…
Blueprints is a concise yet comprehensive coverage of Object-Oriented Analysis and Design concepts, suitable for a second programming course in Computer Science. It introduces and teaches application development in a command-line environment, and…
This open access book describes modern applications of computational human modeling in an effort to advance neurology, cancer treatment, and radio-frequency studies including regulatory, safety, and wireless communication fields. Readers working on…
Security is an ever-present consideration for applications and data in the cloud. It is a concern for executives trying to come up with criteria for migrating an application, for marketing organizations in trying to position the company in a good…
In component-based software engineering, performance prediction approaches support the design of business information systems on the architectural level. They are based on behavior specifications of components. This work presents a round-trip…
What is digital business reporting? Why do we need it? And how can we improve it? This book aims to address these questions by illustrating the rise of system-to-system information exchange and the opportunities for improving transparency and…
Rather than working at the usual scales of distant reading, this book shows what happens when we bring techniques from the digital humanities to bear on a single novel for close readings.
This paper is about the incremental computation of control sequences for discrete event
systems in uncertain environments where uncontrollable events may occur. Timed Petri nets are used
for this purpose. The aim is to drive the marking of the net…
Communicating Fashion offers a holistic view of the interrelationships involved in trend research, including data collection, analysis and reporting, and forecasting what that direction means for design. The book’s primary focus is on the process of…
Today’s technology product markets, particularly in the information and communications technology (henceforth “ICT”) sector, are inherently international.
Products designed in California may be assembled in Taiwan from parts sourced from Korea,…
This chapter begins with an introduction to Digital Humanities (DH) and outlines its development since c.1949. It demonstrates that the application of
computing to cultural heritage has been ongoing for some 70 years yet the histories of DH have,…
This open access book introduces a general framework that allows natural language researchers to enhance existing competence theories with fully specified performance and processing components. Gradually developing increasingly complex and…
This book offers a collection of 17 scientific papers about the computational modeling of fracture. Some of the manuscripts propose new computational methods and/or how to improve existing cutting edge methods for fracture. These contributions can be…
Although scientific computing is very often associated with numeric computations, the use of computer algebra methods in scientific computing has obtained considerable attention in the last two decades. Computer algebra methods are especially…
Before we go into details on various computer designs concepts, we need to
understand how to interpret the performance of a computer system. To start with, we will look at some basic metric and benchmarks for the measurement of a computer's…
When the first computers were built during the second world war, they were expensive and isolated. However, after about twenty years, as their prices gradually decreased, the first experiments began to connect computers together. In the early 1960s,…
Nowadays, everyone is using the Internet. We have hooked our computers to the
Internet, where we can access information and transmit messages. The Internet is a
very large computer network. Computer networks are so important in our daily life
that…
This work considers several hypothetical control processes on the nanoscopic level and show their analogy to computation processes. It shows that measuring certain types of quantum observables is such a complex task that every instrument that is able…
In summary, my goal is to survey the methods people are using for feature description— the key metrics generated—and make it easier for anyone to understand the methods in practice, and how to evaluate the methods using the vision taxonomy and…
Drugs are generally devised to alter the function of cells in a favorable manner. The actions of drugs can in some cases be represented by mathematical models often phrased in terms of differential equations. Our aim in these notes is to study…
Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and…
Scholars in the social sciences are increasingly expected to incorporate both quantitative and qualitative techniques and methods into their research. The growth of “mixed-methods” research is evident in social science disciplines ranging from…
In software development, project constraints lead to customer-specific variants by copying and adapting the product. During this process, modifications are scattered all over the code. Although this is flexible and efficient in the short term, a…
This open access Brief introduces the basic principles of control theory in a concise self-study guide. It complements the classic texts by emphasizing the simple conceptual unity of the subject. A novice can quickly see how and why the different…
The complexity of technical systems increases, breakdowns occur quite often. The mission of organic computing is to tame these challenges by providing degrees of freedom for self-organised behaviour. To achieve these goals, new methods have to be…
Electronic documents frequently include contributions from different human and non-human sources. The Web, for instance, offers ever-changing content and services which can perform activities during document creation. This thesis introduces a…
his is a multimedia-enabled case in which students will be guided, by an industry expert, to apply structured problem-solving that addresses a typical supply chain problem, missing parts. What first appears as the issue may be a symptom of a root…
Critical Thinking in Academic Research will introduce students to the techniques and principles of critical thinking. However, a commitment to lifelong learning is required for critical thinking, it takes more than a single course or reading a book.…
Critical Thinking in Academic Research - 2nd Edition provides examples and easy-to-understand explanations to equip students with the skills to develop research questions, evaluate and choose the right sources, search for information, and understand…
"Culturally Responsive Computing" is an essential textbook that explores the intricate relationship between technology and global societies. It gives students and professionals a deep understanding of how cultural contexts shape and are shaped by…
A System of System (SoS) stems from the integration of existing systems (legacy systems), normally operated by different organizations, and new systems that have been designed to take advantage of this integration. Many of the established assumptions…
This open access book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a…
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a…
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
This Open Access book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have emerged particularly within the last five years. This book introduces the most prominent reliability concerns…
Laboratory Integration Management Solution (LIMS) is a software/hardware system which is used in
industrial laboratories for the integration of all laboratory software and instruments, training laboratory users, QA and QC. LIMS may also support data…
This college-level textbook guides students through five different types of arguments: evaluations, responses, persuasive rhetorical arguments, proposals, and practical professional development arguments. Students are introduced to rhetorical…
Most business leaders would agree that reaching the broadest audience is good for a business’s bottom line. A good portion of that audience will be people with disabilities. How, though, would an organization go about ensuring it is as accessible as…
"Edited by organisers of “Digital Classicist” seminars in London and Berlin, this volume explores the impact of computational approaches to the study of antiquity on audiences other than the scholars who conventionally publish it. In addition to…
Digital Foundations uses formal exercises of the Bauhaus to teach the Adobe Creative Suite. All students of digital design and production—whether learning in a classroom or on their own—need to understand the basic principles of design in order to…
Three decades of societal and cultural alignment of new media have yielded a host of innovations, trials, and problems, accompanied by versatile popular and academic discourse. New Media Studies crystallized internationally into an established…
In robotic beating heart surgery, a remote-controlled robot can be used to carry out the operation while automatically canceling out the heart motion. The surgeon controlling the robot is shown a stabilized view of the heart. First, we consider the…
Document Image Processing allows systems like OCR, writer identification, writer recognition, check processing, historical document processing, etc., to extract useful information from document images. What we call a document image ranges from images…
Doing Critical and Creative Research in Adult Education brings together leading and emerging scholars in adult education in order to capture the vitality and complexity of contemporary adult education research, marked by the desire to conduct…
A modules-based approach to learning research skills that emphasizes the reflective nature of information discovery, the contextual basis for evaluating that information, and a recognition that information has value.
The book develops a unifying perspective on how learning influences evolutionary dynamics which for the first time explains seemingly contradicting results from the literature. It also reveals formerly unknown facets of the complex interplay of the…
nformation Society is advancing along a route of ecosystemic evolution. ICT and Internet advancements, together with the progression of the systemic approach for enhancement and application of Smart Systems, are grounding such an evolution. The…
This text is designed to introduce and expand upon material related to the C programming language and embedded controllers, and specifically, the Arduino development system and associated Atmel ATmega microcontrollers. It is intended to fit the time…
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from…
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from…
This handbook was developed to support the course, Experiences in Biodiversity Research, which exists to provide early undergraduates with experience in the practice of biodiversity research and demystify the path to careers in this field. Although…
Vibration problems lead to differential equations with solutions that oscillate in time, typically in a damped or undamped sinusoidal fashion. Such solutions put certain demands on the numerical methods compared to other phenomena whose solutions are…
The book is based on “First semester in Numerical Analysis with Julia”, written by Giray Ökten. The contents of the original book are retained, while all the algorithms are implemented in Python (Version 3.8.0). Python is an open source (under OSI),…
This textbook was created to provide an introduction to research methods for BSW and MSW students, with particular emphasis on research and practice relevant to students at the University of Texas at Arlington. It provides an introduction to social…
This open access book constitutes the proceedings of the 25th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2022, which was held during April 4-6, 2022, in Munich, Germany, as part of the European…
The technologies currently employed for modeling complex systems, such as aircraft, spacecraft, or infrastructures, are sufficient for system description, but do not allow deriving knowledge about the modeled systems. This work provides the means to…
This open access book constitutes the proceedings of the 25th International Conference on Fundamental Approaches to Software Engineering, FASE 2022, which was held during April 4-5, 2022, in Munich, Germany, as part of the European Joint Conferences…
The purpose of this book is to teach new programmers and scientists about the basics of High Performance Computing. Too many parallel and high performance computing books focus on the architecture, theory and computer science surrounding HPC. This…
"How to Think Like a Computer Scientist: Learning with Python" is an introduction to computer science using the Python programming language. It covers the basics of computer programming, including variables and values, functions, conditionals and…
The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mathematics, Engineering, and Natural Science. Like mathematicians, computer…
This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and…
This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and…
Although computer networks are inherently parallel systems, the parallel execution of network simulations on interconnected processors frequently yields only limited benefits. In this thesis, methods are proposed to estimate and understand the…
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users…
nformation flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input.…
Students need to understand systems and the systems concept, and they need to understand the role of ICT in enabling systems. Students will learn the characteristics of good systems (e.g., intuitive, likable, error-resistant, fast, flexible, and the…
Welcome to Information Systems for Business and Beyond. In this book, you will be introduced to the
concept of information systems, their use in business, and the larger impact they are having on our world.
This book is written as an introductory…
This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought…
This open access book chronicles the rise of a new scientific paradigm offering novel insights into the age-old enigmas of existence. Over 300 years ago, the human mind discovered the machine code of reality: mathematics. By utilizing abstract…
With the increasing importance of reliability in business and industrial IT systems, new techniques for architecture-based software reliability prediction are becoming an integral part of the development process. This dissertation thesis introduces a…
This book introduces concepts in mobile, autonomous robotics to 3rd-4th year students in Computer Science or a related discipline. The book covers principles of robot motion, forward and inverse kinematics of robotic arms and simple wheeled…
This book acknowledges our changing information landscape, covering key concepts in information literacy to support a research process with intention. We start by critically examining the online environment many of us already engage with every day,…
Introduction to Computer Graphics is a free, on-line textbook covering the fundamentals of computer graphics and computer graphics programming. This book is meant for use as a textbook in a one-semester course that would typically be taken by…
Computer science studies how to describe, predict properties of, and efficiently implement information processes. This book introduces the most important ideas in computing using the Scheme and Python programming languages. It focuses on how to…
San Francisco, Portland, Austin, Madison, and Minneapolis are considered some of the country’s best-designed and most politically liberal cities. Mention of each brings to mind public parks, ample bike lanes, eclectic music scenes,…
The Internet, personal devices and multicore computers have greatly changed and enhanced our lives by allowing us to access information and entertainment ondemand anytime, anywhere. While these technologies are great on their own merit,
the reality…
Internet marketing is the fastest growing and most exciting branch of marketing
today. as the world becomes ever more connected, keeping up with developments
and trends is vital for marketers trying to reach new audiences – who are…
Introduction to Programming Languages is designed to formalize and consolidate the knowledge of programming languages gained in the introductory courses a computer science curriculum and to provide a base for further studies in the semantics and…
Computers are everywhere in our daily lives. Between the desktop, laptop, phone, bank, and vehicle, it is difficult to completely get away from computers. It only makes sense to learn a little about how a computer really works.This text provides an…
Introductory Business Statistics with Interactive Spreadsheets – 1st Canadian Edition is an adaptation of Thomas K. Tiemann’s book, Introductory Business Statistics. This new edition still contains the basic ideas behind statistics, such as…
Knowledge for Humans is a textbook aimed at introducing students to fundamental questions about knowledge and skepticism. Many topics often covered in epistemology textbooks are also covered here, such as radical Cartesian skepticism, phenomenalism,…
Knowledge Services converges information management, knowledge management (KM), and strategic learning into a single enterprise-wide discipline for the benefit of the business or organization in which it is practiced. With the success of knowledge…
Laying the Foundation: Digital Humanities in Academic Libraries examines the library’s role in the development, implementation, and instruction of successful digital humanities projects. It pays special attention to the critical role of librarians in…
With the recent advances in remote sensing technologies for Earth observation, many different remote sensors are collecting data with distinctive properties. The obtained data are so large and complex that analyzing them manually becomes impractical…
With the recent advances in remote sensing technologies for Earth observation, many different remote sensors are collecting data with distinctive properties. The obtained data are so large and complex that analyzing them manually becomes impractical…
Taking up the challenge of navigating the complex world of digital humanities, Making Sense of Digital Humanities offers readers an exploration of the many ways scholars have employed the diverse toolkit of digital humanities to create a better…
In an era of rapid change and increasing societal demands, the role of universities as knowledge producers and catalysts for change has come under scrutiny. This open access book offers a fresh perspective on the significance of universities in…
This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is…
Modern biology is rapidly becoming a study of large sets of data. Understanding these data sets is a major challenge for most life sciences, including the medical, environmental, and bioprocess fields. Computational biology approaches are essential…
Plan Ceibal is the name coined in Uruguay for the local implementation of the One Laptop Per Child (OLPC) initiative. Plan Ceibal distributes laptops and tablets to students and teachers, and also deploys a nationwide wireless network to provide…
There are a number of excellent, comprehensive, and in-depth texts on MIPS assembly language programming. This is not one of them.The purpose of this text is to provide a simple and free reference for university level programming and architecture…
Optimization is considered as a decision-making process for getting the most out of available resources for the best attainable results. Many real-world problems are multi-objective or multi-attribute problems that naturally involve several competing…
With the success of websites such as YouTube, streaming is no doubt one of the most important multimedia applications. This module explains two very different
approaches to building a streaming application.
With a streaming server such as Microsoft…
On the Internet, everything we love and everything we hate has a name. It also has a number or a string of 0s and 1s making it technically viable. And, more often than not, it comes with a price tag, whether visible or disguised as data value. Since…
This module will enable you to understand various wireless technologies, especially
those that have been infused into our daily lives. Also, a range of wireless network
protocols and wireless LAN design models will be discussed. Another topic that…
Multidimensional imaging techniques provide powerful ways to examine various kinds of scientific questions. The routinely produced data sets in the terabyte-range, however, can hardly be analyzed manually and require an extensive use of automated…
By restricting to Gaussian distributions, the optimal Bayesian filtering problem can be transformed into an algebraically simple form, which allows for computationally efficient algorithms. Three problem settings are discussed in this thesis: (1)…
There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book.
Open Signals and Systems Laboratory Exercises is a collection of lab assignments that have been used in EE 224: Signals and Systems I in the Department of Electrical and Computer Engineering at Iowa State University. These lab exercises have been…
Despite the high precision of laser, it remains challenging to control the laser-bone ablation without injuring the underlying critical structures. Providing an axial resolution on micrometre scale, OCT is a promising candidate for imaging…
In Networked Control Systems (NCS), components of a control loop are connected by data networks that may introduce time-varying delays and packet losses into the system, which can severly degrade control performance. Hence, this book presents the…
Programming patterns are solutions to problems that require the creation of a small fragment of code that will be part of a larger program. Hence, this book is about teaching you how to write such fragments of code. However, it is not about teaching…
This book is a self-paced, open access training in peer review. In eight modules it asks readers to engage in a variety of activities to learn the who, what, why, and how of peer review. It is geared to library professionals, library school students,…
Evolution is happening all around us. In many cases – lately, due to technological advances in molecular biology – scientists can now describe the evolutionary
process in exquisite detail. For example, we know exactly which genes change in frequency…
Most books that use MATLAB are aimed at readers who know how to program. This book is for people who have never programmed before.
As a result, the order of presentation is unusual. The book starts with scalar values and works up to vectors and…
Polimetrics: A Stata Companion, authored by Dr. Josh Franco, is an Open Education Resource workbook licensed CC BY-NC and designed as a Stata companion to Introduction to Political Science Research Methods.
Ontologies and semantic metadata can theoretically solve all problems of traditional full-text search engines. In practice, however, they are always imperfect. This work analyzed whether the negative effect of ontology imperfection is higher than the…
This open-access textbook is for those who want to write exemplary social research. It provides an extensive outline of each step of the research process: outlining practical tools for conceptualizing its beginnings, generating proposals, getting…
This book delves into the embodied ground of thinking, illuminating the transition from theorising about the embodied mind to actively practising embodied thinking in research, teaching, and learning. The authors speak from immersing themselves in…
PowerPoint 2010 is a complete presentation graphics program that allows you to produce professional looking presentations.
Slides can be created and displayed as a slide show on your computer, video projector, or on the Internet. Information from a…
Principles of Computer System Design is the first textbook to take a principles-based approach to the computer system design. It identifies, examines, and illustrates fundamental concepts in computer system design that are common across operating…
A comprehensive theoretical and practical guide to the operating principles of knowledge auditing, illustrated with numerous case studies.A knowledge audit provides an “at a glance” view of an organization's needs and opportunities. Its purpose is to…
Producing Open Source Software is a book about the human side of open source development. It describes how successful projects operate, the expectations of users and developers, and the culture of free software. The book is released under an open…
Digital information products are an important class of widely used digital products, whose core benefit is the delivery of information or education (e.g., electronic books, online newspapers, e-learning courses).This book introduces a novel and…
Today, most people are experienced with computer programs, typically programs such as Word, Excel, PowerPoint, Internet Explorer, and Photoshop. The interaction with such programs is usually quite simple and intuitive: you click on buttons, pull down…
This open access book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April 5-7, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS…
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better…
This guide is designed to support health and social care researchers and practitioners to integrate qualitative research into the evidence base of health and social care research. Qualitative research designs are diverse and each design has a…
Ranking - the algorithmic decision on how relevant an information artifact is for a given information need and the sorting of artifacts by their concluded relevancy - is an integral part of every search engine. In this book we investigate how…
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale…
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale…
Computer assisted surgery systems intraoperatively support the surgeon by providing information on the location of hidden risk and target structures during surgery. However, soft tissue deformations make intraoperative registration (and thus…
In photon science more and more data are taken. It is not possible anymore to store and process all data offline. In this book, we explore strategies for handling this large amount of data. A neural network as well as techniques from image processing…
Growing from Reframing History, a podcast about history theory and practice, Reframing Digital Humanities: Conversations with Digital Humanists, Julian Chambliss, Professor of English at Michigan State University, brings together a diverse group of…
Research Data Management is a term for all the things that researchers do to structure, organize and maintain data before, during and after doing research. RDM is also an emerging discipline that is concerned with researching and developing ways to…
This book is based on two open-access textbooks: Bhattacherjee’s (2012) Social science research: Principles, methods, and practices and Blackstone’s (2012) Principles of sociological inquiry: Qualitative and quantitative methods. I first used…
This textbook is an adaptation of the Research Methods in Psychology that is available on this site in US and Canadian editions. This New Zealand edition is an adaptation to the New Zealand context. The main changes are in Chapters 1 and 3 and the…
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective…
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with…
Safety and reliability are two important aspects of science and technology. They are
highly related, and they complement each other, i.e. they provide each other with
more information than could be obtained individually. When safety and reliability…
Software has changed the rules of the game. The world talks about the digitalization in industry and society – how the focus has shifted from producing tangible things towards software and services. This trend started many years ago, but is now…
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing…
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless…
In last few decades, short-term load forecasting (STLF) has been one of the most important research issues for achieving higher efficiency and reliability in power system operation, to facilitate the minimization of its operation cost by providing…
To manage the influx of information into surgical practice, new man-machine interaction methods are necessary to prevent information overflow. This work presents an approach to automatically segment surgeries into phases and select the most…
Social data analysis enables you, as a researcher, to organize the facts you collect during your research. Your data may have come from a questionnaire survey, a set of interviews, or observations. They may be data that have been made available to…
This book offers a concise and gentle introduction to finite element programming in Python based on the popular FEniCS software library. Using a series of examples, including the Poisson equation, the equations of linear elasticity, the…
Steps to Success: Crossing the Bridge Between Literacy Research and Practice introduces instructional strategies linked to the most current research-supported practices in the field of literacy. The book includes chapters related to…
This book, built in PressBooks with financial support from the UCF Digital Learning Course Redesign Initiative, contains 14 chapters, each of which contains two to six pages about the process of literary research. Pages contain learning objectives,…
Support Vector Machines - One of the most successful learning algorithms; getting a complex model at the price of a simple one. Lecture 14 of 18 of Caltech's Machine Learning Course - CS 156 by Professor Yaser Abu-Mostafa. View course materials in…
This Open Access book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and –now– connected human societies? Physicists have good models for describing the evolution of the…
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the…
This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research…
This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research…
This open access book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing…
The work addresses communication networks established over radio equipped vehicles in our everyday road traffic, so called Vehicular Ad Hoc Networks (VANETs), and discusses their impact on two major goals, namely traffic safety and traffic…
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.
While it is easy to describe conceptually, implementation is…
It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile,…
This open access book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by…
This book is intended for college students in computer science and related fields, as well as professional software engineers, people training in software engineering, and people preparing for technical interviews. Before you start this book, you…
The time prediction and planning capacity of the human race is particularly evident in some of the early great constructions. An excellent example is the building of the Great Pyramid of Giza, around 4500 years ago. We do not know much about the…
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the…
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the…
Extended object tracking deals with estimating the shape and pose of an object based on noisy point measurements. This task is not straightforward, as we may be faced with scarce low-quality measurements, little a priori information, or we may be…
Statistical relationships among the variables of a complex system reveal a lot about its physical behavior. Therefore, identification of the relevant variables and characterization of their interactions are crucial for a better understanding of a…
Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design…
The goal of this book is simple: We would like to show how mortality dynamics can be visualized in the so-called Lexis diagram. To appeal to as many potential readers as possible, we do not require any specialist knowledge. This approach may be…
Web Accessibility for Developers is a technical book aimed primarily at programmers. Learn how to develop accessible interactivity on the Web and gain expertise using WAI-ARIA, a W3C specification that enables optimal use of assistive technologies,…
Websites are created using a set of standard technologies. Many of these technologies
involve markup and programming languages for encoding page content and
specifying the appearance and interactive behaviour of Web elements. In this module,
you…
Workplace Software and Skills is designed to flexibly support a range of courses covering computer literacy, Microsoft Office, and Google Suite applications. The textbook covers both hard and soft skills that are applicable to a broad range of…
The purpose of this text is to provide a reference for University level assembly language and systems programming courses. Specifically, this text addresses the x86-64 instruction set for the popular x86-64 class of processors using the Ubuntu 64-bit…