Search results:
Found 12
Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Covering the authors' own state-of-the-art research results, this book presents a rigorous, modern account of the mathematical methods and tools required for the semantic analysis of logic programs. It significantly extends the tools and methods from traditional order theory to include nonconventional methods from mathematical analysis that depend on topology, domain theory, generalized distance functions, and associated fixed-point theory. The authors closely examine the interrelationships between various semantics as well as the integration of logic programming and connectionist systems/neural networks.
Computer Science (General) --- Intelligent Systems --- Machine Learning --- SCI-TECH --- COMPUTERSCIENCE --- ITECH --- INFORMATIONSCIENCE --- STM --- complete --- fixed --- ground --- level --- mappings --- order --- partial --- point --- predicate --- symbol
Choose an application
Privacy for the Smart Grid provides easy-to-understand guidance on data privacy issues and the implications for creating privacy risk management programs, along with privacy policies and practices required to ensure Smart Grid privacy. It addresses privacy in electric, natural gas, and water grids from two different perspectives of the topic, one from a Smart Grid expert and another from a privacy and information security expert. While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine applications.
IT Security --- Management of IT --- Security Services --- BUSINESS/MANAGEMENT --- InfoSECURITY --- SCI-TECH --- ITECH --- INFORMATIONSCIENCE --- STM --- appliances --- custodian --- demand --- energy --- meter --- response --- risks --- technologies --- transactive --- usage
Choose an application
Since the publication of the first edition in 2004, advances in mobile devices, positioning sensors, WiFi fingerprinting, and wireless communications, among others, have paved the way for developing new and advanced location-based services (LBSs). This second edition provides up-to-date information on LBSs, including WiFi fingerprinting, mobile computing, geospatial clouds, geospatial data mining, location privacy, and location-based social networking. It also includes new chapters on application areas such as LBSs for public health, indoor navigation, and advertising. In addition, the chapter on remote sensing has been revised to address advancements.
Computation --- Telecommunications --- Geographic Information Systems --- ENG --- ENVIRO --- ElectricalEngineering --- SCI-TECH --- COMPUTERSCIENCE --- ENVIRONMENTALSCIENCE --- INFORMATIONSCIENCE --- STM --- consortium --- device --- geospatial --- mobile --- networking --- open --- road --- segment --- social --- usage
Choose an application
Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.
CHOICE Highly Recommended Title --- Data Preparation and Mining --- IT Security --- Cryptology --- InfoSECURITY --- SCI-TECH --- COMPUTERSCIENCE --- ITECH --- INFORMATIONSCIENCE --- STM --- deep --- defense --- inspection --- malware --- norm --- optimal --- packet --- perfect --- software --- vulnerabilities
Choose an application
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.
IT Security --- Networks --- Digital and Wireless Communication --- ENG --- InfoSECURITY --- ElectricalEngineering --- SCI-TECH --- ITECH --- INFORMATIONSCIENCE --- STM --- access --- based --- control --- hoc --- networks --- protocol --- role --- routing --- sensor --- wireless
Choose an application
Focusing on the recent proliferation of Wi-Fi in hospital systems, this book explains how Wi-Fi is transforming clinical work flows and infusing new life into the types of mobile devices being implemented in hospitals. Drawing on years of consulting with hospitals in the US and abroad, and with first-hand experiences from one of the largest healthcare systems in the United States, it covers the key areas associated with wireless network design, security, and support. Reporting on cutting-edge developments and emerging standards in Wi-Fi technologies, the book explores security implications for each device type. It covers real-time location services and emerging trends in cloud-based wireless architecture.
Networks --- Healthcare Management --- Digital and Wireless Communication --- ENG --- ElectricalEngineering --- SCI-TECH --- HEALTHCARE --- ITECH --- INFORMATIONSCIENCE --- STM --- access --- client --- device --- medical --- network --- packet --- phones --- point --- smart --- wireless
Choose an application
Foreseeing and planning for all of the possibilities and pitfalls involved in bringing a biotechnology innovation from inception to widespread therapeutic use takes strong managerial skills and a solid grounding in biopharmaceutical research and development procedures. Unfortunately there has been a dearth of resources for this aspect of the field.
Biotechnology --- Biopharmaceutics --- Healthcare Management --- BUSINESS/MANAGEMENT --- PHARMACEUTICAL --- BIOSCIENCE --- SCI-TECH --- BIOMEDICALSCIENCE --- INFORMATIONSCIENCE --- STM --- Biodrug Research --- Bioeconomy --- Biolicensing --- Biomanufacturing --- Intellectual Property Management
Choose an application
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents. But with an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. This accessible primer focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It examines emerging trends and strategies from around the world and offers practical guidance for addressing contemporary risks. It supplies an overview of relevant U.S. Federal cyber incident response policies and outlines an organizational framework for assessing risk.
IT Security --- Public Policy --- InfoSECURITY --- PublicADMINISTRATION --- SCI-TECH --- ITECH --- INFORMATIONSCIENCE --- STM --- chief --- computer --- critical --- emergency --- information --- infrastructure --- internet --- officers --- protocol --- threats
Choose an application
With changes in technology and a renewed effort to catalog the world's biodiversity, huge amounts of data are being generated on biodiversity issues. As response to the call for better information systems to manage the biodiversity crisis, a wide range of solutions are being developed for inventorying, managing, and disseminating taxonomic data. This book brings together a diverse array of authors, expertise, and assessors that discuss technical developments to improve the construction, population, and dissemination of biodiversity information. It is designed to inform students and researchers of biodiversity about the changes and challenges that need to be understood by everyone in this information age.
Natural History --- Data Preparation and Mining --- ENVIRO --- BIOSCIENCE --- SCI-TECH --- COMPUTERSCIENCE --- ENVIRONMENTALSCIENCE --- LIFESCIENCE --- INFORMATIONSCIENCE --- STM --- artificial --- bgcolor --- devonian --- facility --- global --- informatics --- information --- lower --- network --- neural
Choose an application
This book presents an emotion centered research framework titled "emoha" for design innovation. It defines emoha and underlines the importance of the developed framework in culturalization of technology and thereby design innovation. The book explains the detailed research on product styling which leads to the creation of "Emoha" and how to use it in product design.
Industrial Design --- Product Design --- Engineering Project Management --- ENG --- BUSINESS/MANAGEMENT --- ERGONOMICS --- PROJECTMANAGEMENT --- SCI-TECH --- GENERALENGINEERING --- INFORMATIONSCIENCE --- STM --- biking --- color --- efficiency --- emotive --- exploratory --- fuel --- insert --- motorbike --- quality --- segments
Listing 1 - 10 of 12 | << page >> |
Sort by
|