Skip to main content

Books in Data

61-70 of 75 results in All results

Digital Storage in Consumer Electronics

  • 1st Edition
  • February 29, 2008
  • Thomas M. Coughlin
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 5 8 4 9 - 3
Can you imagine life without your cell phone, laptop, digital camera, iPod, BlackBerry, flat-screen TV, or DVD player? The skyrocketing demand for devices that provide simple, immediate access to large amounts of content is driving required digital storage capacity to unprecedented levels. Designing digital storage into consumer electronics is crucial to the performance and cost of these devices. However, as our requirements for digital content storage grow, so does the formidable difficulty of implementing design solutions that are rugged, long-lasting, power-miserly, secure, network-accessible and can still fit in the palm of your hand!This book provides the background necessary to understand common digital storage devices and media. It helps readers decide which methods of storage work best for which kinds of devices, and then teaches designers how to successfully integrate them into consumer products.

Foundations of Multidimensional and Metric Data Structures

  • 1st Edition
  • August 8, 2006
  • Hanan Samet
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 3 6 9 4 4 6 - 1
Foundations of Multidimensional and Metric Data Structures provides a thorough treatment of multidimensional point data, object and image-based representations, intervals and small rectangles, and high-dimensional datasets. The book includes a thorough introduction; a comprehensive survey to spatial and multidimensional data structures and algorithms; and implementation details for the most useful data structures. Each section includes a large number of exercises and solutions to self-test and confirm the reader's understanding and suggest future directions. The book is an excellent and valuable reference tool for professionals in many areas, including computer graphics, databases, geographic information systems (GIS), game programming, image processing, pattern recognition, solid modeling, similarity retrieval, and VLSI design.

Fundamental Data Compression

  • 1st Edition
  • November 3, 2005
  • Ida Mengyi Pu
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 0 2 6 - 0
Fundamental Data Compression provides all the information students need to be able to use this essential technology in their future careers. A huge, active research field, and a part of many people's everyday lives, compression technology is an essential part of today's Computer Science and Electronic Engineering courses. With the help of this book, students can gain a thorough understanding of the underlying theory and algorithms, as well as specific techniques used in a range of scenarios, including the application of compression techniques to text, still images, video and audio. Practical exercises, projects and exam questions reinforce learning, along with suggestions for further reading.

Advances in Computers

  • 1st Edition
  • Volume 65
  • August 11, 2005
  • Marvin Zelkowitz
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 5 9 6 7 - 7
This present volume describes some of the latest advances in the computer science field today. This current volume emphasizes information processing with chapters on artificial intelligence, data bases and software engineering. In particular it looks at the interfaces between AI and software development with chapters on how AI affects the development of correct programs, and conversely, how software engineering can affect the development of correct AI programs.Key Features:* In-depth surveys and tutorials on new computer technology.* Well-known authors and researchers in the field.* Extensive bibliographies with most chapters.* Impact of AI on software development and impact of software development on correct AI programs.* What is the educational role of mathematics in the development of the next generation of computer professional?

An Introduction to Measure-theoretic Probability

  • 1st Edition
  • November 16, 2004
  • George G. Roussas
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 7 5 3 0 - 8
This book provides in a concise, yet detailed way, the bulk of the probabilistic tools that a student working toward an advanced degree in statistics,probability and other related areas, should be equipped with. The approach is classical, avoiding the use of mathematical tools not necessary for carrying out the discussions. All proofs are presented in full detail.

Data Hiding Fundamentals and Applications

  • 1st Edition
  • August 20, 2004
  • Husrev T. Sencar + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 0 4 7 1 4 4 - 7
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 8 6 6 - 0
Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with respect to multimedia content. The owners of this content face enormous challenges in safeguarding their intellectual property, while still exploiting the Internet as an important resource for commerce. Data Hiding Fundamentals and Applications focuses on the theory and state-of-the-art applications of content security and data hiding in digital multimedia. One of the pillars of content security solutions is the imperceptible insertion of information into multimedia data for security purposes; the idea is that this inserted information will allow detection of unauthorized usage.

Advances in Computers

  • 1st Edition
  • Volume 60
  • April 30, 2004
  • Marvin Zelkowitz
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 1 8 9 - 1
Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on plastic ("smartcards"). The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.

Java Cryptography Extensions

  • 1st Edition
  • February 27, 2004
  • Jason R. Weiss
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 5 2 4 - 1
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBMFor many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it’s imperative that developers know what kinds of solutions exist. One of Java’s solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn’t overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.

OpenVMS Alpha Internals and Data Structures

  • 1st Edition
  • November 22, 2002
  • Ruth Goldenberg
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 1 3 1 1 - 9
OpenVMS Alpha Internals and Data Structures: Memory Management is an updateto selected parts of the book OpenVMS AXP Internals and Data Structures Version 1.5 (Digital Press, 1994). This book covers the extensions to the memory management subsystem of OpenVMS Alpha to allow the operating system and applications to access 64 bits of address space. It emphasizes system data structures and their manipulation by paging and swapping routines and related system services.It also describes management of dynamic memory, such as nonpaged pool, and support for nonuniform memory access (NUMA) platforms.This book is intended for systems programmers, technical consultants, application designers, and other computer progressions interested in learning the details of the OpenVMS executive. Teachers and students of graduate and advanced undergraduate courses in operating systems will find this book a valuable study in how theory and practice are resolved in a complex commercialoperating system.

Data Acquisition Techniques Using PCs

  • 2nd Edition
  • November 11, 2002
  • Howard Austerlitz
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 0 2 5 - 3
The second edition of this highly successful text focuses on the major changes that have taken place in this field in recent times. Data Acquisition Techniques Using PCs, Second Edition, recognises that data acquisition is the core of most engineering and many life science systems in measurement and instrumentation. It will prove invaluable to scientists, engineers, students and technicians wishing to keep up with the latest technological developments.