Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Budget Constraints and Optimization in Sponsored Search Auctions

      • 1st Edition
      • November 23, 2013
      • Yanwu Yang + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 4 5 7 9
      • eBook
        9 7 8 0 1 2 4 1 1 5 0 4 0
      The Intelligent Systems Series publishes reference works and handbooks in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. They include theoretical studies, design methods, and real-world implementations and applications. The series' readership is broad, but focuses on engineering, electronics, and computer science. Budget constraints and optimization in sponsored search auctions takes into account consideration of the entire life cycle of campaigns for researchers and developers working on search systems and ROI maximization. The highly experienced authors compiled their knowledge and experience to provide insight, algorithms and development techniques for successful optimized/constraine... systems. The book presents a cutting-edge budget optimization approach that embraces three-level budget decisions in the life cycle of search auctions: allocation across markets at the system level, distribution over temporal slots at the campaign level, and real-time adjustment at the keyword level.
    • Interview Techniques for UX Practitioners

      • 1st Edition
      • November 23, 2013
      • Chauncey Wilson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 3 9 3 1
      • eBook
        9 7 8 0 1 2 4 1 0 4 5 0 1
      Much of the work of user-centered design practitioners involves some type of interviewing. While interviewing is an important skill, many colleagues have little or no formal training in interviewing methods and often learn on the job with limited feedback on the quality of their interviews. This book teaches readers about the three basic interview methods: structured interviews, semi-structured interviews, and unstructured interviews. The author discusses the various strengths, weaknesses, issues with each type of interview, and includes best practices and procedures for conducing effective and efficient interviews. The book dives into the detailed information about interviews that haven’t been discussed before – readers learn how and when to ask the "how" and "why" questions to get a deeper understanding of problems, concepts, and processes, as well as discussions on laddering and critical incident techniques. Because so much of what UX practitioners do involves good interviewing skills, this is your one-stop resource with the definitions, processes, procedures and best practices on the basic approaches.
    • Advanced Theory of Constraint and Motion Analysis for Robot Mechanisms

      • 1st Edition
      • November 19, 2013
      • Jingshan Zhao + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 0 1 7 7 3
      • Hardback
        9 7 8 0 1 2 4 2 0 1 6 2 0
      • eBook
        9 7 8 0 1 2 4 2 0 2 2 3 8
      Advanced Theory of Constraint and Motion Analysis for Robot Mechanisms provides a complete analytical approach to the invention of new robot mechanisms and the analysis of existing designs based on a unified mathematical description of the kinematic and geometric constraints of mechanisms. Beginning with a high level introduction to mechanisms and components, the book moves on to present a new analytical theory of terminal constraints for use in the development of new spatial mechanisms and structures. It clearly describes the application of screw theory to kinematic problems and provides tools that students, engineers and researchers can use for investigation of critical factors such as workspace, dexterity and singularity.
    • Accelerating MATLAB with GPU Computing

      • 1st Edition
      • November 18, 2013
      • Jung W. Suh + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 0 8 0 5
      • eBook
        9 7 8 0 1 2 4 0 7 9 1 6 8
      Beyond simulation and algorithm development, many developers increasingly use MATLAB even for product deployment in computationally heavy fields. This often demands that MATLAB codes run faster by leveraging the distributed parallelism of Graphics Processing Units (GPUs). While MATLAB successfully provides high-level functions as a simulation tool for rapid prototyping, the underlying details and knowledge needed for utilizing GPUs make MATLAB users hesitate to step into it. Accelerating MATLAB with GPUs offers a primer on bridging this gap. Starting with the basics, setting up MATLAB for CUDA (in Windows, Linux and Mac OS X) and profiling, it then guides users through advanced topics such as CUDA libraries. The authors share their experience developing algorithms using MATLAB, C++ and GPUs for huge datasets, modifying MATLAB codes to better utilize the computational power of GPUs, and integrating them into commercial software products. Throughout the book, they demonstrate many example codes that can be used as templates of C-MEX and CUDA codes for readers’ projects. Download example codes from the publisher's website: http://booksite.else...
    • User Interface Inspection Methods

      • 1st Edition
      • November 15, 2013
      • Chauncey Wilson
      • English
      • Paperback
        9 7 8 0 1 2 4 1 0 3 9 1 7
      • eBook
        9 7 8 0 1 2 4 1 0 4 4 8 8
      User Interface Inspection Methods succinctly covers five inspection methods: heuristic evaluation, perspective-based user interface inspection, cognitive walkthrough, pluralistic walkthrough, and formal usability inspections. Heuristic evaluation is perhaps the best-known inspection method, requiring a group of evaluators to review a product against a set of general principles. The perspective-based user interface inspection is based on the principle that different perspectives will find different problems in a user interface. In the related persona-based inspection, colleagues assume the roles of personas and review the product based on the needs, background, tasks, and pain points of the different personas. The cognitive walkthrough focuses on ease of learning. Most of the inspection methods do not require users; the main exception is the pluralistic walkthrough, in which a user is invited to provide feedback while members of a product team listen, observe the user, and ask questions. After reading this book, you will be able to use these UI inspection methods with confidence and certainty.
    • Investigating Internet Crimes

      • 1st Edition
      • November 12, 2013
      • Todd G. Shipley + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 8 1 7 8
      • eBook
        9 7 8 0 1 2 4 0 7 9 2 9 8
      Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
    • Clinical Engineering

      • 1st Edition
      • November 12, 2013
      • Azzam Taktak + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 3 9 6 9 6 1 3
      • eBook
        9 7 8 0 1 2 3 9 7 2 3 8 5
      Clinical Engineering is intended for professionals and students in the clinical engineering field who need to successfully deploy medical technologies. The book provides a broad reference to the core elements of the subject and draws from the expertise of a range of experienced authors. In addition to engineering skills, clinical engineers must be able to work with patients and with a range of professional staff, including technicians and clinicians, and with equipment manufacturers. They have to keep up-to-date with fast-moving scientific and medical research in the field and be able to develop laboratory, design, workshop, and management skills. This book is the ideal companion in such studies, covering fundamentals such as IT and software engineering as well as topics in rehabilitation and assistive technology.
    • Platform Ecosystems

      • 1st Edition
      • November 12, 2013
      • Amrit Tiwana
      • English
      • Paperback
        9 7 8 0 1 2 4 0 8 0 6 6 9
      • eBook
        9 7 8 0 1 2 4 0 8 0 5 4 6
      Platform Ecosystems is a hands-on guide that offers a complete roadmap for designing and orchestrating vibrant software platform ecosystems. Unlike software products that are managed, the evolution of ecosystems and their myriad participants must be orchestrated through a thoughtful alignment of architecture and governance. Whether you are an IT professional or a general manager, you will benefit from this book because platform strategy here lies at the intersection of software architecture and business strategy. It offers actionable tools to develop your own platform strategy, backed by original research, tangible metrics, rich data, and cases. You will learn how architectural choices create organically-evolvabl... vibrant ecosystems. You will also learn to apply state-of-the-art research in software engineering, strategy, and evolutionary biology to leverage ecosystem dynamics unique to platforms. Read this book to learn how to: Evolve software products and services into vibrant platform ecosystems Orchestrate platform architecture and governance to sustain competitive advantage Govern platform evolution using a powerful 3-dimensional framework If you’re ready to transform platform strategy from newspaper gossip and business school theory to real-world competitive advantage, start right here!
    • Introduction to Information Security

      • 1st Edition
      • November 12, 2013
      • Timothy Shimeall + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 6 9 9
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 2 9
      Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.Informat... security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.
    • Emerging Trends in ICT Security

      • 1st Edition
      • November 6, 2013
      • Babak Akhgar + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 4 1 1 4 7 4 6
      • eBook
        9 7 8 0 1 2 4 1 0 4 8 7 7
      Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.