Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Advances in Computers

      • 1st Edition
      • Volume 66
      • April 25, 2006
      • Marvin Zelkowitz
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 3 1 6 9
      • Hardback
        9 7 8 0 1 2 0 1 2 1 6 6 3
      • eBook
        9 7 8 0 0 8 0 4 6 2 8 6 8
      This volume of Advances in Computers is number 66 in the series that began back in 1960. This series presents the ever changing landscape in the continuing evolution of the development of the computer and the field of information processing. Each year three volumes are produced presenting approximately 20 chapters that describe the latest technology in the use of computers today. Volume 66, subtitled "Quality software development," is concerned about the current need to create quality software. It describes the current emphasis in techniques for creating such software and in methods to demonstrate that the software indeed meets the expectations of the designers and purchasers of that software.
    • The Persona Lifecycle

      • 1st Edition
      • April 24, 2006
      • John Pruitt + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 5 5 7 3 0
      The Persona Lifecycle is a field guide exclusively focused on interaction design's most popular new technique. The Persona Lifecycle addresses the "how" of creating effective personas and using those personas to design products that people love. It doesn’t just describe the value of personas; it offers detailed techniques and tools related to planning, creating, communicating, and using personas to create great product designs. Moreover, it provides rich examples, samples, and illustrations to imitate and model. Perhaps most importantly, it positions personas not as a panacea, but as a method used to complement other user-centered design (UCD) techniques including scenario-based design, cognitive walkthroughs and user testing. The authors developed the Persona Lifecycle model to communicate the value and practical application of personas to product design and development professionals. This book explores the complete lifecycle of personas, to guide the designer at each stage of product development. It includes a running case study with rich examples and samples that demonstrate how personas can be used in building a product end-to-end. It also presents recommended best practices in techniques, tools, and innovative methods and contains hundreds of relevant stories, commentary, opinions, and case studies from user experience professionals across a variety of domains and industries. This book will be a valuable resource for UCD professionals, including usability practitioners, interaction designers, technical writers, and program managers; programmers/develope... who act as the interaction designers for software; and those professionals who work with developers and designers.
    • Multilingual Speech Processing

      • 1st Edition
      • April 21, 2006
      • Tanja Schultz + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 0 8 8 5 0 1 5
      • eBook
        9 7 8 0 0 8 0 4 5 7 6 2 8
      Tanja Schultz and Katrin Kirchhoff have compiled a comprehensive overview of speech processing from a multilingual perspective. By taking this all-inclusive approach to speech processing, the editors have included theories, algorithms, and techniques that are required to support spoken input and output in a large variety of languages. Multilingual Speech Processing presents a comprehensive introduction to research problems and solutions, both from a theoretical as well as a practical perspective, and highlights technology that incorporates the increasing necessity for multilingual applications in our global community. Current challenges of speech processing and the feasibility of sharing data and system components across different languages guide contributors in their discussions of trends, prognoses and open research issues. This includes automatic speech recognition and speech synthesis, but also speech-to-speech translation, dialog systems, automatic language identification, and handling non-native speech. The book is complemented by an overview of multilingual resources, important research trends, and actual speech processing systems that are being deployed in multilingual human-human and human-machine interfaces. Researchers and developers in industry and academia with different backgrounds but a common interest in multilingual speech processing will find an excellent overview of research problems and solutions detailed from theoretical and practical perspectives.
    • Voice Over IPv6

      • 1st Edition
      • April 11, 2006
      • Daniel Minoli
      • English
      • Paperback
        9 7 8 0 7 5 0 6 8 2 0 6 0
      • eBook
        9 7 8 0 0 8 0 4 8 1 6 5 4
      IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater robustness. It will also be fully “backwards compatible” with existing IPv4 systems. These capabilities will finally make Internet telephony a viable competitor to conventional switched telephone networks. In this book, Dan Minoli clearly explains IPv6 and how telephone networks can be built on its foundations.This is not just another IPv6 book; instead, it focuses on those aspects of IPv6 relevant to Internet telephony systems and voice networks. Minoli uses a compare/contrast approach, exploring where IPv6 is similar to IPv4 and where it differs, to let you quickly grasp the essence of IPv6 and the similarities (and differences) between current IPv4-based systems and IPv6-based systems. If you will be designing, implementing, or maintaining the next generation of Internet telephony systems, then you need the information in this book!*Explains the essential concepts of IPv6 and how they relate to Internet telephony*Describes how Internet telephony systems using IPv6 are different from, and better than, Internet telephony systems based on the older IPv4 standard*Discusses how to transition existing IPv4 Internet telephony systems and conventional switched systems to IPv6-based systems*Extensive treatment of security issues, including IP layer encryption and authentication methods*Explains connection techniques, including “plug and play” approaches, for equipment used in IPv6 systems
    • Network Intrusion Analysis

      • 1st Edition
      • April 6, 2006
      • Joe Fichera + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 6 2 0
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 1 2
      Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full operation. Network Intrusion Analysis teaches the reader about the various tools and techniques to use during a network intrusion investigation. The book focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns. This is the first book that provides such a thorough analysis of network intrusion investigation and response. Network Intrusion Analysis addresses the entire process of investigating a network intrusion by:*Providing a step-by-step guide to the tools and techniques used in the analysis and investigation of a network intrusion.*Providing real-world examples of network intrusions, along with associated workarounds.*Walking you through the methodology and practical steps needed to conduct a thorough intrusion investigation and incident response, including a wealth of practical, hands-on tools for incident assessment and mitigation.
    • Video Conferencing over IP: Configure, Secure, and Troubleshoot

      • 1st Edition
      • March 28, 2006
      • Michael Gough
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 6 3 4
      • eBook
        9 7 8 0 0 8 0 4 8 9 8 5 8
      This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs.
    • Querying XML

      • 1st Edition
      • March 6, 2006
      • Jim Melton + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 7 1 1 8
      • eBook
        9 7 8 0 0 8 0 5 4 0 1 6 0
      XML has become the lingua franca for representing business data, for exchanging information between business partners and applications, and for adding structure–and sometimes meaning—to text-based documents. XML offers some special challenges and opportunities in the area of search: querying XML can produce very precise, fine-grained results, if you know how to express and execute those queries.For software developers and systems architects: this book teaches the most useful approaches to querying XML documents and repositories. This book will also help managers and project leaders grasp how “querying XML” fits into the larger context of querying and XML. Querying XML provides a comprehensive background from fundamental concepts (What is XML?) to data models (the Infoset, PSVI, XQuery Data Model), to APIs (querying XML from SQL or Java) and more.
    • Information Theory of Molecular Systems

      • 1st Edition
      • February 22, 2006
      • Roman F Nalewajski
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 9 6 6 5
      • Paperback
        9 7 8 0 4 4 4 5 6 0 3 1 5
      • eBook
        9 7 8 0 0 8 0 4 5 9 7 4 5
      As well as providing a unified outlook on physics, Information Theory (IT) has numerous applications in chemistry and biology owing to its ability to provide a measure of the entropy/information contained within probability distributions and criteria of their information "distance" (similarity) and independence. Information Theory of Molecular Systems applies standard IT to classical problems in the theory of electronic structure and chemical reactivity. The book starts by introducing the basic concepts of modern electronic structure/reactivity theory based upon the Density Functional Theory (DFT), followed by an outline of the main ideas and techniques of IT, including several illustrative applications to molecular systems. Coverage includes information origins of the chemical bond, unbiased definition of molecular fragments, adequate entropic measures of their internal (intra-fragment) and external (inter-fragment) bond-orders and valence-numbers, descriptors of their chemical reactivity, and information criteria of their similarity and independence. Information Theory of Molecular Systems is recommended to graduate students and researchers interested in fresh ideas in the theory of electronic structure and chemical reactivity.
    • Fuzzy Logic and the Semantic Web

      • 1st Edition
      • Volume 1
      • February 20, 2006
      • Elie Sanchez
      • English
      • Hardback
        9 7 8 0 4 4 4 5 1 9 4 8 1
      • Paperback
        9 7 8 0 4 4 4 5 5 0 4 9 1
      • eBook
        9 7 8 0 0 8 0 4 6 0 4 8 2
      These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic. This book, the first in the new series Capturing Intelligence, shows the positive role Fuzzy Logic, and more generally Soft Computing, can play in the development of the Semantic Web, filling a gap and facing a new challenge. It covers concepts, tools, techniques and applications exhibiting the usefulness, and the necessity, for using Fuzzy Logic in the Semantic Web. It finally opens the road to new systems with a high Web IQ. Most of today's Web content is suitable for human consumption. The Semantic Web is presented as an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. For example, within the Semantic Web, computers will understand the meaning of semantic data on a web page by following links to specified ontologies. But while the Semantic Web vision and research attracts attention, as long as it will be used two-valued-based logical methods no progress will be expected in handling ill-structured, uncertain or imprecise information encountered in real world knowledge. Fuzzy Logic and associated concepts and techniques (more generally, Soft Computing), has certainly a positive role to play in the development of the Semantic Web. Fuzzy Logic will not supposed to be the basis for the Semantic Web but its related concepts and techniques will certainly reinforce the systems classically developed within W3C. In fact, Fuzzy Logic cannot be ignored in order to bridge the gap between human-understandable soft logic and machine-readable hard logic. None of the usual logical requirements can be guaranteed: there is no centrally defined format for data, no guarantee of truth for assertions made, no guarantee of consistency. To support these arguments, this book shows how components of the Semantic Web (like XML, RDF, Description Logics, Conceptual Graphs, Ontologies) can be covered, with in each case a Fuzzy Logic focus.
    • Modern Information Processing

      • 1st Edition
      • February 8, 2006
      • Bernadette Bouchon-Meunier + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 4 5 6 0 8 9 6
      • Hardback
        9 7 8 0 4 4 4 5 2 0 7 5 3
      • eBook
        9 7 8 0 0 8 0 4 6 1 6 9 4
      The volume "Modern Information Processing: From Theory to Applications," edited by Bernadette Bouchon-Meunier, Giulianella Coletti and Ronald Yager, is a collection of carefully selected papers drawn from the program of IPMU'04, which was held in Perugia, Italy. The book represents the cultural policy of IPMU conference which is not focused on narrow range of methodologies, but on the contrary welcomes all the theories for the management of uncertainty and aggregation of information in intelligent systems, providing a medium for the exchange of ideas between theoreticians and practitioners in these and related areas.The book is composed by 7 sections: UNCERTAINTYPREFERENC... AND DATA MININGAGGREGATION AND MULTI-CRITERIA DECISION MAKINGKNOWLEDGE REPRESENTATION•The book contributes to enhancement of our ability to deal effectively with uncertainty in all of its manifestations. •The book can help to build brigs among theories and methods methods for the management of uncertainty. •The book addresses issues which have a position of centrality in our information-centric world. •The book presents interesting results devoted to representing knowledge: the goal is to capture the subtlety of human knowledge (richness) and to allow computer manipulation (formalization). •The book contributes to the goal: an efficient use of the information for a good decision strategy.APPLIED DOMAINS