Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Hardware Security

      • 1st Edition
      • October 30, 2018
      • Swarup Bhunia + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 2 4 7 7 2
      • eBook
        9 7 8 0 1 2 8 1 2 4 7 8 9
      Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.
    • Social Network Analytics

      • 1st Edition
      • November 16, 2018
      • Nilanjan Dey + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 5 4 5 8 8
      • eBook
        9 7 8 0 1 2 8 1 5 6 4 1 4
      Social Network Analytics: Computational Research Methods and Techniques focuses on various technical concepts and aspects of social network analysis. The book features the latest developments and findings in this emerging area of research. In addition, it includes a variety of applications from several domains, such as scientific research, and the business and industrial sectors. The technical aspects of analysis are covered in detail, including visualizing and modeling, network theory, mathematical models, the big data analytics of social networks, multidimensional scaling, and more. As analyzing social network data is rapidly gaining interest in the scientific research community because of the importance of the information and insights that can be culled from the wealth of data inherent in the various aspects of the network, this book provides insights on measuring the relationships and flows between people, groups, organizations, computers, URLs, and more.
    • Geographical and Fingerprinting Data for Positioning and Navigation Systems

      • 1st Edition
      • September 14, 2018
      • Jordi Conesa + 3 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 3 1 8 9 3
      • eBook
        9 7 8 0 1 2 8 1 3 1 9 0 9
      Geographical and Fingerprinting Data for Positioning and Navigation Systems: Challenges, Experiences and Technology Roadmap explores the state-of-the -art software tools and innovative strategies to provide better understanding of positioning and navigation in indoor environments using fingerprinting techniques. The book provides the different problems and challenges of indoor positioning and navigation services and shows how fingerprinting can be used to address such necessities. This advanced publication provides the useful references educational institutions, industry, academic researchers, professionals, developers and practitioners need to apply, evaluate and reproduce this book’s contributions. The readers will learn how to apply the necessary infrastructure to provide fingerprinting services and scalable environments to deal with fingerprint data.
    • Modeling of Transport Demand

      • 1st Edition
      • October 23, 2018
      • V.A Profillidis + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 1 5 1 3 8
      • eBook
        9 7 8 0 1 2 8 1 1 5 1 4 5
      Modeling of Transport Demand explains the mechanisms of transport demand, from analysis to calculation and forecasting. Packed with strategies for forecasting future demand for all transport modes, the book helps readers assess the validity and accuracy of demand forecasts. Forecasting and evaluating transport demand is an essential task of transport professionals and researchers that affects the design, extension, operation, and maintenance of all transport infrastructures. Accurate demand forecasts are necessary for companies and government entities when planning future fleet size, human resource needs, revenues, expenses, and budgets. The operational and planning skills provided in Modeling of Transport Demand help readers solve the problems they face on a daily basis. Modeling of Transport Demand is written for researchers, professionals, undergraduate and graduate students at every stage in their careers, from novice to expert. The book assists those tasked with constructing qualitative models (based on executive judgment, Delphi, scenario writing, survey methods) or quantitative ones (based on statistical, time series, econometric, gravity, artificial neural network, and fuzzy methods) in choosing the most suitable solution for all types of transport applications.
    • Cooperative and Graph Signal Processing

      • 1st Edition
      • June 20, 2018
      • Petar Djuric + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 3 6 7 7 5
      • eBook
        9 7 8 0 1 2 8 1 3 6 7 8 2
      Cooperative and Graph Signal Processing: Principles and Applications presents the fundamentals of signal processing over networks and the latest advances in graph signal processing. A range of key concepts are clearly explained, including learning, adaptation, optimization, control, inference and machine learning. Building on the principles of these areas, the book then shows how they are relevant to understanding distributed communication, networking and sensing and social networks. Finally, the book shows how the principles are applied to a range of applications, such as Big data, Media and video, Smart grids, Internet of Things, Wireless health and Neuroscience. With this book readers will learn the basics of adaptation and learning in networks, the essentials of detection, estimation and filtering, Bayesian inference in networks, optimization and control, machine learning, signal processing on graphs, signal processing for distributed communication, social networks from the perspective of flow of information, and how to apply signal processing methods in distributed settings.
    • Certifiable Software Applications 3

      • 1st Edition
      • September 3, 2018
      • Jean-Louis Boulanger
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 1 9 2
      • eBook
        9 7 8 0 0 8 1 0 1 1 6 3 8
      Certifiable Software Applications 3: Downward Cycle describes the descending phase of the creation of a software application, detailing specification phases, architecture, design and coding, and important concepts on modeling and implementation. For coding, code generation and/or manual code production strategies are explored. As applications are coded, a presentation of programming languages and their impact on certifiability is included.
    • How Information Systems Can Help in Alarm/Alert Detection

      • 1st Edition
      • November 8, 2018
      • Florence Sedes
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 3 0 2 8
      • eBook
        9 7 8 0 0 8 1 0 2 9 3 0 5
      Alarm or alert detection remains an issue in various areas from nature, i.e. flooding, animals or earthquake, to software systems. Liveness, dynamicity, reactivity of alarm systems: how to ensure the warning information reach the right destination at the right moment and in the right location, still being relevant for the recipient, in spite of the various and successive filters of confidentiality, privacy, firewall policies, etc.? Also relevant in this context are to technical contingency issues: material failure, defect of connection, break of channels, independence of information routes and sources? Alarms with crowd media, (mis)information vs. rumours: how to make the distinction? The prediction of natural disasters (floods, avalanches, etc.), health surveillance (affectionate fevers of cattle, pollution by pesticides, etc.), air, sea and land transport, or space surveillance to prevent Risks of collisions between orbital objects involve more and more actors within Information Systems, one of whose purposes is the dissemination of alerts. By expanding the capabilities and functionality of such national or international systems, social networks are playing a growing role in dissemination and sharing, eg. with the support of systems like the Google Alert (https://www.google.... which concerns the publication of contents online. Recently, the Twitter microblogging platform announced a broadcast service, designed to help government organizations with alerts to the public. The proper functioning of such systems depends on fundamental properties such as resilience, liveliness and responsiveness: any alert must absolutely reach the right recipient at the right time and in the right place, while remaining relevant to him, despite the various constraints. on the one hand to external events, such as hardware failures, connection faults, breaks in communication channels, on the other hand to confidentiality, such as the collection and use of personal data (with or without the consent of the user), or the disparity of access policies (generation according to industrial, technological, security constraints, management of internal / external policies, etc.) between actors. This book opens the discussion on the "procrastination", the dynamics and the reactivity of the alert systems, but also the problems of confidentiality, filtering of information, and the means of distinguishing information and rumor.
    • Computer Vision for Assistive Healthcare

      • 1st Edition
      • May 15, 2018
      • Leo Marco + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 3 4 4 5 0
      • eBook
        9 7 8 0 1 2 8 1 3 4 4 6 7
      Computer Vision for Assistive Healthcare describes how advanced computer vision techniques provide tools to support common human needs, such as mental functioning, personal mobility, sensory functions, daily living activities, image processing, pattern recognition, machine learning and how language processing and computer graphics cooperate with robotics to provide such tools. Users will learn about the emerging computer vision techniques for supporting mental functioning, algorithms for analyzing human behavior, and how smart interfaces and virtual reality tools lead to the development of advanced rehabilitation systems able to perform human action and activity recognition. In addition, the book covers the technology behind intelligent wheelchairs, how computer vision technologies have the potential to assist blind people, and about the computer vision-based solutions recently employed for safety and health monitoring.
    • The UX Book

      • 2nd Edition
      • November 2, 2018
      • Rex Hartson + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 4 2 3
      • Hardback
        9 7 8 0 1 2 8 0 0 9 8 7 1
      • eBook
        9 7 8 0 1 2 8 0 1 0 6 2 4
      The discipline of user experience (UX) design has matured into a confident practice and this edition reflects, and in some areas accelerates, that evolution. Technically this is the second edition of The UX Book, but so much of it is new, it is more like a sequel. One of the major positive trends in UX is the continued emphasis on design—a kind of design that highlights the designer’s creative skills and insights and embodies a synthesis of technology with usability, usefulness, aesthetics, and meaningfulness to the user. In this edition a new conceptual top-down design framework is introduced to help readers with this evolution. This entire edition is oriented toward an agile UX lifecycle process, explained in the funnel model of agile UX, as a better match to the now de facto standard agile approach to software engineering. To reflect these trends, even the subtitle of the book is changed to “Agile UX design for a quality user experience”. Designed as a how-to-do-it handbook and field guide for UX professionals and a textbook for aspiring students, the book is accompanied by in-class exercises and team projects. The approach is practical rather than formal or theoretical. The primary goal is still to imbue an understanding of what a good user experience is and how to achieve it. To better serve this, processes, methods, and techniques are introduced early to establish process-related concepts as context for discussion in later chapters.
    • Planning Academic Library Orientations

      • 1st Edition
      • June 26, 2018
      • Kylie Bailin + 2 more
      • English
      • Paperback
        9 7 8 0 0 8 1 0 2 1 7 1 2
      • eBook
        9 7 8 0 0 8 1 0 2 1 7 3 6
      Colleges and universities throughout the world plan library orientations for first years or specific audiences such as transfer or international students. These events can vary greatly in shape and form depending on the size, resources and staff of the institution, orientation schedule, and whether it is mandatory for students. Some institutions plan day-long events, elaborate games, or scavenger hunts; some offer drop in sessions or library tours; others offer an online orientation. Planning Academic Library Orientations gathers case studies from around the world covering a wide variety of approaches as a guide to those revamping or creating new library orientations. Chapters are organized into the following thematic sections: Games; Marketing & Promotion; Partnerships; Targeting Specific Audiences; Technology; and Tours, and are cross-referenced if they touch on additional themes. Each chapter includes institutional information so readers can decide which type of orientation is appropriate for their own institution and see what resources are required.