Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Communicating the UX Vision

      • 1st Edition
      • February 19, 2015
      • Martina Schell + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 9 7 2
      • eBook
        9 7 8 0 1 2 7 9 9 9 2 4 1
      This book identifies the 13 main challenges designers face when they talk about their work and provides communication strategies so that a better design, not a louder argument, is what makes it into the world. It is a fact that we all want to put great design into the world, but no product ever makes it out of the building without rounds of reviews, feedback, and signoff. As an interaction or UX designer, you’ve felt the general trend toward faster development, more work, and less discussion. As we spend time crafting, we become attached to our own ideas and it gets all too easy to react to feedback emotionally or dismiss it, when we should be taking the time to decode it and explain or adapt the design. Communicating the UX Vision helps you identify the skills and behavioral patterns to present your work in more persuasive ways, and respond more constructively to feedback from coworkers and stakeholders.
    • Real-Time Embedded Systems

      • 1st Edition
      • January 28, 2015
      • Xiaocong Fan
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 0 7 0
      • eBook
        9 7 8 0 1 2 8 0 1 7 1 8 0
      This book integrates new ideas and topics from real time systems, embedded systems, and software engineering to give a complete picture of the whole process of developing software for real-time embedded applications. You will not only gain a thorough understanding of concepts related to microprocessors, interrupts, and system boot process, appreciating the importance of real-time modeling and scheduling, but you will also learn software engineering practices such as model documentation, model analysis, design patterns, and standard conformance.This book is split into four parts to help you learn the key concept of embedded systems; Part one introduces the development process, and includes two chapters on microprocessors and interrupts---fundame... topics for software engineers; Part two is dedicated to modeling techniques for real-time systems; Part three looks at the design of software architectures and Part four covers software implementations, with a focus on POSIX-compliant operating systems.With this book you will learn:The pros and cons of different architectures for embedded systems POSIX real-time extensions, and how to develop POSIX-compliant real time applications How to use real-time UML to document system designs with timing constraintsThe challenges and concepts related to cross-development Multitasking design and inter-task communication techniques (shared memory objects, message queues, pipes, signals)How to use kernel objects (e.g. Semaphores, Mutex, Condition variables) to address resource sharing issues in RTOS applications The philosophy underpinning the notion of "resource manager" and how to implement a virtual file system using a resource manager The key principles of real-time scheduling and several key algorithms
    • Dynamic Systems Biology Modeling and Simulation

      • 1st Edition
      • January 10, 2015
      • Joseph DiStefano III
      • English
      • Hardback
        9 7 8 0 1 2 4 1 0 4 1 1 2
      • eBook
        9 7 8 0 1 2 4 1 0 4 9 3 8
      Dynamic Systems Biology Modeling and Simuation consolidates and unifies classical and contemporary multiscale methodologies for mathematical modeling and computer simulation of dynamic biological systems – from molecular/cellular, organ-system, on up to population levels. The book pedagogy is developed as a well-annotated, systematic tutorial – with clearly spelled-out and unified nomenclature – derived from the author’s own modeling efforts, publications and teaching over half a century. Ambiguities in some concepts and tools are clarified and others are rendered more accessible and practical. The latter include novel qualitative theory and methodologies for recognizing dynamical signatures in data using structural (multicompartmental and network) models and graph theory; and analyzing structural and measurement (data) models for quantification feasibility. The level is basic-to-intermediat... with much emphasis on biomodeling from real biodata, for use in real applications.
    • Data Mining and Predictive Analysis

      • 2nd Edition
      • December 30, 2014
      • Colleen McCue
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 2 2 9 2
      • eBook
        9 7 8 0 1 2 8 0 0 4 0 8 1
      Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis, 2nd Edition, describes clearly and simply how crime clusters and other intelligence can be used to deploy security resources most effectively. Rather than being reactive, security agencies can anticipate and prevent crime through the appropriate application of data mining and the use of standard computer programs. Data Mining and Predictive Analysis offers a clear, practical starting point for professionals who need to use data mining in homeland security, security analysis, and operational law enforcement settings.This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities. The use of predictive analytics in intelligence and security analysis enables the development of meaningful, information based tactics, strategy, and policy decisions in the operational public safety and security environment.
    • Sharing Data and Models in Software Engineering

      • 1st Edition
      • December 15, 2014
      • Tim Menzies + 4 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 2 9 5 1
      • eBook
        9 7 8 0 1 2 4 1 7 3 0 7 1
      Data Science for Software Engineering: Sharing Data and Models presents guidance and procedures for reusing data and models between projects to produce results that are useful and relevant. Starting with a background section of practical lessons and warnings for beginner data scientists for software engineering, this edited volume proceeds to identify critical questions of contemporary software engineering related to data and models. Learn how to adapt data from other organizations to local problems, mine privatized data, prune spurious information, simplify complex results, how to update models for new platforms, and more. Chapters share largely applicable experimental results discussed with the blend of practitioner focused domain expertise, with commentary that highlights the methods that are most useful, and applicable to the widest range of projects. Each chapter is written by a prominent expert and offers a state-of-the-art solution to an identified problem facing data scientists in software engineering. Throughout, the editors share best practices collected from their experience training software engineering students and practitioners to master data science, and highlight the methods that are most useful, and applicable to the widest range of projects.
    • Medical Modelling

      • 2nd Edition
      • December 13, 2014
      • Richard Bibb + 2 more
      • English
      • Hardback
        9 7 8 1 7 8 2 4 2 3 0 0 3
      • eBook
        9 7 8 1 7 8 2 4 2 3 1 3 3
      Medical modelling and the principles of medical imaging, Computer Aided Design (CAD) and Rapid Prototyping (also known as Additive Manufacturing and 3D Printing) are important techniques relating to various disciplines - from biomaterials engineering to surgery. Building on the success of the first edition, Medical Modelling: The application of Advanced Design and Rapid Prototyping techniques in medicine provides readers with a revised edition of the original text, along with key information on innovative imaging techniques, Rapid Prototyping technologies and case studies.Following an overview of medical imaging for Rapid Prototyping, the book goes on to discuss working with medical scan data and techniques for Rapid Prototyping. In this second edition there is an extensive section of peer-reviewed case studies, describing the practical applications of advanced design technologies in surgical, prosthetic, orthotic, dental and research applications.
    • Reliability Assurance of Big Data in the Cloud

      • 1st Edition
      • December 9, 2014
      • Yun Yang + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 5 7 2 7
      • eBook
        9 7 8 0 1 2 8 0 2 6 6 8 7
      With the rapid growth of Cloud computing, the size of Cloud data is expanding at a dramatic speed. A huge amount of data is generated and processed by Cloud applications, putting a higher demand on cloud storage. While data reliability should already be a requirement, data in the Cloud needs to be stored in a highly cost-effective manner. This book focuses on the trade-off between data storage cost and data reliability assurance for big data in the Cloud. Throughout the whole Cloud data lifecycle, four major features are presented: first, a novel generic data reliability model for describing data reliability in the Cloud; second, a minimum replication calculation approach for meeting a given data reliability requirement to facilitate data creation; third, a novel cost-effective data reliability assurance mechanism for big data maintenance, which could dramatically reduce the storage space needed in the Cloud; fourth, a cost-effective strategy for facilitating data creation and recovery, which could significantly reduce the energy consumption during data transfer.
    • Industrial Network Security

      • 2nd Edition
      • December 9, 2014
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 2 0 1 1 4 9
      • eBook
        9 7 8 0 1 2 4 2 0 1 8 4 2
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • Emerging Trends in Image Processing, Computer Vision and Pattern Recognition

      • 1st Edition
      • December 9, 2014
      • Leonidas Deligiannidis + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 0 4 5 6
      • eBook
        9 7 8 0 1 2 8 0 2 0 9 2 0
      Emerging Trends in Image Processing, Computer Vision, and Pattern Recognition discusses the latest in trends in imaging science which at its core consists of three intertwined computer science fields, namely: Image Processing, Computer Vision, and Pattern Recognition. There is significant renewed interest in each of these three fields fueled by Big Data and Data Analytic initiatives including but not limited to; applications as diverse as computational biology, biometrics, biomedical imaging, robotics, security, and knowledge engineering. These three core topics discussed here provide a solid introduction to image processing along with low-level processing techniques, computer vision fundamentals along with examples of applied applications and pattern recognition algorithms and methodologies that will be of value to the image processing and computer vision research communities. Drawing upon the knowledge of recognized experts with years of practical experience and discussing new and novel applications Editors’ Leonidas Deligiannidis and Hamid Arabnia cover; Many perspectives of image processing spanning from fundamental mathematical theory and sampling, to image representation and reconstruction, filtering in spatial and frequency domain, geometrical transformations, and image restoration and segmentation Key application techniques in computer vision some of which are camera networks and vision, image feature extraction, face and gesture recognition and biometric authentication Pattern recognition algorithms including but not limited to; Supervised and unsupervised classification algorithms, Ensemble learning algorithms, and parsing algorithms. How to use image processing and visualization to analyze big data.
    • The Complete Business Process Handbook

      • 1st Edition
      • December 6, 2014
      • Mark Von Rosing + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 7 9 9 9 5 9 3
      • eBook
        9 7 8 0 1 2 8 0 0 4 7 2 2
      The Complete Business Process Handbook is the most comprehensive body of knowledge on business processes with revealing new research. Written as a practical guide for Executives, Practitioners, Managers and Students by the authorities that have shaped the way we think and work with process today. It stands out as a masterpiece, being part of the BPM bachelor and master degree curriculum at universities around the world, with revealing academic research and insight from the leaders in the market. This book provides everything you need to know about the processes and frameworks, methods, and approaches to implement BPM. Through real-world examples, best practices, LEADing practices and advice from experts, readers will understand how BPM works and how to best use it to their advantage. Cases from industry leaders and innovators show how early adopters of LEADing Practices improved their businesses by using BPM technology and methodology. As the first of three volumes, this book represents the most comprehensive body of knowledge published on business process. Following closely behind, the second volume uniquely bridges theory with how BPM is applied today with the most extensive information on extended BPM. The third volume will explore award winning real-life examples of leading business process practices and how it can be replaced to your advantage.