Computer Science & Engineering

Per Page:

Introduction to Machine Learning with Applications in Information Security


Mark Stamp
September 7, 2017

Introduction to Machine Learning with Applications in Information Security provides a class-tested introduction to a wide variety of machine learning algorithms, reinforced through realistic applications. The book is accessible and doesn’t prove theorems, or otherwise dwell on mathematical theory....

Building the Network of the Future: Getting Smarter, Faster, and More Flexible with a Software Centric Approach


John Donovan, Krish Prabhu
June 22, 2017

From the Foreword: "This book lays out much of what we’ve learned at AT&T about SDN and NFV. Some of the smartest network experts in the industry have drawn a map to help you navigate this journey. Their goal isn’t to predict the future but to help you design and build a network that will be...

Artificial Intelligence Safety and Security

Roman V. Yampolskiy
August 17, 2018

The history of robotics and artificial intelligence in many ways is also the history of humanity’s attempts to control such technologies. From the Golem of Prague to the military robots of modernity, the debate continues as to what degree of independence such entities should have and how to make...

Mobile WiMAX Systems: Performance Analysis of Fractional Frequency Reuse

Mohammed Khalid Salman Fadhil, Abid Yahya
August 15, 2018

This book presents new models to enhance both capacity and coverage area in WiMAX FFR cellular network by considering the effect of interference of 18 base stations on the cell border users. The concepts provide a solid scientific base for analyzing and understanding WiMAX technology. This book...

Computer Programming for Beginners: A Step-By-Step Guide

Murali Chemuturi
August 15, 2018

This book aims to capture the fundamentals of computer programming without tying the topic to any specific programming language. To the best of the authors’ knowledge there is no such book in the market....

Robust Quality: Powerful Integration of Data Science and Process Engineering

Rajesh Jugulum
August 08, 2018

After realizing the importance of data, organizations have begun to view data as a critical asset, being equally important as other assets such as people, capital, raw materials, and facilities. In order to ensure data are fit for the purpose, there is a need to have high quality levels of data....

Emerging Trends in Engineering, Science and Technology for Society, Energy and Environment: Proceedings of the International Conference in Emerging Trends in Engineering, Science and Technology (ICETEST 2018), January 18-20, 2018, Thrissur, Kerala, India

Rajesh Vanchipura, K.S. Jiji
August 07, 2018

The International Conference on Emerging Trends in Engineering, Science and Technology (ICETEST) was held at the Government Engineering College, Thrissur, Kerala, India, from 18th to 20th January 2018, with the theme, “Society, Energy and Environment”, covering related topics in the areas of Civil...

Real-Time Rendering, Fourth Edition

Tomas Akenine-Möller, Eric Haines, Naty Hoffman
August 06, 2018

Thoroughly updated, this fourth edition focuses on modern techniques used to generate synthetic three-dimensional images in a fraction of a second. With the advent of programmable shaders, a wide variety of new algorithms have arisen and evolved over the past few years. This edition discusses...

Multi-View Geometry Based Visual Perception and Control of Robotic Systems

Jian Chen, Bingxi Jia, Kaixiang Zhang
August 01, 2018

This book describes visual perception and control methods for robotic systems that need to interact with the environment. Multiple view geometry is utilized to extract low-dimensional geometric information from abundant and high-dimensional image information, making it convenient to develop general...

Introduction to Cryptography

Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat
July 31, 2018

Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most...

Low Power Semiconductor Devices and Processes for Emerging Applications in Communications, Computing, and Sensing

Sumeet Walia
July 31, 2018

The book addresses the need to investigate new approaches to lower energy requirement in multiple application areas and serves as a guide into emerging circuit technologies. It explores revolutionary device concepts, sensors, and associated circuits and architectures that will greatly extend the...

Data-Driven Law: Data Analytics and the New Legal Services

Edward J. Walters
July 27, 2018

For increasingly data-savvy clients, lawyers can no longer give "it depends" answers rooted in anecdata. Clients insist that their lawyers justify their reasoning, and with more than a limited set of war stories. The considered judgment of an experienced lawyer is unquestionably valuable. However,...

Boundaries and Hulls of Euclidean Graphs: From Theory to Practice

Ahcene Bounceur, Madani Bezoui, Reinhardt Euler
July 26, 2018

Boundaries and Hulls of Euclidean Graphs: From Theory to Practice presents concepts and algorithms for finding convex, concave and polygon hulls of Euclidean graphs. It also includes some implementations, determining and comparing their complexities. Since the implementation is...

Web Technology: Theory and Practice

Akshi Kumar
July 24, 2018

This book intends to expound the complete concept of Web in Theory, Web in Research and Web in Practice with the help of worked out examples for better understanding. Planned as a comprehensive reading for beginners and a reference for advanced learners, the book includes latest developments and...