Computer Science & Engineering

Per Page:
Sort:

Computational Science and Engineering: Proceedings of the International Conference on Computational Science and Engineering (Beliaghata, Kolkata, India, 4-6 October 2016)

Arpan Deyasi, Soumen Mukherjee, Pampa Debnath, Arup Kumar Bhattacharjee
December 12, 2016

Computational Science and Engineering contains peer-reviewed research presented at the International Conference on Computational Science and Engineering (RCC Institute of Information Technology, Kolkata, India, 4-6 October 2016). The contributions cover a wide range of topics: - electronic devices-...

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Speed, Data, and Ecosystems: Excelling in a Software-Driven World

Jan Bosch
December 08, 2016

As software R&D investment increases, the benefits from short feedback cycles using technologies such as continuous deployment, experimentation-based development, and multidisciplinary teams require a fundamentally different strategy and process. This book will cover the three overall...

Disk-Based Algorithms for Big Data

Christopher G. Healey
December 07, 2016

Disk-Based Algorithms for Big Data is a product of recent advances in the areas of big data, data analytics, and the underlying file systems and data management algorithms used to support the storage and analysis of massive data collections. The book discusses hard disks and their impact on data...

Elements of Parallel Computing

Eric Aubanel
December 06, 2016

Designed for introductory parallel computing courses at the advanced undergraduate or beginning graduate level, Elements of Parallel Computing presents the fundamental concepts of parallel computing not from the point of view of hardware, but from a more abstract view of algorithmic and...

Graph Polynomials

Yongtang Shi, Matthias Dehmer, Xueliang Li, Ivan Gutman
December 06, 2016

This book covers both theoretical and practical results for graph polynomials. Graph polynomials have been developed for measuring combinatorial graph invariants and for characterizing graphs. Various problems in pure and applied graph theory or discrete mathematics can be treated and solved...

The New Web Typography: Create a Visual Hierarchy with Responsive Web Design

Stephen Boss, Jason Cranford Teague
December 01, 2016

With a vast selection of typefaces now available, there is no excuse for using boring typography in web design. The New Web Typography: Create a Visual Hierarchy with Responsive Web Design shows you how to implement web-safe fonts to create visually appealing and multi-browser-friendly websites...

Big Data Computing: A Guide for Business and Technology Managers

Vivek Kale
December 01, 2016

This book unravels the mystery of Big Data computing and its power to transform business operations. The approach it uses will be helpful to any professional who must present a case for realizing Big Data computing solutions or to those who could be involved in a Big Data computing project. It...

Data Mining: A Tutorial-Based Primer, Second Edition

Richard J. Roiger
December 01, 2016

Data Mining: A Tutorial-Based Primer, Second Edition provides a comprehensive introduction to data mining with a focus on model building and testing, as well as on interpreting and validating results. The text guides students to understand how data mining can be employed to solve real problems and...

Computer Architecture: Fundamentals and Principles of Computer Design, Second Edition

Joseph D. Dumas II
December 01, 2016

Not only does almost everyone in the civilized world use a personal computer, smartphone, and/or tablet on a daily basis to communicate with others and access information, but virtually every other modern appliance, vehicle, or other device has one or more computers embedded inside it. One cannot...

Security for Wireless Sensor Networks using Identity-Based Cryptography

Harsh Kupwade Patil, Stephen A. Szygenda
December 01, 2016

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack...

Biometrics in Support of Military Operations: Lessons from the Battlefield

William C. Buhrow
November 22, 2016

Biometrics in Support of Military Operations: Lessons from the Battlefield examines and evaluates recent U.S. military experiences in Iraq and Afghanistan in the context of the use of biometrics and related technologies. The book takes a comprehensive look at how biometrics has been used to support...

Conferences

Year: