"This book provides relevant theoretical frameworks and the latest empirical research findings in the area of information visualization. It explores the application of Infovis in humanity and social s
So much data is being generated these days that scientists spend a lot of time on such matters as where to store it, how to access it, or how to move it to visualization or computer resources for furt
The 22 papers in this collection explore simulation theory, Petri nets, Monte Carlo, visualization, real-time simulation, and applications to neural networks, data mining, wireless networks, banks, an
"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasu
Several of the contributions in the volume review the state of the art in color techniques for image watermarking, digital audio watermarking algorithms, text watermarking, three-dimensional meshes, a
The 14 papers presented here by Gunasekaran (U. of Massachusetts-Dartmouth) describe techniques and tools for the design, development, and implementation of enterprise information systems that are of
"This book explores the development of intelligent techniques for the information security in the area of biomedical image and signal processing. It emphasizes on data security and content protection
"This book provides information the on techniques and processes in the changing arena of data that will help the world for the next generation and yet protect the instructional concerns for today's st
"This book is an innovative reference source for the latest academic material on emerging perspectives, treatment and care techniques, and therapeutic strategies to support individuals with autism spe
Contributors explore what logic is from such perspectives as the sociology surrounding African logic, computer science aspects, scientific philosophies and methods, proof techniques, and systems a
Writing for educators, game researchers, and academics in schools as well as higher education, Costello looks at how different gaming techniques can be used and harnessed within education to make
Focusing on classifying and clustering techniques, computer scientists look at the multidisciplinary nature of big data and its applications and challenges in various fields. Their topics include
"This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptog
Editors Kurubacak and Altinpulluk present readers with a collection of academic and professional perspectives on research into contemporary and emerging techniques involving the integration of int
Computer scientists describe computing techniques that have been inspired by natural physics, chemistry, biology, and collective intelligence. Their topics include applying an electromagnetism-like
"This book is a key source on the latest advancements in multidisciplinary research methods and applications and examines effective techniques for managing and utilizing information resources. Featuri
"This book provides comprehensive discussions on strategies and techniques for optimizing microprocessor-based electronic system development and examines methods for acquiring improved software and ha
Thirteen chapters propose techniques for storing a collection of web files on a database management system, a fingerprint system for protecting audio copyrights, and an algorithm for integrating an
Editors Adak, Manna, and Bhowmik present readers with a collection of academic essays and scholarly articles focused on contemporary and emerging mathematical techniques in the fields of applied fu
"This book is a reference source for the latest research on the interrelationship between digital branding and academic reputation, showcasing relevant digital platforms and techniques"--
This collection introduces segmentation, classification, and registration techniques for image and video processing, analyzing the evaluation metric datasets for image and video segmentation metho
"This book focuses on intelligent methods and techniques for recognizing and storing dynamic patterns, emphasizing topics related to artificial intelligence, pattern management, and algorithm developm
Computer scientists and electrical engineers survey concepts and various techniques that are used to combat security breaches and criminal activities in the digital sphere for the benefit of researche
Modern optimization approaches have attracted many research scientists, decision makers and practicing researchers in recent years as powerful intelligent computational techniques for solving several
Editors Saxena, Singh, and Pant present readers with a collection of academic essays and scholarly articles focused on the use of contemporary and emerging optimization techniques as solutions for pro
Different types of decision theory techniques are illustrated and their application illustrated in artificial intelligence. The topics include Bayesian networks and influence diagrams, inference strat
The opening chapter of this volume reviews the technologies which sustain the prevalence of online child pornography and provides a set of practical investigation techniques for retrieving digital tra
Ertl (University of the Bundeswehr-Munich, Germany) gathers researchers and academics from the US and Europe to shed light on the latest techniques related to knowledge construction in online environm
This collection explains cutting-edge handheld computing technologies for mobile commerce, related techniques for wireless networks and security, and new approaches to delivering image and videos to m
Recent research from Canada is collected here, shedding light on techniques for design and use of educational games and simulations, especially in the area of health-related learning. The papers are b
The opening section of this collection introduces vehicular network architectures, intelligent transportation systems, and wireless access techniques for vehicular environments. The rest of the 22 pap
This handbook is intended for students, researchers, law enforcement personnel, and IT and multimedia practitioners involved in the use, design, and development of digital devices and techniques for f
This introduction to basic methodology, current research, and advanced techniques of data mining will be useful as a handbook for researchers, practitioners, and technologists. It can also serve as te
The 13 chapters in the collection describe computational techniques inspired in part by nature and natural systems to represent and organize information from business, science, computing, and engineer
Computer scientists, software engineers, and other researchers describe recent investigations into how artificial intelligence techniques and concepts as knowledge-based systems, neural networks, fuzz
This compilation for academicians, researchers, and practitioners examines the fast growing area of wireless sensor networks and localization techniques, and explains fundamental theories underpinning
"This book provides an introduction to the most recent techniques in multimedia semantic mining necessary to researchers new to the field"--Provided by publisher.
Techniques of automatic identification are used in devices such as the bar code, magnetic stripe, integrated circuit, and biometric and radio-frequency identification (RFID). In this book, interdiscip
Author and educator Kalyuga (U. of New South Wales) outlines theory and research-based recommendations on information presentation techniques in both multimedia and electronic learning environments. T
For academics, researchers, practitioners, and students, this volume details pattern-recognition techniques and applications. Verma (computing sciences, Central Queensland U., Australia) and Blumenste