This 5-volume set (CCIS 214-CCIS 218) constitutes the refereed proceedings of the International Conference on Computer Science, Environment, Ecoinformatics, and Education, CSEE 2011, held in Wuhan, Ch
The two volume set LNCS 6854/6855 constitutes the refereed proceedings of the International Conference on Computer Analysis of Images and Patterns, CAIP 2011, which took place in Seville, Spain, Augu
This Three-Volume-Set constitutes the refereed proceedings of the SecondInternational Conference on Software Engineering and Computer Systems,ICSECS 2011, held in Kuantan, Malaysia, in June 2011.The 1
This Three-Volume-Set constitutes the refereed proceedings of the SecondInternational Conference on Software Engineering and Computer Systems,ICSECS 2011, held in Kuantan, Malaysia, in June 2011.The 1
"The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications
Building Information Modeling (BIM) software combines 3-D elements and information in all aspects of the design of a building.While many books are published on BIM related to technology and computer p
The late Gold (Massachusetts Institute of Technology and U. of California at Berkeley), Morgan (electrical engineering and computer sciences, U. of California at Berkeley), and Ellis (electrical engin
Logic and its components (propositional, first-order, non-classical) play a key role in Computer Science and Artificial Intelligence. While a large amount of information exists scattered throughout va
This collection of eleven articles on human computer interaction highlights current research in integrated computing systems for both public and personal transportation. Topics discussed include trave
INTEGRATED COMPUTER APPLICATIONS 6E challenges users to combine all of the tools of Microsoft Office 2010 plus Web computing to create relevant workplace solutions. Real-world projects plus an easy-to
This two-volume set (CCIS 152 and CCIS 153) constitutes the refereed proceedings of the International Conference on Computer Science and Information Engineering, CSIE 2011, held in Zhengzhou, China, i
The recent emergence of Local Binary Patterns (LBP) has led to significant progress in applying texture methods to various computer vision problems and applications. The focus of this research has bro
This two-volume set (CCIS 175 and CCIS 176) constitutes the refereed proceedings of the International Conference on Computer Education, Simulation and Modeling, CSEM 2011, held in Wuhan, China, in Jun
Due to the increasing importance of multi-scale computation in engineering, stimulated by the dramatic development of computer technology and understanding of multi-scale structures an issue on multi-
Now in a second, expanded edition, this book bridges the gap between standard geometry books, which are primarily theoretical, and applied books on computer graphics and introduces a range of geometri
This book provides an introduction to human visual perception suitable for readers studying or working in the fields of computer graphics and visualization, cognitive science, and visual neuroscience.
Computer science, public administration, and information are among the perspectives contributors bring to discussions of how technology can be one of the tools for widening inclusivity in government s
This collection of fifteen articles on computer networking showcases current scholarship in network security and management in a variety of information technology contexts. Divided into sections cover
A classicist and an archaeologist are included, but the rest of the contributors are from computer science, electrical engineering, mathematics, and other fields concerned with the technology rather t
Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second ed
Driven by advances in computer technology, engineering analysis has developed rapidly and extensively in recent times; Visualization of Fields and Applications in Engineering presents the basic techni
This book constitutes Part III of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010,
A revealing account of the first time computer modeling met City Hall -- and the disaster that ensued In 1968, New York City struck a deal with the RAND Corporation to use their computer models to
The computer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book is the most comprehensive study of this field. It contains a collection of 78 c
This series, since its first volume in 1960 and now the oldest series still being published, covers new developments in computer technology. Each volume contains from 5 to 7 chapters and 3 volumes are
International contributors in management and computer information systems offer insight on the use of technology in business and industry, in this book for managers, IT professionals, and business stu
International contributors in business management, business information technology, computer science, tourism, and marketing explore current trends and challenges in e-services and mobile communicatio
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensics but who desires to learn about it. The book is a
Focusing on the design and implementation of computer-based automatic machine tools, David F. Noble challenges the idea that technology has a life of its own. Technology has been both a convenient sca
This series, since its first volume in 1960 and now the oldest series still being published, covers new developments in computer technology. Each volume contains from 5 to 7 chapters and 3 volumes are
Using a hands-on approach, Computer Accounting with QuickBooks(R) 2011 integrates understanding accounting with mastery of QuickBooks software. The text provides proven instructional techniques based
This collection of ten articles on business information technology infrastructure showcases current scholarship in the management of scalable computer resources and training. Divided into sections on
This collection of seventeen articles on computer gaming showcases current scholarship in the application of game technologies for use in educational and corporate training. Topics discussed include v
Gary Bronson's A FIRST BOOK OF C++, Fourth Edition, takes a hands-on, applied approach to the first programming language course for students studying computer science. The book begins with procedural
Join us in a fascinating discovery from a team of UCLA neuroscientists who demonstrate that exposure to computer technology causes rapid and profound changes in neural circuitry. With these practical
This book is written for computer engineers and scientists active in the development of software and hardware systems. It supplies the understanding and tools needed to effectively evaluate the perfor
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India,
Reflecting the challenges of an era of deep dependence on, and connection to, digital communication technology, this collection of twenty articles on computer crime and digital forensics highlights cu
Covers the key topics in computer organization and embedded systems. This book presents hardware design principles and shows how hardware design is influenced by the requirements of software. It expla
Ying-Dar Lin, Ren-Hung Hwang, and Fred Baker’s Computer Networks: An Open Source Approach is the first text to implement an open source approach, discussing the network layers, their applications, and