Image Quality Assessment is well-known for measuring the perceived image degradation of natural scene images but is still an emerging topic for computer-generated images. This book addresses this prob
This SpringerBrief discusses how to develop intelligent systems for cyber attribution regarding cyber-attacks. Specifically, the authors review the multiple facets of the cyber attribution problem tha
This book presents an overview of the technical underpinnings in the field of digital media. This includes theory, imaging, big data, interaction, and the research and development that is needed in or
This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to t
This book presents a holistic view on compiler assisted practical secure multi-party computation (MPC) over Boolean circuits. It discusses that two or more parties jointly evaluate a function over the
This book introduces readers to an advanced combinatorial testing approach and its application in the cloud environment. Based on test algebra and fault location analysis, the proposed combinatorial t
Identifying failure modes and their effects is critical to software failure mode and effects analysis and it largely depends on the analysts’ experience and the skill. This book develops a series of r
This book provides a frequentist semantics for conditionalization on partially known events, which is given as a straightforward generalization of classical conditional probability via so-called proba
This book analyzes unexpected preference query results for three problems: causality and responsibility problems, why-not and why questions, and why-few and why-many questions. Further, it refines pre
This book investigates the problem of reducing operating cost for a video streaming content delivery network (CDN), including both the CDN’s energy and traffic costs. It first introduces the key issue
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It examines theories and various state-of-the-art technologies and methodologi
This SpringerBrief reviews the knowledge engineering problem of engineering objectivity in top-k query answering; essentially, answers must be computed taking into account the user’s preferences and
This work provides a review of biological networks as a model for analysis, presenting and discussing a number of illuminating analyses. Biological networks are an effective model for providing insigh
This book presents the user-facing aspects of digital media, from the web and computer games, to mobile technologies and social media, and demonstrates how these are continuously growing and developin
This book offers a systematic and practical overview of Quality of Service prediction in cloud and service computing. Intended to thoroughly prepare the reader for research in cloud performance, the b
This book offers a helpful starting point in the scattered, rich, and complex body of literature on Mobile Information Retrieval (Mobile IR), reviewing more than 200 papers in nine chapters. Highlight
This engaging and clearly written textbook/reference provides a must-have introduction to the rapidly emerging interdisciplinary field of data science. It focuses on the principles fundamental to beco
This book presents a systematic study of visual pattern discovery, from unsupervised to semi-supervised manner approaches, and from dealing with a single feature to multiple types of features. Further
The main goal of this book is to explain the core ideas of process mining, and to demonstrate how they can be implemented using just some basic tools that are available to any computer scientist or da
This textbook provides a comprehensive and reader-friendly introduction to the field of computational social science (CSS). Presenting a unified treatment, the text examines in detail the four key met
The authors systematically review methods of online digital advertising (ad) fraud and the techniques to prevent and defeat such fraud in this brief. The authors categorize ad fraud into three major c
This book examines how digital technology is being used to assist the artists and designers. The computer is able to store data and reproduce designs, thus facilitating the speed-up of the iterative p
This book provides the first systematic study of facial kinship verification, a new research topic in biometrics. It presents three key aspects of facial kinship verification: 1) feature learning for
This work offers a guided walkthrough of one of the most promising research areas in modern life sciences, enabling a deeper understanding of involved concepts and methodologies via an interdisciplina
This work presents a review of different indexing techniques designed to enhance the speed and efficiency of searches over large biometric databases. The coverage includes an extended Delaunay triangu
This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls for unique and bespoke solutions to deal with the
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a
This book examines how creativity feeds through into typical application areas, and the lessons that can be learned from this. A number of Case Studies in creative and general application domains are
This SpringerBrief provides a synergistic overview of technology trends by emphasizing five linked perspectives: crowd+cloud machines, extreme cooperation with smart things, scalable context-awareness
This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are describ
This book presents the algorithms used to provide recommendations by exploiting matrix factorization and tensor decomposition techniques. It highlights well-known decomposition methods for recommender
This work is intended for advanced students, practitioners, and researchers in information security and digital forensics. The book describes the latest technologies for digital watermarking and p
Play engages humans cognitively, emotionally, and physically at all ages. Using a historical framework, and focusing on play as represented by material artifacts such as toys and games, this book expl
This book provides a candid assessment and practical knowledge about the current technological advancements of the wireless healthcare system. This book presents the competencies of modeling e-health
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context–aware techniq
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how 5G mobile communication technology (5G) can no lon
This book investigates key security issues in connection with the physical layer for random wireless cellular networks. It first introduces readers to the fundamentals of information theoretic securit
This work provides guidelines for the practical implementation of security architecture in a particular corporate cloud. The authors are mathematicians and specialists in data modeling and security. E
This SpringerBrief provides an overview of contemporary innovative technologies and discusses their impact on our daily lives. Written from a technical perspective, and yet using language and terminol