Narrow your search
Listing 1 - 10 of 37 << page
of 4
>>
Sort by

Book
Safety, security and privacy for cyber-physical systems
Authors: ---
ISBN: 3030650480 3030650472 Year: 2021 Publisher: Cham, Switzerland : Springer,


Book
Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing : Hardware Architectures
Authors: ---
ISBN: 9783031195686 303119568X Year: 2024 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents recent advances towards the goal of enabling efficient implementation of machine learning models on resource-constrained systems, covering different application domains. The focus is on presenting interesting and new use cases of applying machine learning to innovative application domains, exploring the efficient hardware design of efficient machine learning accelerators, memory optimization techniques, illustrating model compression and neural architecture search techniques for energy-efficient and fast execution on resource-constrained hardware platforms, and understanding hardware-software codesign techniques for achieving even greater energy, reliability, and performance benefits. Discusses efficient implementation of machine learning in embedded, CPS, IoT, and edge computing; Offers comprehensive coverage of hardware design, software design, and hardware/software co-design and co-optimization; Describes real applications todemonstrate how embedded, CPS, IoT, and edge applications benefit from machine learning.


Book
Analytics and Data Science : Advances in Research and Pedagogy
Authors: --- --- ---
ISBN: 3319580973 3319580965 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Chapter 1. Exploring the Analytics Frontiers through Research and Pedagogy Amit V. Deokar, Ashish Gupta, Lakshmi Iyer, and Mary C. Jones  Chapter 2. Introduction: Research and Research-in-Progress Anna Sidorova, Babita Gupta, and Barbara Dinter  Chapter 3. Business Intelligence Capabilities Thiagarajan Ramakrishnan, Jiban Khuntia, Terence Saldanha, and Abhishek Kathuria  Chapter 4.Big Data Capabilities: An Organizational Information Processing Perspective ÖyküIsik  Chapter 5. Business Analytics Capabilities and Use: A Value Chain Perspective Rudolph T. Bedeley, TorupallabGhoshal, Lakshmi S. Iyer, and JoyenduBhadury  Chapter 6.Critical Value Factors in Business Intelligence Systems Implementations Paul P. Dooley, Yair Levy, Raymond A. Hackney, and James L. Parrish  Chapter 7. Business Intelligence Systems Use in Chinese Organizations Yutong Song, David Arnott, and ShijiaGao  Chapter 8. The Impact of Customer Reviews on Product Innovation: Empirical Evidence in Mobile Apps Zhilei Qiao, G. Alan Wang, Mi Zhou, and Weiguo Fan  Chapter 9. Whispering on Social Media Juheng Zhang  Chapter 10. Does Social Media Reflect Metropolitan Attractiveness? Behavioral Information from Twitter Activity in Urban Areas Johannes Bendler, Tobias Brandt, and Dirk Neumann  Chapter 11. The Competitive Landscape of Mobile Communications Industry in Canada – Predictive Analytic Modeling with Google Trends and Twitter Michal Szczech and OzgurTuretken  Chapter 12. Scale Development Using Twitter Data: Applying Contemporary Natural Language Processing Methods in IS Research David Agogo and Traci J. Hess  Chapter 13. Information Privacy on Online Social Networks: Illusion-in-Progress in the Age of Big Data? Shwadhin Sharma and Babita Gupta Chapter 14. Online Information Processing of Scent-Related Words and Implications for Decision Making Meng-Hsien (Jenny) Lin, Samantha N.N. Cross, William J. Jones, and Terry L. Childers  Chapter 15. Say It Right: IS Prototype to Enable Evidence-Based Communication Using Big Data Simon Alfano  Chapter 16. Introduction: Pedagogy in Analytics and Data Science Nicholas Evangelopoulos, Joseph W. Clark, and Sule Balkan  Chapter 17. Tools for Academic Business Intelligence & Analytics Teaching – Results of an Evaluation Christoph Kollwitz, Barbara Dinter, and Robert Krawatzeck  Chapter 18. Neural Net Tutorial Brian R. Huguenard, and Deborah J. Ballou  Chapter 19. An Examination of ERP Learning Outcomes: A Text Mining Approach Mary M. Dunaway  Chapter 20. Data Science for All: A University-Wide Course in Data Literacy David Schuff.


Book
3D imaging technologies -- multidimensional signal processing and deep learning. : methods, algorithms and applications
Authors: --- ---
ISBN: 9811631808 9811631794 Year: 2021 Publisher: Gateway East, Singapore : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Three-dimensional imaging --- Visualització tridimensional --- Processament d'imatges --- Tecnologia de la informació --- Sistemes informàtics --- Anàlisi d'imatges --- Processament de dades fotogràfiques --- Processament de la imatge --- Tractament d'imatges --- Tractament de la imatge --- Processament òptic de dades --- Processament digital d'imatges --- Visió per ordinador --- Lectors òptics --- Sistemes d'imatges --- 3D (Visualització) --- Disseny tridimensional --- Imatges 3D --- Imatges tridimensionals --- Representació visual en tres dimensions --- Sistemes de projecció tridimensional --- Sistemes de visualització tridimensional (Informàtica) --- Visualització 3D --- Visualització tridimensional per computador --- Visualització tridimensional (Informàtica) --- Visualització (Informàtica) --- VRML (Llenguatge de programació) --- Sistemes de processament de dades --- Informàtica --- ANSYS (Sistema informàtic) --- Computació distribuïda --- Equip perifèric --- Ordinadors --- Pèrgam (Sistema informàtic) --- Programari --- Sistemes incrustats (Informàtica) --- Sistemes informàtics interactius --- Sistemes transaccionals (Sistemes informàtics) --- Sistemes virtuals (Informàtica) --- Centres informàtics --- Noves tecnologies de la informació i de la comunicació --- Tecnologies de la informació i la comunicació --- Tecnologia de la comunicació i de la informació --- TIC --- AcTIC --- Alfabetització tecnològica --- Autopistes de la informació --- Bretxa digital --- Economia de la informació --- Gestió del coneixement


Book
Software engineering for embedded systems : methods, practical techniques, and applications
Authors: ---
ISBN: 0128094338 0128094486 9780128094334 9780128094488 Year: 2019 Publisher: Oxford : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Software Engineering for Embedded Systems: Methods, Practical Techniques, and Applications, Second Edition provides the techniques and technologies in software engineering to optimally design and implement an embedded system. Written by experts with a solution focus, this encyclopedic reference gives an indispensable aid on how to tackle the day-to-day problems encountered when using software engineering methods to develop embedded systems. New sections cover peripheral programming, Internet of things, security and cryptography, networking and packet processing, and hands on labs. Users will learn about the principles of good architecture for an embedded system, design practices, details on principles, and much more. Provides a roadmap of key problems/issues and references to their solution in the text Reviews core methods and how to apply them Contains examples that demonstrate timeless implementation details Users case studies to show how key ideas can be implemented, the rationale for choices made, and design guidelines and trade-offs


Book
Advanced computing : 11th international advanced computing conference, IACC 2021, Msida, Malta, December 18-19, 2021, revised selected papers
Author:
ISBN: 3030955028 303095501X Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
Performance evaluation and benchmarking : 13th TPC Technology Conference, TPCTC 2021, Copenhagen, Denmark, August 20, 2021, Revised selected papers
Authors: ---
ISBN: 3030944360 3030944379 Year: 2022 Publisher: Cham, Switzerland : Springer,


Book
Computer security and the Internet : tools and Jewels
Author:
ISBN: 3030336492 3030336484 9783030336493 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.

Listing 1 - 10 of 37 << page
of 4
>>
Sort by