Listing 1 - 10 of 38 | << page >> |
Sort by
|
Choose an application
Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization. This book starts with a detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others. We delve deep into the key problem of influence maximization, which selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in classic diffusion models including both the independent cascade and the linear threshold models is computationally intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn this research into practice, such as learning the strength with which individuals in a network influence each other, as well as the practical aspects of this research including the availability of datasets and software tools for facilitating research. We conclude with a discussion of various research problems that remain open, both from a technical perspective and from the viewpoint of transferring the results of research into industry strength applications.
Choose an application
State-of-the-art database systems manage and process a variety of complex objects, including strings and trees. For such objects equality comparisons are often not meaningful and must be replaced by similarity comparisons. This book describes the concepts and techniques to incorporate similarity into database systems. We start out by discussing the properties of strings and trees, and identify the edit distance as the de facto standard for comparing complex objects. Since the edit distance is computationally expensive, token-based distances have been introduced to speed up edit distance computations. The basic idea is to decompose complex objects into sets of tokens that can be compared efficiently. Token-based distances are used to compute an approximation of the edit distance and prune expensive edit distance calculations. A key observation when computing similarity joins is that many of the object pairs, for which the similarity is computed, are very different from each other. Filters exploit this property to improve the performance of similarity joins. A filter preprocesses the input data sets and produces a set of candidate pairs. The distance function is evaluated on the candidate pairs only. We describe the essential query processing techniques for filters based on lower and upper bounds. For token equality joins we describe prefix, size, positional and partitioning filters, which can be used to avoid the computation of small intersections that are not needed since the similarity would be too low.
Choose an application
Der Begriff Information wird heute fast inflationär benutzt. Es seien nur die Informationstechnik, unser Informationszeitalter, die Informatik, die Macht der Information, die Informationsflut, Information und Dokumentation sowie Medien und Archive genannt. Doch leider wird dabei „Information“ zuweilen intuitiv und oft sogar recht individuell benutzt. Horst Völz stellt vier typische Informationsklassen gegenüber und erklärt die leblose Natur, das Leben, die menschliche Kommunikation und die Shannonsche Nachrichtentechnik. Der Inhalt Information und Wirkung im Sinne eines verallgemeinerten Verstärkerprinzips (Kybernetik) Information im Sinne der sprachlichen Kommunikation (Zeichen-, Abbild-Prinzip) Information im Kontext der Information (Rechnersimulation) Shannon- und quantentheoretische Information (Berechnungsgrundlagen, Codierung, Fehlerkorrektur Die Zielgruppen Dozierende und Studierende der Medien-, Kommunikations-, Verhaltens- und Sprachwissenschaft, Informatik, Philosophie und Wissenschaftstheorie Allgemein am Thema Interessierte, Nachrichtentechniker Der Autor Prof. Dr. Horst Völz hat wichtige Arbeiten zur Technik der Speicherung und zu Grundlagen der Information geleistet, die u.a. in vielen Büchern und rund 300 Fachartikeln erschienen sind. Derzeit ist er im Bereich Medienwissenschaften der Humboldt-Universität tätig.
Choose an application
Mit großem didaktischen Geschick gelingt es den Autoren, Begeisterung für die Welt der geheimen Botschaften zu wecken. So gelingt der Einstieg in die Kryptologie ganz leicht. Viele Beispiele und Aufgaben regen dazu an, sich selbständig mit diesem faszinierenden Gebiet zu beschäftigen und helfen dabei, den erlernten Stoff weiter zu vertiefen. Der Inhalt Von Geheimschriften zu Kryptosystemen - Die Suche nach Sicherheit und modulares Rechnen - Entwurf und Kryptoanalyse von monoalphabetischen Kryptosystemen - Polyalphabetische Kryptosysteme und deren Kryptoanalyse - Perfekte Sicherheit und das ONE-TIME-PAD-Kryptosystem - Die ENIGMA und moderne Kryptosysteme - Der geheime Schlüsselaustausch und das DIFFIE-HELLMAN-Protokoll - Komplexitätstheoretische Konzepte und Sicherheit - Das Konzept der Public-Key-Kryptographie - Zahlentheoretische Public-Key-Kryptographie und Protokolle - Lösungen zu ausgewählten Aufgaben Die Zielgruppe Lehramtsstudierende, Lehrer und Schüler Studierende der Informatik und der Mathematik an Universitäten und Fachhochschulen Die Autoren Karin Freiermuth, ETH Zürich Prof. Dr. Juraj Hromkovič, ETH Zürich Dr. Lucia Keller, ETH Zürich Dr. Björn Steffen, ETH Zürich.
Choose an application
Near Field Communication is a radio frequency technology that allows objects, such as mobile phones, computers, tags, or posters, to exchange information wirelessly across a small distance. This report on the progress of Near Field Communication reviews the features and functionality of the technology and summarizes the broad spectrum of its current and anticipated applications. We explore the development of NFC technology in recent years, introduce the major stakeholders in the NFC ecosystem, and project its movement toward mainstream adoption. Several examples of early implementation of NFC in libraries are highlighted, primarily involving the use of NFC to enhance discovery by linking books or other physical objects with digital information about library resources, but also including applications of NFC to collection management and self-checkout. Future uses of NFC in libraries, such as smart posters or other enhanced outreach, are envisioned as well as the potential for the "touch paradigm" and "Internet of things" to transform the ways in which library users interact with the information environment. Conscious of the privacy and security of our patrons, we also address continuing concerns related to NFC technology and its expected applications, recommending caution, awareness, and education as immediate next steps for librarians.
Mathematics. --- Data structures (Computer science). --- Information theory. --- Library science. --- Education. --- Data Structures and Information Theory. --- Library Science.
Choose an application
Librarians have been providing support to researchers for many years, typically with a focus on responding to researchers’ needs for access to the existing literature. However, librarians’ skills and expertise make them uniquely suited to provide a wide range of assistance to researchers across the entire research process, from conception of the research question to archiving of collected data at the project’s conclusion. In response to increasingly stringent demands on researchers to share their data, and as computationally intensive and primarily data-driven scientific methods begin to take the place of traditional lab-based research, the “research informationist” has emerged as a new information profession. With a background in library and information sciences, as well as expertise in best practices for data management, grant funder policies, and informatics tools, the research informationist is capable of implementing a full suite of research support services. This book will discuss how the research informationist role has developed out of the previously established clinical informationist model and how it expands on the model of embedded librarianship. The book will also examine core competencies for the successful research informationist and the training and preparation necessary for students in library and information sciences programs, as well as currently practicing librarians. Finally, this book will consider how research informationists can form collaborative partnerships with research teams and build their services outside the walls of the library, citing practical examples of the types of support research informationists can offer.
Mathematics. --- Data structures (Computer science). --- Information theory. --- Library science. --- Education. --- Data Structures and Information Theory. --- Library Science.
Choose an application
Die Autoren führen in die Kryptographie aus Sicht der Informatik und Mathematik ein. Kryptographie wird als wichtiger Schutzmechanismus zur Gewährleistung von Vertraulichkeit und Integrität im elektronischen Datenverkehr vorgestellt. Wesentliche Themen sind Bedrohungen, korrespondierende Schutzziele und Angreifermodelle. Die grundlegenden Typen kryptographischer Systeme zur Durchsetzung der Schutzziele werden eingeführt und konkrete Verfahren beschrieben. Dabei werden relevante Angriffe, Verbesserungsmöglichkeiten und Grenzen kryptographischer Systeme aufgezeigt. Zahlreiche Beispiele veranschaulichen die dargestellten Sachverhalte und erleichtern das Verständnis. Die Übungsaufgaben ermöglichen die tiefe Auseinandersetzung mit dem Stoff.
Choose an application
To understand the power of distributed systems, it is necessary to understand their inherent limitations: what problems cannot be solved in particular systems, or without sufficient resources (such as time or space). This book presents key techniques for proving such impossibility results and applies them to a variety of different problems in a variety of different system models. Insights gained from these results are highlighted, aspects of a problem that make it difficult are isolated, features of an architecture that make it inadequate for solving certain problems efficiently are identified, and different system models are compared.
Choose an application
Quantum physics, which offers an explanation of the world on the smallest scale, has fundamental implications that pose a serious challenge to ordinary logic. Particularly counterintuitive is the notion of entanglement, which has been explored for the past 30 years and posits an ubiquitous randomness capable of manifesting itself simultaneously in more than one place. This amazing 'non-locality' is more than just an abstract curiosity or paradox: it has entirely down-to-earth applications in cryptography, serving for example to protect financial information; it also has enabled the demonstration of 'quantum teleportation', whose infinite possibilities even science-fiction writers can scarcely imagine. This delightful and concise exposition does not avoid the deep logical difficulties of quantum physics, but gives the reader the insights needed to appreciate them . From 'Bell's Theorem' to experiments in quantum entanglement, the reader will gain a solid understanding of one of the most fascinating areas of contemporary physics.
History of physics --- Quantum mechanics. Quantumfield theory --- Physics --- Spectrometric and optical chemical analysis --- Computer science --- Information systems --- Computer. Automation --- science fiction --- quantumfysica --- electron spin resonance spectre --- cryptologie --- informatica --- informatietechnologie --- programmatielogica --- fysica --- Quàntums, Teoria dels --- Ordinadors quàntics --- Espintrònica --- Quantum physics. --- Physics. --- Quantum computers. --- Spintronics. --- Data structures (Computer science). --- Quantum Physics. --- History and Philosophical Foundations of Physics. --- Quantum Information Technology, Spintronics. --- Data Structures and Information Theory.
Choose an application
Database Systems: A Pragmatic Approach is a classroom textbook for use by students who are learning about relational databases, and the professors who teach them. It discusses the database as an essential component of a software system, as well as a valuable, mission critical corporate resource. The book is based on lecture notes that have been tested and proven over several years, with outstanding results. It also exemplifies mastery of the technique of combining and balancing theory with practice, to give students their best chance at success. Upholding his aim for brevity, comprehensive coverage, and relevance, author Elvis C. Foster's practical and methodical discussion style gets straight to the salient issues, and avoids unnecessary fluff as well as an overkill of theoretical calculations. The book discusses concepts, principles, design, implementation, and management issues of databases. Each chapter is organized systematically into brief, reader-friendly sections, with itemization of the important points to be remembered. It adopts a methodical and pragmatic approach to solving database systems problems. Diagrams and illustrations also sum up the salient points to enhance learning. Additionally, the book includes a number of Foster's original methodologies that add clarity and creativity to the database modeling and design experience while making a novel contribution to the discipline. Everything combines to make Database Systems: A Pragmatic Approach an excellent textbook for students, and an excellent resource on theory for the practitioner.
Database design. --- Database management. --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- Data base design --- System design --- Data structures (Computer scienc. --- Database Management. --- Data Structures and Information Theory. --- Data structures (Computer science). --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science)
Listing 1 - 10 of 38 | << page >> |
Sort by
|