Listing 1 - 10 of 43 | << page >> |
Sort by
|
Choose an application
Electronics --- Signal processing --- Computers --- Automatic control --- Electrical engineering --- System theory --- Automatic control. --- Computers. --- Electrical engineering. --- Electronics. --- Signal processing. --- System theory. --- Sistemes informàtics --- Processament de senyals --- Electrònica
Choose an application
This unique introduction to the foundational concepts of cyber-physical systems (CPS) describes key design principles and emerging research trends in detail. Several interdisciplinary applications are covered, with a focus on the wide-area management of infrastructures including electric power systems, air transportation networks, and health care systems. Design, control and optimization of cyber-physical infrastructures are discussed, addressing security and privacy issues of networked CPS, presenting graph-theoretic and numerical approaches to CPS evaluation and monitoring, and providing readers with the knowledge needed to operate CPS in a reliable, efficient, and secure manner. Exercises are included. This is an ideal resource for researchers and graduate students in electrical engineering and computer science, as well as for practitioners using cyber-physical systems in aerospace and automotive engineering, medical technology, and large-scale infrastructure operations.
Cooperating objects (Computer systems) --- Automation. --- Automatic factories --- Automatic production --- Computer control --- Engineering cybernetics --- Factories --- Industrial engineering --- Mechanization --- Assembly-line methods --- Automatic control --- Automatic machinery --- CAD/CAM systems --- Robotics --- Automation --- Automatització. --- Objectes cooperants (Sistemes informàtics)
Choose an application
Cooperating objects (Computer systems) --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Sistemes informàtics $2 thub
Choose an application
This book presents recent advances towards the goal of enabling efficient implementation of machine learning models on resource-constrained systems, covering different application domains. The focus is on presenting interesting and new use cases of applying machine learning to innovative application domains, exploring the efficient hardware design of efficient machine learning accelerators, memory optimization techniques, illustrating model compression and neural architecture search techniques for energy-efficient and fast execution on resource-constrained hardware platforms, and understanding hardware-software codesign techniques for achieving even greater energy, reliability, and performance benefits. Discusses efficient implementation of machine learning in embedded, CPS, IoT, and edge computing; Offers comprehensive coverage of hardware design, software design, and hardware/software co-design and co-optimization; Describes real applications todemonstrate how embedded, CPS, IoT, and edge applications benefit from machine learning.
Embedded computer systems. --- Cooperating objects (Computer systems). --- Artificial intelligence. --- Embedded Systems. --- Cyber-Physical Systems. --- Artificial Intelligence. --- Sistemes incrustats (Informàtica) --- Objectes cooperants (Sistemes informàtics) --- Informàtica a la perifèria --- Aprenentatge automàtic
Choose an application
Chapter 1. Exploring the Analytics Frontiers through Research and Pedagogy Amit V. Deokar, Ashish Gupta, Lakshmi Iyer, and Mary C. Jones Chapter 2. Introduction: Research and Research-in-Progress Anna Sidorova, Babita Gupta, and Barbara Dinter Chapter 3. Business Intelligence Capabilities Thiagarajan Ramakrishnan, Jiban Khuntia, Terence Saldanha, and Abhishek Kathuria Chapter 4.Big Data Capabilities: An Organizational Information Processing Perspective ÖyküIsik Chapter 5. Business Analytics Capabilities and Use: A Value Chain Perspective Rudolph T. Bedeley, TorupallabGhoshal, Lakshmi S. Iyer, and JoyenduBhadury Chapter 6.Critical Value Factors in Business Intelligence Systems Implementations Paul P. Dooley, Yair Levy, Raymond A. Hackney, and James L. Parrish Chapter 7. Business Intelligence Systems Use in Chinese Organizations Yutong Song, David Arnott, and ShijiaGao Chapter 8. The Impact of Customer Reviews on Product Innovation: Empirical Evidence in Mobile Apps Zhilei Qiao, G. Alan Wang, Mi Zhou, and Weiguo Fan Chapter 9. Whispering on Social Media Juheng Zhang Chapter 10. Does Social Media Reflect Metropolitan Attractiveness? Behavioral Information from Twitter Activity in Urban Areas Johannes Bendler, Tobias Brandt, and Dirk Neumann Chapter 11. The Competitive Landscape of Mobile Communications Industry in Canada – Predictive Analytic Modeling with Google Trends and Twitter Michal Szczech and OzgurTuretken Chapter 12. Scale Development Using Twitter Data: Applying Contemporary Natural Language Processing Methods in IS Research David Agogo and Traci J. Hess Chapter 13. Information Privacy on Online Social Networks: Illusion-in-Progress in the Age of Big Data? Shwadhin Sharma and Babita Gupta Chapter 14. Online Information Processing of Scent-Related Words and Implications for Decision Making Meng-Hsien (Jenny) Lin, Samantha N.N. Cross, William J. Jones, and Terry L. Childers Chapter 15. Say It Right: IS Prototype to Enable Evidence-Based Communication Using Big Data Simon Alfano Chapter 16. Introduction: Pedagogy in Analytics and Data Science Nicholas Evangelopoulos, Joseph W. Clark, and Sule Balkan Chapter 17. Tools for Academic Business Intelligence & Analytics Teaching – Results of an Evaluation Christoph Kollwitz, Barbara Dinter, and Robert Krawatzeck Chapter 18. Neural Net Tutorial Brian R. Huguenard, and Deborah J. Ballou Chapter 19. An Examination of ERP Learning Outcomes: A Text Mining Approach Mary M. Dunaway Chapter 20. Data Science for All: A University-Wide Course in Data Literacy David Schuff.
Business. --- Management information systems. --- Big data. --- Computer science. --- Business and Management. --- Business Information Systems. --- Big Data/Analytics. --- Management of Computing and Information Systems. --- Big data --- Security measures. --- Data sets, Large --- Large data sets --- Data sets --- Information Systems. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems --- Informatics --- Science --- Sistemes d'informació per a la gestió --- Dades massives --- Sistemes informàtics --- Sistemes de processament de dades --- Informàtica --- ANSYS (Sistema informàtic) --- Computació distribuïda --- Equip perifèric --- Ordinadors --- Pèrgam (Sistema informàtic) --- Programari --- Sistemes incrustats (Informàtica) --- Sistemes informàtics interactius --- Sistemes transaccionals (Sistemes informàtics) --- Sistemes virtuals (Informàtica) --- Centres informàtics --- Macrodades --- Bases de dades --- Informàtica de gestió --- S.I.G. --- Sistema d'informació per a la gestió --- Sistemes d'informació de gestió --- Sistemes d'informació en la direcció --- Sistemes d'informació en la gestió --- Sistemes d'ajuda a la decisió --- Administració
Choose an application
Three-dimensional imaging --- Visualització tridimensional --- Processament d'imatges --- Tecnologia de la informació --- Sistemes informàtics --- Anàlisi d'imatges --- Processament de dades fotogràfiques --- Processament de la imatge --- Tractament d'imatges --- Tractament de la imatge --- Processament òptic de dades --- Processament digital d'imatges --- Visió per ordinador --- Lectors òptics --- Sistemes d'imatges --- 3D (Visualització) --- Disseny tridimensional --- Imatges 3D --- Imatges tridimensionals --- Representació visual en tres dimensions --- Sistemes de projecció tridimensional --- Sistemes de visualització tridimensional (Informàtica) --- Visualització 3D --- Visualització tridimensional per computador --- Visualització tridimensional (Informàtica) --- Visualització (Informàtica) --- VRML (Llenguatge de programació) --- Sistemes de processament de dades --- Informàtica --- ANSYS (Sistema informàtic) --- Computació distribuïda --- Equip perifèric --- Ordinadors --- Pèrgam (Sistema informàtic) --- Programari --- Sistemes incrustats (Informàtica) --- Sistemes informàtics interactius --- Sistemes transaccionals (Sistemes informàtics) --- Sistemes virtuals (Informàtica) --- Centres informàtics --- Noves tecnologies de la informació i de la comunicació --- Tecnologies de la informació i la comunicació --- Tecnologia de la comunicació i de la informació --- TIC --- AcTIC --- Alfabetització tecnològica --- Autopistes de la informació --- Bretxa digital --- Economia de la informació --- Gestió del coneixement
Choose an application
Software Engineering for Embedded Systems: Methods, Practical Techniques, and Applications, Second Edition provides the techniques and technologies in software engineering to optimally design and implement an embedded system. Written by experts with a solution focus, this encyclopedic reference gives an indispensable aid on how to tackle the day-to-day problems encountered when using software engineering methods to develop embedded systems. New sections cover peripheral programming, Internet of things, security and cryptography, networking and packet processing, and hands on labs. Users will learn about the principles of good architecture for an embedded system, design practices, details on principles, and much more. Provides a roadmap of key problems/issues and references to their solution in the text Reviews core methods and how to apply them Contains examples that demonstrate timeless implementation details Users case studies to show how key ideas can be implemented, the rationale for choices made, and design guidelines and trade-offs
Software engineering. --- Embedded computer systems. --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- Computer software engineering --- Engineering --- Enginyeria de programari --- Sistemes incrustats (Informàtica) --- Enginyeria de programes d'ordinador --- Enginyeria del programari --- Enginyeria del software --- Programari --- Programari, Enginyeria de --- Enginyeria --- Programació (Ordinadors) --- Ordinadors immersos, Sistemes d' --- Sistemes d'ordinadors immersos --- Sistemes immersos (Informàtica) --- Sistemes informàtics
Choose an application
Computer science. --- Informatics --- Science --- Informàtica --- Enginyeria --- Càlcul intensiu (Informàtica) --- Disseny de sistemes --- Història de la informàtica --- Geometria computacional --- Informàtica tova --- Processament de dades --- Programació (Ordinadors) --- Sistemes informàtics --- Teledocumentació --- Tractament del llenguatge natural (Informàtica) --- Automatització d'arxius --- Automatització de biblioteques --- Automatització de museus --- Indústria informàtica --- Teoria de la informació
Choose an application
Transaction systems (Computer systems) --- Databases --- Management. --- Quality control. --- Data banks --- Data bases --- Databanks --- Database systems --- Computer files --- Electronic information resources --- TP systems (Computer systems) --- Transaction-oriented systems (Computer systems) --- Transaction processing systems (Computer systems) --- Computer systems --- Real-time data processing --- Sistemes transaccionals (Sistemes informàtics) --- Gestió de bases de dades
Choose an application
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.
Computer security. --- Internet --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- System safety. --- Computer organization. --- Electrical engineering. --- Application software. --- Systems and Data Security. --- Security Science and Technology. --- Computer Systems Organization and Communication Networks. --- Communications Engineering, Networks. --- Information Systems Applications (incl. Internet). --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Organization, Computer --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Prevention --- Seguretat informàtica. --- Ordinadors --- Disseny i funcionament. --- Informàtica --- Seguretat dels sistemes informàtics --- Sistemes informàtics --- Protecció de dades --- Sistemes de seguretat --- Concepció i construcció --- Mesures de seguretat
Listing 1 - 10 of 43 | << page >> |
Sort by
|