We a good story
Quick delivery in the UK

Books in the SpringerBriefs in Computer Science series

Filter
Filter
Sort bySort Series order
  • by Pedro Mejia Alvarez
    £36.99

    This book presents the fundamentals of exception handling with examples written in C++ and Python. Starting with its history and evolution, it explores the many facets of exception handling, such as its syntax, semantics, challenges, best practices, and implementation patterns.The book is composed of five chapters: Chapter 1 provides an introduction, covering the history, various definitions, and challenges of exception handling. Chapter 2 then delves into the basics, offering insights into the foundational concepts and techniques. Subsequently, chapter 3 touches upon the best practices for exception handling, including the differences between errors and exceptions, the use of assertions, and how to provide meaningful error messages. Chapter 4 takes a deep dive into advanced exception-handling techniques, exploring e.g. patterns, guard clauses, and hierarchical exception handling. Eventually, chapter 5 focuses on the complexities of exception handling in real-time and embedded systems.This book is mainly written for both students and professionals. Its readers will understand the nuances between syntax and semantic errors, learn how to employ try-catch blocks effectively, grasp the importance of logging exceptions, and delve into advanced exception-handling techniques. This way, they will be enabled to handle exceptions effectively and thus write more robust, reliable, and resilient code.

  • by Romano Fantacci
    £36.99

    This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.

  • by Max Smith-Creasey
    £36.99

    This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.

  • by Bin Duo
    £36.99

    This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

  • by Pedro Mejia Alvarez
    £36.99

    This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, designing, and implementing them.To this end, the book is composed of four chapters: Chapter 1 ¿An Overview of Real-Time Database Systems¿ delves into the realm of RTDBs and discusses the specific requirements, transaction models, and scheduling algorithms that set RTDBs apart from conventional DBMs. Chapter 2 on ¿Experimental Real-Time Databases¿ presents various experimental RTDBs developed in academia with their architectures, features, and implementations, while chapter 3 on ¿Commercial Real-Time Databases¿ does so for systems developed and offered by commercial vendors as products or services. Eventually, chapter 4 on ¿Applications of Real-Time Database Systems¿ showcases various applications of RTDBs across different domains.This book will help researchers, graduate students and advanced professionals to get anoverview of the area and to understand the main challenges and systems available.

  • by Jiadi Yu
    £32.49

    As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the keyissues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.

  • by Xin Luo
    £36.99

    This book mainly shows readers how to calibrate and control robots. In this regard, it proposes three control schemes: an error-summation enhanced Newton algorithm for model predictive control; RNN for solving perturbed time-varying underdetermined linear systems; and a new joint-drift-free scheme aided with projected ZNN, which can effectively improve robot control accuracy. Moreover, the book develops four advanced algorithms for robot calibration ¿ Levenberg-Marquarelt with diversified regularizations; improved covariance matrix adaptive evolution strategy; quadratic interpolated beetle antennae search algorithm; and a novel variable step-size Levenberg-Marquardt algorithm ¿ which can effectively enhance robot positioning accuracy.In addition, it is exceedingly difficult for experts in other fields to conduct robot arm calibration studies without calibration data. Thus, this book provides a publicly available dataset to assist researchers from other fields in conductingcalibration experiments and validating their ideas. The book also discusses six regularization schemes based on its robot error models, i.e., L1, L2, dropout, elastic, log, and swish. Robots¿ positioning accuracy is significantly improved after calibration. Using the control and calibration methods developed here, readers will be ready to conduct their own research and experiments.

  • by Philippe Besnard & Thomas Guyet
    £36.99

    This book is intended as an introduction to a versatile model for temporal data. It exhibits an original lattice structure on the space of chronicles and proposes new counting approach for multiple occurrences of chronicle occurrences. This book also proposes a new approach for frequent temporal pattern mining using pattern structures. This book was initiated by the work of Ch. Dousson in the 1990¿s. At that time, the prominent format was Temporal Constraint Networks for which the article by Richter, Meiri and Pearl is seminal.Chronicles do not conflict with temporal constraint networks, they are closely related. Not only do they share a similar graphical representation, they also have in common a notion of constraints in the timed succession of events. However, chronicles are definitely oriented towards fairly specific tasks in handling temporal data, by making explicit certain aspects of temporal data such as repetitions of an event. The notion of chronicle has been applied both for situation recognition and temporal sequence abstraction. The first challenge benefits from the simple but expressive formalism to specify temporal behavior to match in a temporal sequence. The second challenge aims to abstract a collection of sequences by chronicles with the objective to extract characteristic behaviors.This book targets researchers and students in computer science (from logic to data science). Engineers who would like to develop algorithms based on temporal models will also find this book useful.

  • by Showmik Bhowmik
    £36.99

    Document layout analysis (DLA) is a crucial step towards the development of an effective document image processing system. In the early days of document image processing, DLA was not considered as a complete and complex research problem, rather just a pre-processing step having some minor challenges. The main reason for that is the type of layout being considered for processing was simple. Researchers started paying attention to this complex problem as they come across a large variety of documents. This book presents a clear view of the past, present, and future of DLA, and it also discusses two recent methods developed to address the said problem.

  • by Hua Xu
    £36.99

    Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In addition to helping readers master the key technologies and concepts of human-machine dialogue intention analysis and catch up on the latest advances, it includes valuable references for further research.

  • by Kaishun Wu
    £36.99

    This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows heterogeneous devices to adopt proper transmission strategies. Second, the authors present two cross-technology interference management mechanisms in both the time domain and the frequency domain, which can mitigate interference and increase transmission opportunities for heterogeneous devices, thus improving network performance. Third, they present a cross-technology communication mechanism basedon symbol-level energy modulation, which allows heterogeneous devices to transmit information directly without a gateway, improving transmission efficiency and paving the way for new applications in IoT scenarios. Lastly, they outline several potential research directions to further improve the efficiency of cross-technology coexistence. This book is intended for researchers, computer scientists, and engineers who are interested in the research areas of wireless networking, wireless communication, mobile computing, and Internet of Things. Advanced-level students studying these topics will benefit from the book as well.

  • by Giancarlo Succi & Artem Kruglov
    £32.49

    This open access book provides information how to choose and collect the appropriate metrics for a software project in an organization. There are several kinds of metrics, based on the analysis of source code and developed for different programming paradigms such as structured programming and object-oriented programming (OOP). This way, the book follows three main objectives: (i) to identify existing and easily-collectible measures, if possible in the early phases of software development, for predicting and modeling both the traditional attributes of software systems and attributes specifically related to their efficient use of resources, and to create new metrics for such purposes; (ii) to describe ways to collect these measures during the entire lifecycle of a system, using minimally-invasive monitoring of design-time processes, and consolidate them into conceptual frameworks able to support model building by using a variety of approaches, including statistics, data mining and computational intelligence; and (iii) to present models and tools to support design time evolution of systems based on design-time measures and to empirically validate them.The book provides researchers and advanced professionals with methods for understanding the full implications of alternative choices and their relative attractiveness in terms of enhancing system resilience. It also explores the simultaneous use of multiple models that reflect different system interpretations or stakeholder perspectives.

  • by John Lawrence Nazareth
    £40.99

  • by Bernard Chen
    £40.99

    Wineinformatics is a new data science application with a focus on understanding wine through artificial intelligence. Thousands of new wine reviews are produced monthly, which benefits the understanding of wine through wine experts for winemakers and consumers. This book systematically investigates how to process human language format reviews and mine useful knowledge from a large volume of processed data.This book presents a human language processing tool named Computational Wine Wheel to process professional wine reviews and three novel Wineinformatics studies to analyze wine quality, price and reviewers. Through the lens of data science, the author demonstrates how the wine receives 90+ scores out of 100 points from Wine Spectator, how to predict a wine's specific grade and price through wine reviews and how to rank a group of wine reviewers. The book also shows the advanced application of the Computational Wine Wheel to capture more information hidden in wine reviews and the possibility of extending the wheel to coffee, tea beer, sake and liquors.This book targets computer scientists, data scientists and wine industrial researchers, who are interested in Wineinformatics. Senior data science undergraduate and graduate students may also benefit from this book.

  • by Di Wu
    £40.99

    Incomplete big data are frequently encountered in many industrial applications, such as recommender systems, the Internet of Things, intelligent transportation, cloud computing, and so on. It is of great significance to analyze them for mining rich and valuable knowledge and patterns. Latent feature analysis (LFA) is one of the most popular representation learning methods tailored for incomplete big data due to its high accuracy, computational efficiency, and ease of scalability. The crux of analyzing incomplete big data lies in addressing the uncertainty problem caused by their incomplete characteristics. However, existing LFA methods do not fully consider such uncertainty.In this book, the author introduces several robust latent feature learning methods to address such uncertainty for effectively and efficiently analyzing incomplete big data, including robust latent feature learning based on smooth L1-norm, improving robustness of latent feature learning using L1-norm, improving robustness of latent feature learning using double-space, data-characteristic-aware latent feature learning, posterior-neighborhood-regularized latent feature learning, and generalized deep latent feature learning. Readers can obtain an overview of the challenges of analyzing incomplete big data and how to employ latent feature learning to build a robust model to analyze incomplete big data. In addition, this book provides several algorithms and real application cases, which can help students, researchers, and professionals easily build their models to analyze incomplete big data.

  • by Zehua Guo
    £40.99

    Emerging machine learning techniques bring new opportunities to flexible network control and management. This book focuses on using state-of-the-art machine learning-based approaches to improve the performance of Software-Defined Networking (SDN). It will apply several innovative machine learning methods (e.g., Deep Reinforcement Learning, Multi-Agent Reinforcement Learning, and Graph Neural Network) to traffic engineering and controller load balancing in software-defined wide area networks, as well as flow scheduling, coflow scheduling, and flow migration for network function virtualization in software-defined data center networks. It helps readers reflect on several practical problems of deploying SDN and learn how to solve the problems by taking advantage of existing machine learning techniques. The book elaborates on the formulation of each problem, explains design details for each scheme, and provides solutions by running mathematical optimization processes, conducting simulated experiments, and analyzing the experimental results.

  • by Chen Ye
    £40.99

    This book addresses several knowledge discovery problems on multi-sourced data where the theories, techniques, and methods in data cleaning, data mining, and natural language processing are synthetically used. This book mainly focuses on three data models: the multi-sourced isomorphic data, the multi-sourced heterogeneous data, and the text data. On the basis of three data models, this book studies the knowledge discovery problems including truth discovery and fact discovery on multi-sourced data from four important properties: relevance, inconsistency, sparseness, and heterogeneity, which is useful for specialists as well as graduate students. Data, even describing the same object or event, can come from a variety of sources such as crowd workers and social media users. However, noisy pieces of data or information are unavoidable. Facing the daunting scale of data, it is unrealistic to expect humans to "e;label"e; or tell which data source is more reliable. Hence, it is crucial to identify trustworthy information from multiple noisy information sources, referring to the task of knowledge discovery. At present, the knowledge discovery research for multi-sourced data mainly faces two challenges. On the structural level, it is essential to consider the different characteristics of data composition and application scenarios and define the knowledge discovery problem on different occasions. On the algorithm level, the knowledge discovery task needs to consider different levels of information conflicts and design efficient algorithms to mine more valuable information using multiple clues. Existing knowledge discovery methods have defects on both the structural level and the algorithm level, making the knowledge discovery problem far from totally solved.

  • by Guoming Tang
    £40.99

    The 5G technology has been commercialized worldwide and is expected to provide superior performance with enhanced mobile broadband, ultra-low latency transmission, and massive IoT connections. Meanwhile, the edge computing paradigm gets popular to provide distributed computing and storage resources in proximity to the users. As edge services and applications prosper, 5G and edge computing will be tightly coupled and continuously promote each other forward.Embracing this trend, however, mobile users, infrastructure providers, and service providers are all faced with the energy dilemma. On the user side, battery-powered mobile devices are much constrained by battery life, whereas mobile platforms and apps nowadays are usually power-hungry. At the infrastructure and service provider side, the energy cost of edge facilities accounts for a large proportion of operating expenses and has become a huge burden.This book provides a collection of most recent attempts to tackle the energy issues in mobile edge computing from new and promising perspectives. For example, the book investigates the pervasive low-battery anxiety among modern mobile users and quantifies the anxiety degree and likely behavior concerning the battery status. Based on the quantified model, a low-power video streaming solution is developed accordingly to save mobile devices' energy and alleviate users' low-battery anxiety. In addition to energy management for mobile users, the book also looks into potential opportunities to energy cost saving and carbon emission reduction at edge facilities, particularly the 5G base stations and geo-distributed edge datacenters.

  • by Hao Wu
    £40.99

    A dynamic network is frequently encountered in various real industrial applications, such as the Internet of Things. It is composed of numerous nodes and large-scale dynamic real-time interactions among them, where each node indicates a specified entity, each directed link indicates a real-time interaction, and the strength of an interaction can be quantified as the weight of a link. As the involved nodes increase drastically, it becomes impossible to observe their full interactions at each time slot, making a resultant dynamic network High Dimensional and Incomplete (HDI). An HDI dynamic network with directed and weighted links, despite its HDI nature, contains rich knowledge regarding involved nodes¿ various behavior patterns. Therefore, it is essential to study how to build efficient and effective representation learning models for acquiring useful knowledge.In this book, we first model a dynamic network into an HDI tensor and present the basic latent factorization of tensors (LFT) model. Then, we propose four representative LFT-based network representation methods. The first method integrates the short-time bias, long-time bias and preprocessing bias to precisely represent the volatility of network data. The second method utilizes a proportion-al-integral-derivative controller to construct an adjusted instance error to achieve a higher convergence rate. The third method considers the non-negativity of fluctuating network data by constraining latent features to be non-negative and incorporating the extended linear bias. The fourth method adopts an alternating direction method of multipliers framework to build a learning model for implementing representation to dynamic networks with high preciseness and efficiency.

  • by Teik Toe Teoh
    £40.99

    Convolutional Neural Networks for Medical Applications consists of research investigated by the author, containing state-of-the-art knowledge, authored by Dr Teoh Teik Toe, in applying Convolutional Neural Networks (CNNs) to the medical imagery domain. This book will expose researchers to various applications and techniques applied with deep learning on medical images, as well as unique techniques to enhance the performance of these networks.Through the various chapters and topics covered, this book provides knowledge about the fundamentals of deep learning to a common reader while allowing a research scholar to identify some futuristic problem areas. The topics covered include brain tumor classification, pneumonia image classification, white blood cell classification, skin cancer classification and diabetic retinopathy detection. The first chapter will begin by introducing various topics used in training CNNs to help readers with common concepts covered across the book. Each chapter begins by providing information about the disease, its implications to the affected and how the use of CNNs can help to tackle issues faced in healthcare. Readers would be exposed to various performance enhancement techniques, which have been tried and tested successfully, such as specific data augmentations and image processing techniques utilized to improve the accuracy of the models.

  • by M. Avinash
    £40.99

    This book provides a concise but comprehensive guide to representation, which forms the core of Machine Learning (ML). State-of-the-art practical applications involve a number of challenges for the analysis of high-dimensional data. Unfortunately, many popular ML algorithms fail to perform, in both theory and practice, when they are confronted with the huge size of the underlying data. Solutions to this problem are aptly covered in the book.In addition, the book covers a wide range of representation techniques that are important for academics and ML practitioners alike, such as Locality Sensitive Hashing (LSH), Distance Metrics and Fractional Norms, Principal Components (PCs), Random Projections and Autoencoders. Several experimental results are provided in the book to demonstrate the discussed techniques¿ effectiveness.

  • by Robert Kudeli¿
    £40.99

  • by Shriphani Palakodety
    £49.99

    When possible, the methods discussed are evaluated on real-world social media data sets to emphasize their robustness to the noisy nature of the social media environment.On completion of the book, the reader will be well-versed with the complexity of text-mining in multilingual, low-resource environments;

  • by Tharrmashastha SAPV
    £49.99

    This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum.

  • by Chung-Chi Chen
    £23.99

    For a better understanding of the past and the current research, it also discusses the components of financial opinions one-by-one with the related works and highlights some possible research avenues, providing a research agenda with both micro- and macro-views toward financial opinions.

  • by Zhidan Liu
    £49.99

    This book introduces the concepts of mobility data and data-driven urban traffic monitoring. A typical framework of mobility data-based urban traffic monitoring is also presented, and it describes the processes of mobility data collection, data processing, traffic modelling, and some practical issues of applying the models for urban traffic monitoring.This book presents three novel mobility data-driven urban traffic monitoring approaches. First, to attack the challenge of mobility data sparsity, the authors propose a compressive sensing-based urban traffic monitoring approach. This solution mines the traffic correlation at the road network scale and exploits the compressive sensing theory to recover traffic conditions of the whole road network from sparse traffic samplings. Second, the authors have compared the traffic estimation performances between linear and nonlinear traffic correlation models and proposed a dynamical non-linear traffic correlation modelling-basedurban traffic monitoring approach. To address the challenge of involved huge computation overheads, the approach adapts the traffic modelling and estimations tasks to Apache Spark, a popular parallel computing framework. Third, in addition to mobility data collected by the public transit systems, the authors present a crowdsensing-based urban traffic monitoring approach. The proposal exploits the lightweight mobility data collected from participatory bus riders to recover traffic statuses through careful data processing and analysis. Last but not the least, the book points out some future research directions, which can further improve the accuracy and efficiency of mobility data-driven urban traffic monitoring at large scale.This book targets researchers, computer scientists, and engineers, who are interested in the research areas of intelligent transportation systems (ITS), urban computing, big data analytic, and Internet of Things (IoT). Advanced level students studying these topics benefit from this book as well.

  • by Oge Marques
    £40.99

    This book presents the fundamentals of mobile visual computing in iOS development and provides directions for developers and researchers interested in developing iOS applications with image processing and computer vision capabilities.

  • by Daniil Ryabko
    £40.99

    The author considers the problem of sequential probability forecasting in the most general setting, where the observed data may exhibit an arbitrary form of stochastic dependence.

  • by Tingting Yang
    £40.99

    This book shares valuable insights into high-efficiency data transmission scheduling and into a group intelligent search and rescue approach for artificial intelligence (AI)-powered maritime networks.

  • by Hessam S. Sarjoughian & Bernard Phillip Zeigler
    £50.99

    Systems of systems are at the root of this century's global economic, climate, and energy challenges. This volume provides an approach that integrates both energy and information processing requirements into system design.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.