We a good story
Quick delivery in the UK

Books in the SpringerBriefs in Computer Science series

Filter
Filter
Sort bySort Series order
  • - Related Technologies, Challenges and Future Prospects
    by Min Chen, Shiwen Mao, Yin Zhang & et al.
    £58.49

    This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.

  • - Principles, Challenges, and a Survey of Solutions
    by Arthur Francisco Lorenzon
    £38.49

  • - Principles and Applications
    by Zhi Jin & Lili Mou
    £53.49

    This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.

  • by Arindam Chaudhuri
    £38.49

    This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.

  • by Yi Li
    £38.49

    This book presents a comprehensive review of heterogeneous face analysis and synthesis, ranging from the theoretical and technical foundations to various hot and emerging applications, such as cosmetic transfer, cross-spectral hallucination and face rotation.

  • - from DNA to Artificial Intelligence
    by Mario Alemi
    £16.99

    This Open Access book will explore questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and ΓÇônowΓÇô connected human societies? Physicists have good models for describing the evolution of the universe since the Big Bang, but can we apply the same concepts to the evolution of aggregated matter ΓÇôliving matter included? The Amazing Journey analyzes the latest results in chemistry, biology, neuroscience, anthropology and sociology under the light of the evolution of intelligence, seen as the ability of processing information. The main strength of this book is using just two concepts used in physics ΓÇôinformation and energyΓÇô to explain: The emergence and evolution of life: procaryotes, eukaryotes and complex organismsThe emergence and evolution of the brainThe emergence and evolution of societies (human and not)Possible evolution of our "internet society" and the role that Artificial Intelligence is playing

  • by Akka Zemmari
    £46.49

    This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine learning.

  • - A Brief Introduction
    by Jie Hu & Kun Yang
    £47.99

    It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band.

  • - Improving Communication and Memory Accesses
    by Eduardo H. M. Cruz, Matthias Diener & Philippe O. A. Navaux
    £47.99

    This book presents a study on how thread and data mapping techniques can be used to improve the performance of multi-core architectures.It describes how the memory hierarchy introduces non-uniform memory access, and how mapping can be used to reduce the memory access latency in current hardware architectures.On the software side, this book describes the characteristics present in parallel applications that are used by mapping techniques to improve memory access.Several state-of-the-art methods are analyzed, and the benefits and drawbacks of each one are identified.

  • by Michael R. Lyu, Irwin King & Shenglin Zhao
    £47.99

    This book systematically introduces Point-of-interest (POI) recommendations in Location-based Social Networks (LBSNs). Lastly, the book discusses future research directions in this area. This book is intended for professionals involved in POI recommendation and graduate students working on problems related to location-based services.

  • by Hassan Ugail
    £38.49

    By way of applications, they discuss how genuine and non-genuine smiles can be inferred, how gender is encoded in a smile and how it is possible to use the dynamics of a smile itself as a biometric feature.It is often said that the face is a window to the soul.

  • by Xin Wei
    £38.49

    This SpringerBrief discusses the most recent research in the field of multimedia QoE evaluation, with a focus on how to evaluate subjective multimedia QoE problems from objective techniques.

  •  
    £38.49

    This book provides the readers with retrospective and prospective views with detailed explanations of component technologies, speech recognition, language translation and speech synthesis.Speech-to-speech translation system (S2S) enables to break language barriers, i.e., communicate each other between any pair of person on the glove, which is one of extreme dreams of humankind.People, society, and economy connected by S2S will demonstrate explosive growth without exception.In 1986, Japan initiated basic research of S2S, then the idea spread world-wide and were explored deeply by researchers during three decades.Now, we see S2S application on smartphone/tablet around the world.Computational resources such as processors, memories, wireless communication accelerate this computation-intensive systems and accumulation of digital data of speech and language encourage recent approaches based on machine learning.Through field experiments after long research in laboratories, S2S systems are being well-developed and now ready to utilized in daily life.Unique chapter of this book is end-2-end evaluation by comparing system's performance and human competence. The effectiveness of the system would be understood by the score of this evaluation.The book will end with one of the next focus of S2S will be technology of simultaneous interpretation for lecture, broadcast news and so on.

  • - A Concise and Practical Introduction
    by Joakim Kavrestad
    £53.49

  • by Tingting Yang
    £38.49

    This book shares valuable insights into high-efficiency data transmission scheduling and into a group intelligent search and rescue approach for artificial intelligence (AI)-powered maritime networks.

  • - Sensing, Communication and Computation
    by Deze Zeng
    £38.49

    This book introduces the software defined system concept, architecture, and its enabling technologies such as software defined sensor networks (SDSN), software defined radio, cloud/fog radio access networks (C/F-RAN), software defined networking (SDN), network function virtualization (NFV), software defined storage, virtualization and docker.

  • - with an Illustration from the Railway Safety Domain
    by Stefan Gruner
    £38.49

    This book focuses on the clarification of what actually a handbook is, the systematic identification of what ought to be considered as ¿settled knowledge¿ (extracted from historic repositories) for inclusion into such a handbook, and the ¿assembly¿ of such identified knowledge into a form which is fit for the purpose and conforms to the formal characteristics of handbooks as a ¿literary genre¿. For many newly emerging domains or disciplines, for which no handbook with normative authority has yet been defined, the question arises of how to do this systematically and in a non-arbitrary manner. This book is the first to reflect upon the question of how to construct a desktop handbook. It is demonstrated how concept analysis can be used for identifying settled knowledge as the key ingredient by utilizing the assembled data for classification; a presentation scheme for handbook articles is developed and demonstrated to be suitable. The sketched approachis then illustrated by an example from the railway safety domain. Finally, the limitations of the presented methods are discussed. The key contribution of this book is the (example illustrated) construction method itself, not the handbook, which would result from a highly detailed and thoroughly comprehensive application of the method.

  • - A Semantics and Context-Aware Approach
    by Heng Yin & Mu Zhang
    £47.99

    It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions.

  • by Hessam S. Sarjoughian & Bernard Phillip Zeigler
    £47.99

    Systems of systems are at the root of this century's global economic, climate, and energy challenges. This volume provides an approach that integrates both energy and information processing requirements into system design.

  • by Greg O'Toole
    £38.99

    This book is about the process of creating web-based systems (i.e., websites, content, etc.) that consider each of the parts, the modules, the organisms - binary or otherwise - that make up a balanced, sustainable web ecosystem.

  • - Comparative Analysis, Attacks, and Countermeasures
    by Keijo Haataja, Sanna Pasanen, Pekka Toivanen & et al.
    £58.49

    They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions.

  • by Wei Song
    £38.49

    The next-generation of wireless communications are envisioned to be supported by heterogeneous networks by using various wireless access technologies.

  • by Marcio Moretto Ribeiro
    £17.49

    however, classical belief revision is not well suited for logics such as Description Logics.Belief Revision in Non-Classical Logics presents a framework which can be applied to a wide class of logics that include - besides most Description Logics such as the ones behind OWL - Horn Logic and Intuitionistic logic, amongst others.

  • - A Comprehensive Survey of Vulnerabilities and Academic Research
    by Angelos D. Keromytis
    £47.99

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases.

  • - Tutorials on Theory and Problems
    by Ovidiu Bagdasar
    £46.49

    Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree.

  • by John F. Dooley
    £47.99

    For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.

  • - Complex Motion Pattern Queries
    by Marcos R. Vieira & Vassilis J. Tsotras
    £47.99

    This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.