We a good story
Quick delivery in the UK

Books in the SpringerBriefs in Computer Science series

Filter
Filter
Sort bySort Series order
  • - Methods for Controllability and Observability Analysis, and Optimal Sensor Placement
    by Daniel Leitold
    £40.99

    This book explores the key idea that the dynamical properties of complex systems can be determined by effectively calculating specific structural features using network science-based analysis.

  •  
    £40.99

    This book provides the readers with retrospective and prospective views with detailed explanations of component technologies, speech recognition, language translation and speech synthesis.Speech-to-speech translation system (S2S) enables to break language barriers, i.e., communicate each other between any pair of person on the glove, which is one of extreme dreams of humankind.People, society, and economy connected by S2S will demonstrate explosive growth without exception.In 1986, Japan initiated basic research of S2S, then the idea spread world-wide and were explored deeply by researchers during three decades.Now, we see S2S application on smartphone/tablet around the world.Computational resources such as processors, memories, wireless communication accelerate this computation-intensive systems and accumulation of digital data of speech and language encourage recent approaches based on machine learning.Through field experiments after long research in laboratories, S2S systems are being well-developed and now ready to utilized in daily life.Unique chapter of this book is end-2-end evaluation by comparing system's performance and human competence. The effectiveness of the system would be understood by the score of this evaluation.The book will end with one of the next focus of S2S will be technology of simultaneous interpretation for lecture, broadcast news and so on.

  • - Principles, Challenges, and a Survey of Solutions
    by Arthur Francisco Lorenzon
    £40.99

  • - A Comprehensive Guide to the Data Ecosystem: How to Build a Successful Data Science Career, Program, or Unit
    by Renata Rawlings-Goss
    £49.99

    This book is an information packed overview of how to structure a data science career, a data science degree program, and how to hire a data science team, including resources and insights from the authors experience with national and international large-scale data projects as well as industry, academic and government partnerships, education, and workforce. Outlined here are tips and insights into navigating the data ecosystem as it currently stands, including career skills, current training programs, as well as practical hiring help and resources. Also, threaded through the book is the outline of a data ecosystem, as it could ultimately emerge, and how career seekers, training programs, and hiring managers can steer their careers, degree programs, and organizations to align with the broader future of data science. Instead of riding the current wave, the author ultimately seeks to help professionals, programs, and organizations alike prepare a sustainable plan for growth in this ever-changing world of data. The book is divided into three sections, the first "Building Data Careers", is from the perspective of a potential career seeker interested in a career in data, the second "Building Data Programs" is from the perspective of a newly forming data science degree or training program, and the third "Building Data Talent and Workforce" is from the perspective of a Data and Analytics Hiring Manager. Each is a detailed introduction to the topic with practical steps and professional recommendations. The reason for presenting the book from different points of view is that, in the fast-paced data landscape, it is helpful to each group to more thoroughly understand the desires and challenges of the other. It will, for example, help the career seekers to understand best practices for hiring managers to better position themselves for jobs. It will be invaluable for data training programs to gain the perspective of career seekers, who they want to help and attract as students. Also, hiring managers will not only need data talent to hire, but workforce pipelines that can only come from partnerships with universities, data training programs, and educational experts. The interplay gives a broader perspective from which to build.

  • by Xin Wei
    £40.99

    This SpringerBrief discusses the most recent research in the field of multimedia QoE evaluation, with a focus on how to evaluate subjective multimedia QoE problems from objective techniques.

  • by Yi Li
    £40.99

    This book presents a comprehensive review of heterogeneous face analysis and synthesis, ranging from the theoretical and technical foundations to various hot and emerging applications, such as cosmetic transfer, cross-spectral hallucination and face rotation.

  • by Arindam Chaudhuri
    £40.99

    This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Considering the need to leverage large-scale social multimedia content for sentiment analysis, both state-of-the-art visual and textual sentiment analysis techniques are used for joint visual-textual sentiment analysis.

  • by Santosh Singh Rathore
    £40.99

    This book addresses software faults-a critical issue that not only reduces the quality of software, but also increases their development costs.

  • by Daniil Ryabko
    £40.99

    The considered problems include homogeneity testing (the so-called two sample problem), clustering with respect to distribution, clustering with respect to independence, change point estimation, identity testing, and the general problem of composite hypotheses testing.

  • by Alvin Penner
    £40.99

    This Brief investigates the intersections that occur between three different areas of study that normally would not touch each other: ODF, spline theory, and topology.The Least Squares Orthogonal Distance Fitting (ODF) method has become the standard technique used to develop mathematical models of the physical shapes of objects, due to the fact that it produces a fitted result that is invariant with respect to the size and orientation of the object. It is normally used to produce a single optimum fit to a specific object; this work focuses instead on the issue of whether the fit responds continuously as the shape of the object changes. The theory of splines develops user-friendly ways of manipulating six different splines to fit the shape of a simple family of epiTrochoid curves: two types of Bézier curve, two uniform B-splines, and two Beta-splines. This work will focus on issues that arise when mathematically optimizing the fit. There are typically multiple solutions to the ODF method, and the number of solutions can often change as the object changes shape, so two topological questions immediately arise: are there rules that can be applied concerning the relative number of local minima and saddle points, and are there different mechanisms available by which solutions can either merge and disappear, or cross over each other and interchange roles. The author proposes some simple rules which can be used to determine if a given set of solutions is internally consistent in the sense that it has the appropriate number of each type of solution.

  • by Hassan Ugail
    £40.99

    By way of applications, they discuss how genuine and non-genuine smiles can be inferred, how gender is encoded in a smile and how it is possible to use the dynamics of a smile itself as a biometric feature.It is often said that the face is a window to the soul.

  • - Push-Based Data in Research & Practice
    by Wolfram Wingerath
    £45.49

    Second, the high-level classification scheme illustrated above provides a gentle introduction into the system space of data management: Abstracting from the extreme system diversity in this field, it helps readers build a mental model of the available options.

  • - Principles and Applications
    by Zhi Jin & Lili Mou
    £56.49

    This book proposes a novel neural architecture, tree-based convolutional neural networks (TBCNNs),for processing tree-structured data.

  • by Michael R. Lyu, Irwin King & Shenglin Zhao
    £50.99

    This book systematically introduces Point-of-interest (POI) recommendations in Location-based Social Networks (LBSNs). Lastly, the book discusses future research directions in this area. This book is intended for professionals involved in POI recommendation and graduate students working on problems related to location-based services.

  • - Improving Communication and Memory Accesses
    by Eduardo H. M. Cruz, Matthias Diener & Philippe O. A. Navaux
    £50.99

    This book presents a study on how thread and data mapping techniques can be used to improve the performance of multi-core architectures.It describes how the memory hierarchy introduces non-uniform memory access, and how mapping can be used to reduce the memory access latency in current hardware architectures.On the software side, this book describes the characteristics present in parallel applications that are used by mapping techniques to improve memory access.Several state-of-the-art methods are analyzed, and the benefits and drawbacks of each one are identified.

  • - A Brief Introduction
    by Jie Hu & Kun Yang
    £50.99

    It firstly provides an overview of data and energy integrated communication networks (DEINs) and introduces the key techniques for enabling integrated wireless energy transfer (WET) and wireless information transfer (WIT) in the radio frequency (RF) band.

  • by John Davis, Stefan Pappe, Kristof Kloeckner, et al.
    £56.49

    As more and more industries are experiencing digital disruption, using information technology to enable a competitive advantage becomes a critical success factor for all enterprises. This book covers the authors' insights on how AI technologies can fundamentally reshape the IT services delivery lifecycle to deliver better business outcomes through a data-driven and knowledge-based approach. Three main challenges and the technologies to address them are discussed in detail:· Gaining actionable insight from operational data for service management automation and improved human decision making· Capturing and enhancing expert knowledge throughout the lifecycle from solution design to ongoing service improvement · Enabling self-service for service requests and problem resolution, through intuitive natural language interfacesThe authors are top researchers and practitioners with deep experience in the fields of artificial intelligence and IT service management and are discussing both practical advice for IT teams and advanced research results. The topics appeal to CIOs and CTOs as well as researchers who want to understand the state of the art of applying artificial intelligence to a very complex problem space. Although the book is concise, it comprehensively discuss topics like gaining insight from operational data for automatic problem diagnosis and resolution as well as continuous service optimization, AI for solution design and conversational self-service systems.

  • - A Concise and Practical Introduction
    by Joakim Kavrestad
    £56.49

  • by Dizhi Zhou & Wei Song
    £50.99

    This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network.

  • by Rae Earnshaw
    £45.49

    This book examines how digital technology is being used to assist the artists and designers. Augmented and virtual reality techniques can be used to preview designs before they are finalized and implemented. Art and design have shaped the values, social structures, communications, and the culture of communities and civilisations.

  • - A Semantics and Context-Aware Approach
    by Heng Yin & Mu Zhang
    £50.99

    It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions.

  • - Theory, Algorithms, and Applications of Mesh Based and Meshless Methods
    by Roman Trobec & Gregor Kosec
    £50.99

    This book is concentrated on the synergy between computer science and numerical analysis. It is written to provide a firm understanding of the described approaches to computer scientists, engineers or other experts who have to solve real problems.

  • by Krystina Madej
    £56.49

    dsfsdfsf

  • - Related Technologies, Challenges and Future Prospects
    by Min Chen, Shiwen Mao, Yin Zhang & et al.
    £61.49

    This Springer Brief provides a comprehensive overview of the background and recent developments of big data. The value chain of big data is divided into four phases: data generation, data acquisition, data storage and data analysis.

  • by John F. Dooley
    £50.99

    For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.

  • - Comparative Analysis, Attacks, and Countermeasures
    by Keijo Haataja, Sanna Pasanen, Pekka Toivanen & et al.
    £61.49

    They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions.

  • - Complex Motion Pattern Queries
    by Marcos R. Vieira & Vassilis J. Tsotras
    £50.99

    This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects.

  • - Tutorials on Theory and Problems
    by Ovidiu Bagdasar
    £49.99

    Adapted from a modular undergraduate course on computational mathematics, Concise Computer Mathematics delivers an easily accessible, self-contained introduction to the basic notions of mathematics necessary for a computer science degree.

  • - A Comprehensive Survey of Vulnerabilities and Academic Research
    by Angelos D. Keromytis
    £50.99

    Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.