Your basket contains: 0 item(s) Total: 0.00
The Handbook of Document Image Processing and Recognition is a comprehensive resource on the latest methods and techniques in document image processing and recognition. Each chapter provides a clear overview of the topic followed by the state of the art of techniques used - including elements of comparison between them - along with supporting references to archival publications, for those interested in delving deeper into topics addressed. Rather than favor a particular approach, the text enables the reader to make an informed decision for their specific problems.
Available for E-Reader (Sony, Bookeen, Iriver, etc.)
Available for Smartphones (Iphone, Samsun, HTC, etc.)
Available for Tablets (Ipad, Android, etc.)
Available for PC / MAC
Social media and social networks seem to be conquering human relationships. Corporations are increasingly expecting business benefits from such platforms for employee-to-employee networking and internal collaboration. But firstly, social software platforms have to be introduced into an organization successfully, which often requires strategic and cultural changes before the new technology effectively supports everyday work tasks and corporate procedures. Companies will thus be looking for ways to promote usage of the new platforms and influence employee behavior accordingly.After a review of selected relevant scientific theory and practical examples for social software analysis, this thesis analyzes employee contributions to a corporate microblogging platform in order to find a metric for organizationally desired behaviors. The nature of microblogging - short text messages that propagate across a network by means of very basic mechanisms, like subscription, repeats or responses - seems very well suited for such an analysis. Two metrics, describing an employees' influence across the network and the utility of their contributions as recognized by peers, were combined in a single numerical score. Such scoring could be used as a factor within an employee incentive system intended to reward extraordinarily active or useful contributors.
Constraint Handling Rules (CHR) is both a theoretical formalism and a practical programming language. This book provides an overview of the state of the art of CHR research based on a reviewed selection of recent doctoral theses.After a basic introduction to CHR, the book presents results from three different areas of CHR research: compilation and optimization, execution strategies, and program analysis.The book is ideal for Master students, lecturers, and researchers, to get an overview of the state of the art of CHR research. The chapters offer in-depth treatises of selected subjects, supported by a wealth of examples.
The process of doing an academic work, whether a mini-project, diploma thesis, master's thesis or PhD thesis, requires systematic knowledge and skills in order to answer the following questions: "How do I find a topic?", "How do I obtain funding money?", "How do I write a project proposal?", "How is the organisatoric workflow?", "How do I search Literature systematically?", "Why should I read patents?", "How can I organize my references?", "Why English as a working language?", "What is the formal structure of a thesis like?", "What is the classical hypothetic-deductive research process?", "Which research methods could I use?", "How will my posters, my presentations and my written work be graded?", "How do I contribute to a conference?", "How do I contribute to an archival Journal?". These questions are discussed on the basis of the subjects Engineering (Computer Science/Informatics) and Natural Sciences (Psychology) and Business (Software Engineering/Business), which can be bridged by the subject "Human-Computer Interaction and Usability Engineering (HCI&UE). Since science is trans-cultural, inter-subjective and reproductive; these fundamentals can be further applied to almost any subject.Die Durchführung einer akademischen Arbeit, ob Mini-Projekt, Diplomarbeit, Masterarbeit oder Doktorarbeit erfordert systematische Kenntnisse und Fertigkeiten um folgende Fragen zu beantworten: "Wie finde ich ein Thema?", "Wie komme ich zu Förderungen?", "Wie verfasse ich einen Projektantrag?", "Wie läuft eine Arbeit organisatorisch ab?", "Wie führe ich eine systematische Literatursuche durch?", "Warum sollte ich Patente lesen?", Wie kann ich meine Literatur verwalten?", "Warum Englisch als Arbeitssprache?", "Wie ist der formale Aufbau einer Arbeit?", "Wie läuft der klassische Forschungsprozess ab?", "Welche Forschungsmethoden gibt es?", "Wie werden meine Poster, Vorträge und schriftlichen Arbeiten beurteilt?", "Wie verfasse ich einen Konferenzbeitrag?", "Wie verfasse ich einen Beitrag zu einer wissenschaftlichen Zeitschrift?". Diese Fragen werden exemplarisch an Hand von Ingenieurswissenschaften (Informatik) und Naturwissenschaften (Psychologie) und Wirtschaft (Software Engineering/Business) besprochen, deren Brücke das Fach "Human-Computer Interaction und Usability Engineering" darstellt. Da Wissenschaft transkulturell, intersubjektiv und reproduzierbar sein soll, lassen sich die Prinzipien aber auch auf andere Gebiete übertragen.
Skyline evaluation techniques (also known as Pareto preference queries) follow a common paradigm that eliminates data elements by finding other elements in the data set that dominate them. To date already a variety of sophisticated Skyline evaluation techniques are known, hence Skylines are considered a well researched area. This book presents Semi-Skylines as a novel concept for several challenging Skyline evaluation and optimization techniques. Among other things Semi-Skylines can be used effectively for algebraic optimization of constrained Skyline queries. Moreover, the problem of Skyline queries with very large result sets is considered. Using the concept of Skyline Snippets a subset of the complete Skyline can be computed without any pre-computed index structure.
Good backup and recovery strategies are key to the health of any organization. Medium- to very-large-scale systems administrators have to protect large amounts of critical data as well as design backup solutions that are scalable and optimized to meet changing conditions. Pro Data Backup and Recovery will cover some of the more common backup applications, such as Symantec NetBackup/BackupExec, EMC NetWorker, and CommVault, but the main discussion will focus on the implementation of 21st century architectures that allow the backup software to be a commodity item. The underlying architecture provides the framework for meeting the requirements of data protection for the organization. This book covers new developments in data protection as well as the impact of single-instance storage upon backup infrastructures. It discusses the impact of backup and data replication, the often misapplied B2D and D2D strategies, and tapeless backup environments. Continuous data protection and remote replication strategies are also addressed as they are integrated within backup strategiesa very important topic today.
Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse. In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.