Line Integral Methods for Conservative Problems explains the numerical solution of differential equations within the framework of geometric integration, a branch of numerical analysis that devises numerical methods able to reproduce (in the discrete solution) relevant geometric properties of the continuous vector field.
Build artificial intelligence (AI) powered voice and text conversational interfaces with AmazonKey FeaturesDevelop Alexa Skills to create a working voice user interface (VUI)Integrate Amazon Lex chatbots into Facebook, Slack, and text messagesLearn to use AWS Lambda, Alexa Skills Kit, and Amazon LexBook DescriptionHave you ever wondered how Alexa apps are made, how voice-enabled technologies work, or how chatbots function?
This book constitutes the refereed proceedings of the Third International Conference on Computing, Communication and Learning, CoCoLe 2024, held in Warangal, India, in September 2024.
Presenting a complementary perspective to standard books on algorithms, A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis provides a roadmap for readers to determine the difficulty of an algorithmic problem by finding an optimal solution or proving complexity results.
This two-volume set on Mathematical Principles of the Internet provides a comprehensive overview of the mathematical principles of Internet engineering.
The multi-volume set LNAI 14169 until 14175 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, in September 2023.
Enterprise Information Systems (EIS) integrate and support business processes across functional boundaries in a supply chain environment, and have become increasingly popular over the last 15 years.
The 13th International Conference on Human-Computer Interaction, HCI Inter- tional 2009, was held in San Diego, California, USA, July 19-24, 2009, jointly with the Symposium on Human Interface (Japan) 2009, the 8th International Conference on Engineering Psychology and Cognitive Ergonomics, the 5th International Conference on Universal Access in Human-Computer Interaction, the Third International Conf- ence on Virtual and Mixed Reality, the Third International Conference on Internati- alization, Design and Global Development, the Third International Conference on Online Communities and Social Computing, the 5th International Conference on Augmented Cognition, the Second International Conference on Digital Human Mod- ing, and the First International Conference on Human Centered Design.
ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe.
Internet of Things: Challenges, Advances, and Applications provides a comprehensive introduction to IoT, related technologies, and common issues in the adoption of IoT on a large scale.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
Whilst Information Systems has the potential to widen our view of the world, it often has the opposite effect by limiting our ability to interact, facilitating managerial and state surveillance or instituting strict hierarchies and personal control.
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022.
'Child Soldiers and the Lubanga Case' and 'The Tallinn Manual on the International Law Applicable to Cyber Warfare' are the two central themes of this volume.
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation.
This book provides an in-depth exposition of spin-stand microscopy of hard disk data which is a new technique recently developed and extensively tested by the authors of the book.
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises.
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2016.
Design Games for Architecture teaches you how to create playful software tools based on your architectural design processes, whether or not you are familiar with game design technology.
Organized on 13th-15th December 2023, The 14th Annual International Research Conference of the Symbiosis Institute of Management Studies, (SIMSARC 2023) is based on the theme "e;Securing the Future through Sustainability, Health, Education and Technology"e;.