Title search results
Showing 27201 - 27220 of 64295 items
Semantic Systems. In the Era of Knowledge Graphs: 16th International Conference on Semantic Systems, SEMANTiCS 2020, Amsterdam, The Netherlands, September 7–10, 2020, Proceedings (Lecture Notes in Computer Science #12378)
By Paul Groth, Tassilo Pellegrini, Peter Kieseberg, Eva Blomqvist, Mehwish Alam, Sabrina Kirrane, Victor De Boer, Tobias Käfer, Albert Meroño-Peñuela, Harshvardhan J. Pandit. 2020
This open access book constitutes the refereed proceedings of the 16th International Conference on Semantic Systems, SEMANTiCS 2020, held in…
Amsterdam, The Netherlands, in September 2020. The conference was held virtually due to the COVID-19 pandemic.This book constitutes the refereed proceedings of the 22nd International Conference on Knowledge Engineering and Knowledge Management, EKAW 2020, held…
in Bolzano, Italy, in September 2020. The 12 full papers presented together with 7 were carefully reviewed and selected from 104 submissions. The special theme of EKAW 2020 is „Ethical and Trustworthy Knowledge Engineering". The papers cover all aspects of eliciting, acquiring, discovering, modeling, and managing knowledge and construction of knowledge-intensive systems.SQL Server 2019 AlwaysOn: Supporting 24x7 Applications with Continuous Uptime
By Peter A. Carter. 2020
Get a fast start to using AlwaysOn, the SQL Server solution to high-availability and disaster recovery. This third edition is…
newly-updated to cover the 2019 editions of both SQL Server and Windows Server and includes strong coverage of implementing AlwaysOn Availability Groups on both Windows and Linux operating systems. The book provides a solid and accurate understanding of how to implement systems requiring consistent and continuous uptime, as well as how to troubleshoot those systems in order to keep them running and reliable. This edition is updated to account for all new major functionality and also includes coverage of implementing atypical configurations, such as clusterless and domain-independent Availability Groups, distributed Availability Groups, and implementing Availability Groups on Azure.The book begins with an introduction to high-availability and disaster recovery concepts such as Recovery Point Objectives (RPOs), Recovery Time Objectives (RTOs), availability levels, and the cost of downtime. You’ll then move into detailed coverage of implementing and configuring the AlwaysOn feature set in order to meet the business objectives set by your organization. Content includes coverage on implementing clusters, building AlwaysOn failover clustered instances, and configuring AlwaysOn Availability Groups.SQL Server 2019 AlwaysOn is chock full of real-world advice on how to build and configure the most appropriate topology to meet the high-availability and disaster recovery requirements you are faced with, as well as how to use AlwaysOn Availability Groups to scale-out read-only workloads. This is a practical and hands-on book to get you started quickly in using one of the most talked-about SQL Server feature sets. What You Will Learn Understand high availability and disaster recovery in SQL Server 2019Build and configure a Windows Cluster in Windows Server 2019Create and configure an AlwaysOn failover clustered instanceImplement AlwaysOn Availability Groups and appropriately configure themImplement AlwaysOn Availability Groups on Linux serversConfigure Availability Groups on Azure IaaSAdminister AlwaysOn technologies post implementationUnderstand typical configurations, such as clusterless and distributed Availability Groups Who This Book Is For For Microsoft SQL Server database administrators who interested in growing their knowledge and skills in SQL Server’s high-availability and disaster recovery feature set.Risky Expertise in Chinese Financialisation: Returned Labour and the State-Finance Nexus
By Giulia Dal Maso. 2020
This book focuses on the subjectivities of stock market investors to explore tensions within the Chinese state’s engagement in contemporary…
financial capitalism. It adopts a genealogical method to investigate how the production of foreign-trained financial experts (haigui) and informal experts (sanhu) points to paradoxes in China’s efforts to cultivate financial expertise. Chinese financialisation relates to the state’s project of financialising human capital in reaction to a contractualised labour market and the vanishing welfare state. Through ethnographic inquiry, Dal Maso shows the Chinese stock markets are crucial to the new redistributive regime where wage labour risks losing its primacy. Here, one can observe how the relationship between money and wages in China is being reworked and witness the development of a new economic order in which the state’s legitimacy becomes increasingly dependent on its capacity to jiushi–to rescue the market in times of crisis.Practical Git: Confident Git Through Practice
By Johan Abildskov. 2020
Practice your Git skills using exercises in your own environment. This book introduces concepts in an abstract visual way, and then…
enforces this learning through exercises - the Git katas. You will start with basic interactions such as commits and branches, and move on to both internals and collaborative workflows. Best practices are introduced and rehearsed throughout with hands-on exercises. Each topic is supplemented with interactive Git exercises that can be solved using any Git client – either the ubiquituous CLI or one of the many graphical clients so you'll learn in the environment you work in. The importance of Git is hard to overstate – it is used by 90% of software engineers worldwide and is the de facto standard for version control. Honing your Git skills is guaranteed to make you a better and more efficient developer. Building software can be stressful, but it doesn’t need to be. Practical Git will give you the Git skills you need, and help keep your Git skills sharp. Add it to your library today. What You'll LearnUse Git through scripted exercises and the Git katas Understand Git’s graph modelTroubleshoot common and rare scenarios you may faceSelect and apply the right Git tool for the taskMaintain and collaborate on Git repositoriesTweak Git to gain the most from this powerful tool Who This Book Is For Anyone who is currently using Git in a copy-paste fashion. It will take you from using Git to knowing Git.Digital Conversion on the Way to Industry 4.0: Selected Papers from ISPR2020, September 24-26, 2020 Online - Turkey (Lecture Notes in Mechanical Engineering)
By Numan M. Durakbasa, M. Güneş Gençyılmaz. 2021
This book presents the proceedings from the International Symposium for Production Research 2020. The cross-disciplinary papers presented draw on research from academics…
and practitioners from industrial engineering, management engineering, operational research, and production/operational management. It explores topics including: · computer-aided manufacturing; Industry 4.0 applications; simulation and modeling big data and analytics; flexible manufacturing systems; decision analysis quality management industrial robotics in production systems information technologies in production management; and optimization techniques. Presenting real-life applications, case studies, and mathematical models, this book is of interest to researchers, academics, and practitioners in the field of production and operation engineering.Data-Driven Security
By Jay Jacobs, Bob Rudis. 1854
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase…
their visibility in order to prevent security breaches and attacks This careful guide explores two of the most powerful data analysis and visualization You ll soon understand how to harness and wield data from collection and storage to management and analysis as well as visualization and presentation Using a hands-on approach with real-world examples this book shows you how to gather feedback measure the effectiveness of your security methods and make better decisions Everything in this book will have practical application for information security professionals Helps IT and security professionals understand and use data so they can thwart attacks and understand and visualize vulnerabilities in their networks Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks Covers topics such as how to acquire and prepare security data use simple statistical methods to detect malware predict rogue behavior correlate security events and more Written by a team of well-known experts in the field of security and data analysis Lock down your networks prevent hacks and thwart malware by improving visibility into the environment all through the power of data and Security Using Data Analysis Visualization and DashboardsAutomatische Identifikation für Industrie 4.0
By Heinrich Hippenmeyer, Thomas Moosmann. 2016
Die Autoren gehen in diesem Buch darauf ein welche Herausforderungen mit Industrie 4 0 auf Industriepraktiker…
zukommen Wie und mit welchen Zielsetzungen k nnen Entwicklungen in mittelst ndischen Unternehmen aufgegriffen werden Die Ger te zur automatischen Identifikation als Teil der Prozesssteuerung und Systemplanung der Intralogistik zur Einbindung in das Netzwerk im Unternehmen und mit Partnern sind Kumulationspunkte vieler Probleme in kleinen und mittelst ndischen Unternehmen Diesen wird dargelegt wo und wie in den automatisierten Unternehmensbereichen Schritte zur digitalen Fabrik bereits vollzogen wurden und wie die Einbindung der betrieblichen Intralogistik in das firmenweite Netzwerk und damit in das ERP-System erfolgen kannProceedings of the Fifth International Conference on Mathematics and Computing: ICMC 2019 (Advances in Intelligent Systems and Computing #1170)
By S. Ponnusamy, Debasis Giri, Anthony T. S. Ho, Nai-Wei Lo. 2021
This book features selected papers from the 5th International Conference on Mathematics and Computing (ICMC 2019), organized by the School…
of Computer Engineering, Kalinga Institute of Industrial Technology Bhubaneswar, India, on February 6 – 9, 2019. Covering recent advances in the field of mathematics, statistics and scientific computing, the book presents innovative work by leading academics, researchers and experts from industry.Carry On
By Bruce Schneier. 2003
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every…
security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike. Bruce Schneier's worldwide reputation as a security guru has earned him more than 250,000 loyal blog and newsletter readers This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacks It features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more Previous Schneier books have sold over 500,000 copies Carry On: Sound Advice from Schneier on Security is packed with information and ideas that are of interest to anyone living in today's insecure world.In diesem Buch werden in kompakter Form mithilfe zahlreicher Beispiele die #65533;blichen Modelle und Methoden der angewandten Wahrscheinlichkeitstheorie und Statistik…
dargestellt. Es ist daher insbesondere f#65533;r angehende Wirtschaftswissenschaftler, Ingenieure und Informatiker geeignet, welchen auch das didaktische Konzept des Buchs entgegenkommt: Verst#65533;ndnisfragen und Aufgaben in Form von ,,Meilensteinen" erleichtern das eigenst#65533;ndige #65533;berpr#65533;fen des Lernfortschritts. Ein ausf#65533;hrlicher mathematischer Anhang ,,Mathematik kompakt" stellt die wichtigsten Ergebnisse aus Analysis und linearer Algebra zum effizienten Nachschlagen zur Verf#65533;gung. Ein Glossar mit den wichtigsten englischen Begriffen sowie Tabellen der statistischen Testverteilungen runden die Darstellung ab.This book constitutes the revised selected papers from the 10th International Workshop on Enterprise Applications, Markets and Services in the…
Finance Industry, FinanceCom 2020, held in Helsinki, Finland, in August 2020. Due to the COVID-19 pandemic the conference took place virtually.The 6 full papers presented together with 1 extended abstract in this volume were carefully reviewed and selected from a total of 14 submissions to the workshop.They are grouped in topical sections named Machine Learning Applications in Trading and Financial Markets, Fraud Detection and Information Generation in Finance, and Alternative Trading and Investment Offerings by FinTechs.The workshop spans multiple disciplines, including analytical, technical, service, economic, sociological and behavioral sciences.Human-Centered Software Engineering: 8th IFIP WG 13.2 International Working Conference, HCSE 2020, Eindhoven, The Netherlands, November 30 – December 2, 2020, Proceedings (Lecture Notes in Computer Science #12481)
By Regina Bernhaupt, Stefan Sauer, Carmelo Ardito. 2020
This book constitutes the refereed conference proceedings of the 8th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE…
2020, which was supposed to be held in Eindhoven, The Netherlands, in November/December 2020, was instead held virtually due to the COVID-19 pandemic.The 10 full papers and 5 short poster and demo papers presented together with 5 poster and demo papers were carefully reviewed and selected from 33 submissions. The papers focus on the interdependencies between user interface properties and contribute to the development of theories, methods, tools and approaches for dealing with multiple properties that should be taken into account when developing interactive systems. They are organized in the following topical sections: user-centred design approaches; model-based and model-driven approaches; software development strategies; and posters and demos.Subject-Oriented Business Process Management. The Digital Workplace – Nucleus of Transformation: 12th International Conference, S-BPM ONE 2020, Bremen, Germany, December 2-3, 2020, Proceedings (Communications in Computer and Information Science #1278)
By Herbert Kotzab, Michael Freitag, Hans-Jörg Kreowski, Klaus-Dieter Thoben, Aseem Kinra. 2020
This book constitutes the refereed proceedings of the 12th International Conference on Subject-Oriented Business Process Management, S-BPM ONE 2020, held…
in Bremen, Germany, in December 2020. Due to the COVID-19 pandemic the conference was held online. The 10 full papers and 5 short papers were thoroughy reviewed and selected from 25 submissions. The volume also presents 1 keynote paper. The papers are thematically organized according to the following sections: subject-oriented business processing – syntax and semantics; cyber-physical and assistance systems; process mining and the Internet of actors and behaviors; Industry 4.0; various views on business process management.Algorithmic Aspects in Information and Management: 11th International Conference, AAIM 2016, Bergamo, Italy, July 18-20, 2016, Proceedings (Lecture Notes in Computer Science #9778)
By Riccardo Dondi, Guillaume Fertin, Giancarlo Mauri. 2016
This volume constitutes the proceedings of the 11th International Conference on Algorithmic Aspects in Information and Management AAIM 2016…
held in Bergamo Italy in July 2016 The 18 revised full papers presented were carefully reviewed and selected from 41 submissions The papers deal with current trends of research on algorithms data structures operation research combinatorial optimization and their applicationsFederated Learning: Privacy and Incentive (Lecture Notes in Computer Science #12500)
By Han Yu, Qiang Yang, Lixin Fan. 2020
This book provides a comprehensive and self-contained introduction to federated learning, ranging from the basic knowledge and theories to various…
key applications. Privacy and incentive issues are the focus of this book. It is timely as federated learning is becoming popular after the release of the General Data Protection Regulation (GDPR). Since federated learning aims to enable a machine model to be collaboratively trained without each party exposing private data to others. This setting adheres to regulatory requirements of data privacy protection such as GDPR. This book contains three main parts. Firstly, it introduces different privacy-preserving methods for protecting a federated learning model against different types of attacks such as data leakage and/or data poisoning. Secondly, the book presents incentive mechanisms which aim to encourage individuals to participate in the federated learning ecosystems. Last but not least, this book also describes how federated learning can be applied in industry and business to address data silo and privacy-preserving problems. The book is intended for readers from both the academia and the industry, who would like to learn about federated learning, practice its implementation, and apply it in their own business. Readers are expected to have some basic understanding of linear algebra, calculus, and neural network. Additionally, domain knowledge in FinTech and marketing would be helpful.”Work on economic problems and solutions with tools from machine learning. ML has taken time to move into the space…
of academic economics. This is because empirical work in economics is concentrated on the identification of causal relationships in parsimonious statistical models; whereas machine learning is oriented towards prediction and is generally uninterested in either causality or parsimony. That leaves a gap for both students and professionals in the economics industry without a standard reference.This book focuses on economic problems with an empirical dimension, where machine learning methods may offer something of value. This includes coverage of a variety of discriminative deep learning models (DNNs, CNNs, RNNs, LSTMs, the Transformer Model, etc.), generative machine learning models, random forests, gradient boosting, clustering, and feature extraction. You'll also learn about the intersection of empirical methods in economics and machine learning, including regression analysis, text analysis, and dimensionality reduction methods, such as principal components analysis.TensorFlow offers a toolset that can be used to setup and solve any mathematical model, including those commonly used in economics. This book is structured to teach through a sequence of complete examples, each framed in terms of a specific economic problem of interest or topic. Otherwise complicated content is then distilled into accessible examples, so you can use TensorFlow to solve workhorse models in economics and finance.What You'll LearnDefine, train, and evaluate machine learning models in TensorFlow 2Apply fundamental concepts in machine learning, such as deep learning and natural language processing, to economic and financial problemsSolve workhorse models in economics and financeWho This Book Is ForStudents and data scientists working in the economics industry. Academic economists and social scientists who have an interest in machine learning are also likely to find this book useful.Bewusstsein: Warum es weit verbreitet ist, aber nicht digitalisiert werden kann
By Christof Koch. 2020
Bewusstsein – das weiter verbreitet ist als bisher angenommen – ist das Gefühl, lebendig zu sein, es ist kein Rechenvorgang…
und auch kein cleverer Trick. In diesem Buch liefert Christof Koch eine schnörkellose Definition des Bewusstseins als bewusstes Erleben, vom alltäglichsten bis zum außergewöhnlichsten – eben das Gefühl zu leben.Die Psychologie erforscht, welche kognitiven Vorgänge einer bewussten Wahrnehmung jeweils zugrunde liegen. Die Neurowissenschaft spürt den neuronalen Korrelaten des Bewusstseins im Gehirn nach, dem Organ des Geistes. Aber warum das Gehirn und nicht etwa die Leber oder ein anderes Organ? Wie kann das Gehirn, drei Pfund höchst erregbares Gewebe, ein Gegenstand im Universum, der denselben physikalischen Gesetzen gehorcht wie jeder andere Gegenstand, subjektives Erleben hervorbringen? Will man eine Antwort auf diese Frage finden, braucht man, so Koch, eine quantitative Theorie, die beim Erleben ansetzt und zum Gehirn fortschreitet. Im vorliegenden Buch umreißt der Autor eine solche Theorie, basierend auf der integrierten Informationstheorie. Koch beschreibt, wie die Theorie viele Fakten zur Neurologie des Bewusstseins erklärt und wie man mit ihrer Hilfe sogar ein in der Klinik einsetzbares Bewusstseins-Messgerät konstruiert hat. Die Theorie sagt voraus, dass viele, ja vielleicht alle Tiere das Leben in vielen Facetten erleben; Bewusstsein ist viel weiter verbreitet als allgemein angenommen. Entgegen der landläufigen Ansicht aber argumentiert Koch, dass programmierbare Computer kein Bewusstsein haben werden. Selbst ein perfektes Softwaremodell des Gehirns ist nicht bewusst – es simuliert lediglich Bewusstsein. Bewusstsein ist keine bestimmte Art von Rechenvorgang, es ist kein cleverer Trick. Bewusstsein ist Sein.reich mit dem Sachbuchprogramm waren.This book constitutes the refereed proceedings of ten international workshops held in Innsbruck Austria in conjunction with the…
13th International Conference on Business Process Management BPM 2015 in September 2015 The seven workshops comprised Adaptive Case Management and other Non-workflow Approaches to BPM AdaptiveCM 2015 Business Process Intelligence BPI 2015 Social and Human Aspects of Business Process Management BPMS2 2015 Data- and Artifact-centric BPM DAB 2015 Decision Mining and Modeling for Business Processes DeMiMoP 2015 Process Engineering IWPE 2015 and Theory and Applications of Process Visualization TaProViz 2015 The 42 revised papers presented were carefully reviewed and selected from 104 submissions In addition four short papers and one keynote from TAProViz are also included in this bookCable and Wireless Networks: Theory and Practice
By M rio Marques da Silva. 2016
Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications, and networking security.…
It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current and emergent services. In this book, the author gathers in a single volume current and emergent cable and wireless network services and technologies. Unlike other books, which cover each one of these topics independently without establishing their natural relationships, this book allows students to quickly learn and improve their mastering of the covered topics with a deeper understanding of their interconnection. It also collects in a single source the latest developments in the area, typically only within reach of an active researcher. Each chapter illustrates the theory of cable and wireless communications with relevant examples, hands-on exercises, and review questions suitable for readers with a BSc degree or an MSc degree in computer science or electrical engineering. This approach makes the book well suited for higher education students in courses such as networking, telecommunications, mobile communications, and network security. This is an excellent reference book for academic, institutional, and industrial professionals with technical responsibilities in planning, design and development of networks, telecommunications and security systems, and mobile communications, as well as for Cisco CCNA and CCNP exam preparation.