Proceedings of the 30th Annual ACM Symposium on Applied Computing
Author: Roger L. Wainwright
Publisher:
Published: 2015
Total Pages: 2418
ISBN-13: 9781450331968
DOWNLOAD EBOOKRead and Download eBook Full
Author: Roger L. Wainwright
Publisher:
Published: 2015
Total Pages: 2418
ISBN-13: 9781450331968
DOWNLOAD EBOOKAuthor: Álvaro Rocha
Publisher: Springer
Published: 2019-03-29
Total Pages: 642
ISBN-13: 3030161870
DOWNLOAD EBOOKThis book includes a selection of articles from The 2019 World Conference on Information Systems and Technologies (WorldCIST’19), held from April 16 to 19, at La Toja, Spain. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges in modern information systems and technologies research, together with their technological development and applications. The book covers a number of topics, including A) Information and Knowledge Management; B) Organizational Models and Information Systems; C) Software and Systems Modeling; D) Software Systems, Architectures, Applications and Tools; E) Multimedia Systems and Applications; F) Computer Networks, Mobility and Pervasive Systems; G) Intelligent and Decision Support Systems; H) Big Data Analytics and Applications; I) Human–Computer Interaction; J) Ethics, Computers & Security; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications.
Author: Fiori, Alessandro
Publisher: IGI Global
Published: 2019-08-30
Total Pages: 356
ISBN-13: 1522593756
DOWNLOAD EBOOKWhile the availability of electronic documents increases exponentially with advancing technology, the time spent to process this wealth of resourceful information decreases. Content analysis and information extraction must be aided by summarization methods to quickly parcel pieces of interest and allow for succinct user familiarization in a simple, efficient manner. Trends and Applications of Text Summarization Techniques is a pivotal reference source that explores the latest approaches of document summarization including update, multi-lingual, and domain-oriented summarization tasks and examines their current real-world applications in multiple fields. Featuring coverage on a wide range of topics such as parallel construction, social network integration, and evaluation metrics, this book is ideally designed for information technology practitioners, computer scientists, bioinformatics analysts, business managers, healthcare professionals, academicians, researchers, and students.
Author: Martin Leucker
Publisher: Springer
Published: 2015-10-08
Total Pages: 628
ISBN-13: 3319251503
DOWNLOAD EBOOKThis book constitutes the refereed proceedings of the 12th International Colloquium on Theoretical Aspects of Computing, ICTAC 2015, held in Cali, Colombia, in October 2015. The 25 revised full papers presented together with 7 invited talks, 3 tool papers, and 2 short papers were carefully reviewed and selected from 93 submissions. The papers cover various topics such as algebra and category theory; automata and formal languages; concurrency; constraints, logic and semantic; software architecture and component-based design; and verification.
Author: Kevin Daimi
Publisher: Springer
Published: 2017-08-12
Total Pages: 609
ISBN-13: 3319584243
DOWNLOAD EBOOKThis book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book’s website at Springer.com.
Author: Bernardes, Oscar
Publisher: IGI Global
Published: 2022-05-20
Total Pages: 869
ISBN-13: 1668442884
DOWNLOAD EBOOKGamification is an increasingly popular technology that has been utilized across a number of fields such as business, medicine, and education. As education continues to turn toward online teaching and learning, gamification is one of many new technologies that have been proven to assist educators in providing holistic and effective instruction. Additional research is required to ensure this technology is utilized appropriately within the classroom. The Handbook of Research on the Influence and Effectiveness of Gamification in Education considers the importance of gamification in the current learning environment and discusses the best practices, opportunities, and challenges of this innovative technology within an educational setting. Covering a wide range of critical topics such as engagement, serious games, and escape rooms, this major reference work is essential for policymakers, academicians, administrators, scholars, researchers, practitioners, instructors, and students.
Author: Henrik Boström
Publisher: Springer
Published: 2016-09-23
Total Pages: 418
ISBN-13: 3319463497
DOWNLOAD EBOOKThis book constitutes the refereed conference proceedings of the 15th International Conference on Intelligent Data Analysis, which was held in October 2016 in Stockholm, Sweden. The 36 revised full papers presented were carefully reviewed and selected from 75 submissions. The traditional focus of the IDA symposium series is on end-to-end intelligent support for data analysis. The symposium aims to provide a forum for inspiring research contributions that might be considered preliminary in other leading conferences and journals, but that have a potentially dramatic impact.
Author: Siddhartha Bhattacharyya
Publisher: Springer
Published: 2018-11-19
Total Pages: 550
ISBN-13: 9811323542
DOWNLOAD EBOOKThe book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Author: Dalibor Klusáček
Publisher: Springer
Published: 2019-01-12
Total Pages: 156
ISBN-13: 3030106322
DOWNLOAD EBOOKThis book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2018, held in Vancouver, Canada, in May 2018. The 7 revised full papers presented were carefully reviewed and selected from12 submissions. The papers cover topics in the fields of design and evaluation of new scheduling approaches. They focus on several interesting problems in resource management and scheduling.
Author: Alan Davis
Publisher: Addison-Wesley
Published: 2013-07-18
Total Pages: 376
ISBN-13: 0133491315
DOWNLOAD EBOOKThis is the digital version of the printed book (Copyright © 2005). If you develop software without understanding the requirements, you're wasting your time. On the other hand, if a project spends too much time trying to understand the requirements, it will end up late and/or over-budget. And products that are created by such projects can be just as unsuccessful as those that fail to meet the basic requirements. Instead, every company must make a reasonable trade-off between what's required and what time and resources are available. Finding the right balance for your project may depend on many factors, including the corporate culture, the time-to-market pressure, and the criticality of the application. That is why requirements management—gathering requirements, identifying the "right" ones to satisfy, and documenting them—is essential. Just Enough Requirements Management shows you how to discover, prune, and document requirements when you are subjected to tight schedule constraints. You'll apply just enough process to minimize risks while still achieving desired outcomes. You'll determine how many requirements are just enough to satisfy your customers while still meeting your goals for schedule, budget, and resources. If your project has insufficient resources to satisfy all the requirements of your customers, you must read Just Enough Requirements Management.