Today, huge quantities of digital audiovisual resources are already available – everywhere and at any time – through Web portals, online archives and libraries, and video blogs. One central question with respect to this huge amount of audiovisual data is how they can be used in specific (social, pedagogical, etc.) contexts and what are their potential interest for target groups (communities, professionals, students, researchers, etc.). This book ...
Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and i ...
How many ways do exist to mix different ingredients, how many chances to win a gambling game, how many possible paths going from one place to another in a network ? To this kind of questions Mathematics applied to computer gives a stimulating and exhaustive answer. This text, presented in three parts (Combinatorics, Probability, Graphs) addresses all those who wish to acquire basic or advanced knowledge in combinatorial theories. It is actually ...
If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss, and cost. We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best. The Internet of Things has the potential to change the world, just as the Internet did. Maybe even more so. —Kevin Ashton ...
Offering a truly global perspective, this book serves as a road map for service-learning partnerships between information science and nonprofit organizations. It introduces for the first time an essential framework for service learning in CIS, addressing both the challenges and opportunities of this approach for all stakeholders involved: faculty, students, and community nonprofit organizations (NPOs), both domestic and abroad. This volume outli ...
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cy ...
This book presents fundamentals of reliability engineering with its applications in evaluating reliability of multistage interconnection networks. In the first part of the book, it introduces the concept of reliability engineering, elements of probability theory, probability distributions, availability and data analysis. The second part of the book provides an overview of parallel/distributed computing, network design considerations, and more. T ...
The advent of increasingly large consumer collections of audio (e.g., iTunes), imagery (e.g., Flickr), and video (e.g., YouTube) is driving a need not only for multimedia retrieval but also information extraction from and across media. Furthermore, industrial and government collections fuel requirements for stock media access, media preservation, broadcast news retrieval, identity management, and video surveillance. While significant advances ha ...
Люди склонны преувеличивать и не договаривать, опросы не показывают всей картины, исследования недостаточно репрезентативны ? в общем, лгут все… Кроме Big Data! Перед вами сенсационная книга о том, как при помощи больших данных и современных технологий можно узнать всю подноготную современного общества. Автор этой книги, специалист Google по Data Science, выяснил, что скрывают люди, какие они на самом деле, а не какими хотят казаться. Что же он ...