|
Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process.
Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful. |
|
|
Biology (Cliffs AP) 2nd Edition
The Advanced Placement Program is designed to encourage students to take challenging courses in high school and receive college credit for their efforts. Many high schools offer classes especially designed for the AP program, but any course or program of study, whatever it is called, is appropriate if the content is college level. This book... | | Privacy Protection and Computer Forensics, Second EditionThis book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with... | | Warren Buffett Invests Like a Girl (Motley Fool Books)
This is a book for investors about investing. It
focuses on the factors that will best determine if
you will make or lose money, and whether you'll
beat the market.
You might naturally assume, then, that you'll
be reading about how to pick stocks—so that you
buy GEICO instead of Bank of... |
Solaris Application Programming (Solaris Series)This book is a guide to getting the best performance out of computers running the Solaris operating system. The target audience is developers and software architects who are interested in using the tools that are available, as well as those who are interested in squeezing the last drop of performance out of the system.
The book caters to... | | | | |
|