Word sense disambiguation is a core research problem in computational
linguistics, which was recognized at the beginning of the scientific interest
in machine translation and artificial intelligence. And yet no book has been
fully devoted to review the wide variety of approaches to solving the problem.
The time is right for such a...
Algorithmic Graph Theory and Perfect Graphs, first published in 1980, has become the classic introduction to the field. This new Annals edition continues to convey the message that intersection graph models are a necessary and important tool for solving real-world problems. It remains a stepping stone from which the reader may embark on one...
This book explores the W3C Geolocation API, a specification that provides scripted
access to geographical location information associated with a hosted device.* This API
defines objects that can be used in JavaScript to ascertain the position of the device on
which the code is executed.
The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O
APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a
milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities
of this...
Finally, a textbook that provides the science behind forensics, as well as labs and activities appropriate
for high school students! Forensic Science: Fundamentals and Investigations is student and
teacher friendly. Teachers can conduct a full-year’s study of forensics or select topics that can
be incorporated into a...
The next several years will see a massive emergence of hydrogen fuel cells as an alterative energy option in both transportation and domestic use. The long-range expectation is that hydrogen will be used as a fuel, produced either from renewable energy, fossil, or nuclear sources, offering an environmentally acceptable and efficient source of...
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks....
The ASP.NET MVC 4 framework is used to build scalable web applications with the help of design patterns and .NET Framework. The Model-View-Controller (MVC) is a design principle which separates the components of a web application. This separation helps you to modify, develop, and test different components of a web application.
Direct-Write Technologies covers applications, materials, and the techniques in using direct-write technologies. This book provides an overview of the different direct write techniques currently available, as well as a comparison between the strengths and special attributes for each of the techniques. The techniques described open the...
This textbook is the third of three volumes which provide a modern, algorithmic introduction to digital image processing, designed to be used both by learners desiring a firm foundation on which to build, and practitioners in search of critical analysis and concrete implementations of the most important techniques. This volume builds upon the...
Difference between tissue specific stem cells and embryonic stem cells is explained. The advantages of the latter are included. The application of human pluripotent stem cells, mesenchymal stem cells, and hematopoietic stem cells in cancer therapy and tissue/organ regeneration is detailed. Role of neural cancer stem cells in brain tumors,...