Since the first edition of Semantic Web for the Working Ontologist came out in June 2008, we have been
encouraged by the reception the book has received. Practitioners from a wide variety of industries—
health care, energy, environmental science, life sciences, national intelligence, and publishing, to name
a few—have told...
Over the last few decades, energy minimization methods have become an established
paradigm to resolve a variety of challenges in the fields of computer vision
and pattern recognition. While traditional approaches to computer vision were
often based on a heuristic sequence of processing steps and merely allowed a
very limited...
The 11th International Workshop on Information Security Applications (WISA
2010)was held on Jeju Island, Korea, during August 24–26, 2010. The workshop
was hosted by the Korea Institute of Information Security and Cryptology
(KIISC), supported by the Electronics and Telecommunications Research Institute
(ETRI) and the Korea...
Data matching (also known as record or data linkage, entity resolution, object identification, or field matching) is the task of identifying, matching and merging records that correspond to the same entities from several databases or even within one database. Based on research in various domains including applied statistics, health...
Many people find it hard to get on top of their workload. They constantly bounce from one task to another and struggle to prioritize, which can have a serious impact on productivity.
Organise Yourself helps readers develop effective organizational skills and dramatically improve the way they work. It...
This work examines the challenges of distributed map merging and localization in multi-robot systems, which enables robots to acquire the knowledge of their surroundings needed to carry out coordinated tasks. After identifying the main issues associated with this problem, each chapter introduces a different distributed strategy for solving...
This book provides computer exercises for an undergraduate course on signals and linear
systems. Such a course or sequence of courses forms an important part of most engineering
curricula. This book was primarily designed as a companion to the second edition of Signals
and Systems by Oppenheim and Willsky with Nawab. While the...
Writing comprehensive design documents, accurately estimating tasks and schedules, setting up a comprehensive QA planthese are all important aspects of the game development process that are often underplanned. Game company executive Erik Bethke provides a guidebook...
Optical networks have moved from laboratory settings and theoretical research to real-world deployment and service-oriented explorations. New technologies such as Ethernet PON and optical packet switching are being explored, and the landscape is continuously and rapidly evolving. Some of the key issues involving these new...
Our universities are facing immense pressures from within because of the increase in the ‘publish or perish’ syndrome. There are severe budgetary demands on university libraries attempting to enable access to this increasing avalanche of information. University teaching also needs to prepare graduates for a rapidly changing and...
Methods of Historical Analysis in Electronic Media provides a foundation for historical research in electronic media by addressing the literature and the methods—traditional and the eclectic methods of scholarship as applied to electronic media. It is about history—broadcast electronic media history and history that has been broadcast,...
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.
Following on the success of his introductory text, Digital...