"Fixed-Point Algorithms for Inverse Problems in Science and Engineering" presents some of the most recent work from top-notch researchers studying projection and other first-order fixed-point algorithms in several areas of mathematics and the applied sciences. The material presented provides a survey of the state-of-the-art...
The term "project finance" is now being used in almost every language in every part of the world. It is the solution to infrastructure, public and private venture capital needs. It has been successfully used in the past to raise trillions of dollars of capital and promises to continue to be one of the major financing techniques for...
The Handbook of Mobile Middleware provides an exhaustive overview of recent developments in the various fields related to how software supports mobile computing. This advanced reference authored by internationally recognized experts integrates the valuable insight gained from actual deployments into a full compendium. It begins by presenting...
The book is based on interdisciplinary research on various aspects and dynamics of human multimodal signal exchanges. It discusses realistic application scenarios where human interaction is the focus, in order to
identify new methods for data processing and data flow coordination through synchronization, and...
Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...
Systems engineered by man to harness solar heat in a controlled manner now include a diverse range of technologies each serving distinctive needs in particular climate contexts. This text covers the breadth of solar energy technologies for the conversion of solar energy to provide heat, either as the directly-used output or as an...
Artificial General Intelligence (AGI) research focuses on the original and ultimate
goal of AI – to create broad human-like and transhuman intelligence, by exploring
all available paths, including theoretical and experimental computer science,
cognitive science, neuroscience, and innovative interdisciplinary methodologies....
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical...
Frequently not enough attention is given to producing a comprehensive business case or to producing an economic justification for an information systems investment. In fact many organizations are not clear as to what constitutes a sound business case and how to go about producing one. This Professional level book for the Computer Weekly...
The original goal of the AI field was the construction of “thinking machines”
– that is, computer systems with human-like general intelligence. Due to the
difficulty of this task, for the last few decades the majority of AI researchers have
focused on what has been called “narrow AI” – the production...
This book mainly focuses on cloud security and high performance computing for cloud auditing. The book discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of...
Check out the companion website at www.sagepub.co.uk/heeks
Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners.
Richard Heeks draws on international examples to guide readers through...