After a lot of development efforts, computer science led us undoubtedly to technological revolutions
which have been characterized by the creation of the Internet that influences the future of this science.
The next revolutionary step occurred by the necessity of the creation of a new computer network, when
researchers realized...
As a graduate student at Ohio State in the mid-1970s, I inherited a unique computer
vision laboratory from the doctoral research of previous students. They had
designed and built an early frame-grabber to deliver digitized color video from a
(very large) electronic video camera on a tripod to a mini-computer (sic) with a...
Examine several methods of testing for genetically modified organisms and the reasons behind their strict regulation!
Testing of Genetically Modified Organisms in Foods is the first study of the screening methods and tools utilized for determining the presence of genetically modified organisms (GMOs) in food products. Leading...
It is demonstrated that spectral characteristics of steady-state visual
evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI)
depend significantly on the stimulus parameters, such as color and frequency of its
flashing light. We postulate these dependencies can be used to improve the BCI
performance –...
The International Workshop on Complex Networks—CompleNet
(www.complenet.org)—was initially proposed in 2008 with the first workshop
taking place in 2009. The initiative was the result of efforts from researchers
from the Bio-Complex Laboratory in the Department of Computer Sciences at
Florida Institute of...
The "European Institute for System Security (E.I.S.S.)" was founded on February 29, 1988 by cabinet resolution of the state government Baden-Wurttemberg. It is headed by Professor Thomas Beth and is affiliated with the Institute for Algorithms and Cognitive Systems (IAKS) of the Faculty for Computer Science at the University of...
This book originates from the desire to perpetuate expertise in the field of
performance evaluation, particularly for telecommunication systems and
networks. It is obviously impossible to translate into a single work all the
facets of an activity which encompasses many systems and a great variety of
domains such as standardization,...
Approximation methods are of vital importance in many challenging applications
from computational science and engineering. This book collects papers
from world experts in a broad variety of relevant applications of approximation
theory, including pattern recognition and machine learning, multiscale modelling
of fluid flow, metrology,...
Over the course of the past twenty years I have learned many things relevant to
this book while working in high-energy physics. As everyone in this field in the
yearly to mid-90s, I was analyzing experimental data collected by particle colliders
using the FORTRAN programming language. Then, gradually, I moved to C++
coding following...
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It
briefly describes the history of the cyberforensics field and places the subsequent
chapters into context. The last section of the introduction, Expert Explanations,
describes the format of the following sections and also how the sections complement...
These Lecture Series in Computational Science and Engineering include the proceedings
of a Summer Program in Multi-Scale Modelling and Simulation held in
Lugano, Switzerland, between August 4th and 30th, 2003. The workshop was organized
by the ETHZ Computational Laboratory (CoLab) together with the Swiss
Center for Scientific...
In the summer of 1997, I was terrified. Instead of working as an intern in my major (microelectronic engineering), the best job I could find was at a research laboratory devoted to high-speed signal processing. My job was to program the two-dimensional fast Fourier transform (FFT) using C and the Message Passing Interface...