With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...
This book describes inventions and designs of ancient engineers that are the precursors of the present. The ages mainly range from 300 B.C. to 1600 A.D. with some exceptions from before and after this period.
As for the very ancient ones, the book describes inventions (documented by archaeological finds mainly from Pompei, Ercolano and Stabia)...
Tess loves math because it's the one subject she can trust—there's always just one right answer, and it never changes. But then she starts algebra and is introduced to those pesky and mysterious variables, which seem to be everywhere in eighth grade. When even your friends and parents can be variables, how in the world do...
As the title of this book suggests, it is an update of the first edition of the Handbook of Natural Language
Processing which was edited by Robert Dale, Hermann Moisl, and Harold Somers and published in the
year 2000. The vigorous growth of new methods in Natural Language Processing (henceforth, NLP) since
then, strongly suggested that...
The rapid changes that have taken place globally on the economic, social and business fronts characterized the 20th century. The magnitude of these changes has formed an extremely complex and unpredictable decision-making framework, which is difficult to model through traditional approaches. The main purpose of this book is to present the...
How will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level...
The study of social networks was originated in social and business communities. In recent years, social network research has advanced significantly; the development of sophisticated techniques for Social Network Analysis and Mining (SNAM) has been highly influenced by the online social Web sites, email logs, phone logs and instant...
Learning Red Hat Linux walks the reader through the process of installing, configuring, and using Red Hat Linux 6 and some of its most popular applications. Networking coverage includes essential local area network configuration, plus excellent coverage of Samba setup and the process of establishing a Point-to-Point Protocol (PPP)...
Sitting in the reading rooms of the Public Record Office in London, a historian is in the center of a museum of organization. Copies of the catalogue to the museum fill several walls (although these are now complemented by online versions). The catalogue lists are dominated by references to objects of one kind: the file. The file has in its...
Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...