Covering key areas of evaluation and methodology, client-side applications, specialist and novel technologies, along with initial appraisals of disabilities, this important book provides comprehensive coverage of web accessibility.
Written by leading experts in the field, it provides an overview of existing research and also looks at future...
Cost optimal and nearly zero energy performance levels are principles initiated by the European Union’s (EU) Energy Performance of Buildings Directive which was recast in 2010. These will be major drivers in the construction sector in the next few years, because all new buildings in the EU from 2021 onwards are expected to be nearly...
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
As the core technical foundation for the modern services science, Services Computing covers the science, technology and business models of effectively creating and leveraging computing technology to bridge the gap between business and IT services. This book systematically introduces the fundamentals of this new discipline based on the latest...
This book deals with the acceleration of EDA algorithms using hardware platforms such as FPGAs and GPUs. Widely applied CAD algorithms are evaluated and compared for potential acceleration on FPGAs and GPUs. Coverage includes discussion of conditions under which it is preferable to use one platform over another, e.g., when an EDA problem has...
Data mining is well on its way to becoming a recognized discipline in the overlapping areas of IT, statistics, machine learning, and AI. Practical Data Mining for Business presents a user-friendly approach to data mining methods, covering the typical uses to which it is applied. The methodology is complemented by case studies to create...
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by...
Research in the area of data communications and networking is well and alive as this collection of contributions show. The book has received enhanced contributions from the authors that published in the inaugural volume of the International Journal of Business Data Communications and Networking (http://www.idea-group.com/ijbdcn). The chapters are...
There are increasing calls for social science researchers to work more closely with research users. References to engaging users in and with research are now common in research funding requirements, national research strategies and large-scale research programmes. User engagement has therefore become part of the rhetoric of educational and...
The book covers all the important aspects of research methodology, and addresses the specific requirements of engineering students, such as methods and tools, in detail. It also discusses effective research in engineering today, which requires the ability to undertake literature reviews utilizing different online databases, to...
This is the first book to focus on the problem of ensuring the correctness of floating-point hardware designs through mathematical methods. Formal Verification of Floating-Point Hardware Design advances a verification methodology based on a unified theory of register-transfer logic and floating-point arithmetic that has...
A Revolutionary New Digital System Design Methodology
Logically determined electronic system design is a viable solution to manage the growing complexity of digital design in today's industry. The author shows how this new clockless design methodology is essential for securing the future economic growth of the digital design industry by...