Creativity Across Domains: Faces of the Muse sorts through the sometimes-confusing theoretical diversity that domain specificity has spawned. It also brings together writers who have studied creative thinkers in different areas, such as the various arts, sciences, and communication/leadership. Each contributor explains what is known about the...
Effectively forecast, manage, and control software across the entire project lifecycle
Accurately size, estimate, and administer software projects with real-world guidance from an industry expert. Fully updated to cover the latest tools and techniques, Applied Software Measurement, Third Edition details how to...
The most comprehensive and up-to-date optics resource available
Prepared under the auspices of the Optical Society of America, the five carefully architected and cross-referenced volumes of the Handbook of Optics, Third Edition, contain everything a student, scientist, or engineer requires to actively work in...
In this text we present a technical overview of the emerging field of quantum computation along with new research results by the authors. What distinguishes our presentation from that of others is our focus on the relationship between quantum computation and computer science. Specifically, our emphasis is on the computational model of quantum...
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical...
The primary focus of this book is the presentation of the standard JBoss 3.0.3 architecture components from both the perspective of their configuration and architecture. As a user of a standard JBoss distribution you will be given an understanding of how to configure the standard components.
These autobiographical memoirs of Neal Koblitz, coinventor of one of the two most popular forms of encryption and digital signature, cover many topics besides his own personal career in mathematics and cryptography - travels to the Soviet Union, Latin America, Vietnam and elsewhere, political activism, and academic controversies relating to math...
This book is one of the most up-to-date and cutting-edge texts available on the rapidly growing application area of neural networks. Neural Networks and Pattern Recognition focuses on the use of neural networksin pattern recognition, a very important application area for neural networks technology. The contributors are widely known...
A breakthrough on today’s fastest growing artificial intelligence technique
Many of today’s engineering and business computer applications require decisions to be made on the basis of uncertain or incomplete information, a phenomenon that has resulted in the development of case-based reasoning, a powerful computing technique by...