000 Computer Science, Knowledge & Systems

Dublin Core

Title

000 Computer Science, Knowledge & Systems

Collection Items

Tools and Algorithms for the Construction and Analysis of Systems
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the…

Tools and Algorithms for the Construction and Analysis of Systems
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the…

Programming Languages and Systems
This open access book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April 5-7, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS…

Fundamental Approaches to Software Engineering
This open access book constitutes the proceedings of the 25th International Conference on Fundamental Approaches to Software Engineering, FASE 2022, which was held during April 4-5, 2022, in Munich, Germany, as part of the European Joint Conferences…

Foundations of Software Science and Computation Structures
This open access book constitutes the proceedings of the 25th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2022, which was held during April 4-6, 2022, in Munich, Germany, as part of the European…

This open access book constitutes the proceedings of the 22nd International Conference on Agile Software Development, XP 2021, which was held virtually during June 14-18, 2021. XP is the premier agile software development conference combining…

Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 23rd International Conference on Agile Software Development, XP 2022, which was held in Copenhagen, Denmark, in June 2022. XP is the premier agile software development conference combining…

The Future of Software Quality Assurance
This open access book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing…

Information—Consciousness—Reality
This open access book chronicles the rise of a new scientific paradigm offering novel insights into the age-old enigmas of existence. Over 300 years ago, the human mind discovered the machine code of reality: mathematics. By utilizing abstract…

A Journey of Embedded and Cyber-Physical Systems
This Open Access book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical systems. The contributions in the book summarize the content of invited lectures given at the workshop “Embedded…

Critical Thinking in Academic Research
Critical Thinking in Academic Research will introduce students to the techniques and principles of critical thinking. However, a commitment to lifelong learning is required for critical thinking, it takes more than a single course or reading a book.…

Patterns for Beginning Programmers
Programming patterns are solutions to problems that require the creation of a small fragment of code that will be part of a larger program. Hence, this book is about teaching you how to write such fragments of code. However, it is not about teaching…

This book is based on two open-access textbooks: Bhattacherjee’s (2012) Social science research: Principles, methods, and practices and Blackstone’s (2012) Principles of sociological inquiry: Qualitative and quantitative methods. I first used…

Business Computers 365
Intro to Computer Applications or Business Computers for Office 365

A Mixed Course-Based Research Approach to Human Physiology
The Biology 256 Laboratory course was designed to provide students with hands-on access to modern techniques in human physiological analyses using the course-based research pedagogical approach. In this course, students will learn how to perform…

Open Signals and Systems Laboratory Exercises
Open Signals and Systems Laboratory Exercises is a collection of lab assignments that have been used in EE 224: Signals and Systems I in the Department of Electrical and Computer Engineering at Iowa State University. These lab exercises have been…

Foundations of Social Work Research
This textbook was created to provide an introduction to research methods for BSW and MSW students, with particular emphasis on research and practice relevant to students at the University of Texas at Arlington. It provides an introduction to social…

Brain and Human Body Modeling 2020 : <br /><br />
Computational Human Models Presented at EMBC 2019 and the BRAIN Initiative® 2019 Meeting
This open access book describes modern applications of computational human modeling in an effort to advance neurology, cancer treatment, and radio-frequency studies including regulatory, safety, and wireless communication fields. Readers working on…

This Open Access book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have emerged particularly within the last five years. This book introduces the most prominent reliability concerns…

Data Privacy and Trust in Cloud Computing
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a…

Data and Text Processing for Health and Life Sciences
This open access book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show…

Data Privacy and Trust in Cloud Computing
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a…

The Coupling of Safety and Security
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the…

Computational Cognitive Modeling and Linguistic Theory
This open access book introduces a general framework that allows natural language researchers to enhance existing competence theories with fully specified performance and processing components. Gradually developing increasingly complex and…

A Person-Centered Guide to Demystifying Technology: Working together to observe, question, design, prototype, and implement/reject technology in support of people&#039;s valued beings and doings
Digital technologies old and new are not objects that can be packed inside a box. They are a seamless, indivisible combination of people, organizations, policies, economies, histories, cultures, knowledge, and material things that are continuously…

The book is based on “First semester in Numerical Analysis with Julia”, written by Giray Ökten. The contents of the original book are retained, while all the algorithms are implemented in Python (Version 3.8.0). Python is an open source (under OSI),…

Automated Machine Learning
This open access book presents the first comprehensive overview of general methods in Automated Machine Learning (AutoML), collects descriptions of existing systems based on these methods, and discusses the first series of international challenges of…

The Amazing Journey of Reason
This Open Access book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and –now– connected human societies? Physicists have good models for describing the evolution of the…

AI based Robot Safe Learning and Control
This open access book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic neural network, which is an important theoretical branch of deep reinforcement learning. In order to enhance the…

Agile Processes in Software Engineering and Extreme Programming – Workshops
This open access book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile…

Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 21st International Conference on Agile Software Development, XP 2020, which was planned to be held during June 8-12, 2020, at the IT University of Copenhagen, Denmark. However, due to the…

Business Computers 365
The material in this text consists of many screenshots of Microsoft® Office 365 using Windows 10.

The goal of this text was to create a resource for students that was effective, concise and cost-effective. This text will not include extra content…

Blueprints is a concise yet comprehensive coverage of Object-Oriented Analysis and Design concepts, suitable for a second programming course in Computer Science. It introduces and teaches application development in a command-line environment, and…

Doing Research
A modules-based approach to learning research skills that emphasizes the reflective nature of information discovery, the contextual basis for evaluating that information, and a recognition that information has value.

Statistical relationships among the variables of a complex system reveal a lot about its physical behavior. Therefore, identification of the relevant variables and characterization of their interactions are crucial for a better understanding of a…

In last few decades, short-term load forecasting (STLF) has been one of the most important research issues for achieving higher efficiency and reliability in power system operation, to facilitate the minimization of its operation cost by providing…

Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless…

Optimization is considered as a decision-making process for getting the most out of available resources for the best attainable results. Many real-world problems are multi-objective or multi-attribute problems that naturally involve several competing…

Modern biology is rapidly becoming a study of large sets of data. Understanding these data sets is a major challenge for most life sciences, including the medical, environmental, and bioprocess fields. Computational biology approaches are essential…

Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design…

Extended object tracking deals with estimating the shape and pose of an object based on noisy point measurements. This task is not straightforward, as we may be faced with scarce low-quality measurements, little a priori information, or we may be…

To manage the influx of information into surgical practice, new man-machine interaction methods are necessary to prevent information overflow. This work presents an approach to automatically segment surgeries into phases and select the most…

Realtime Analysis of Large-Scale Data
In photon science more and more data are taken. It is not possible anymore to store and process all data offline. In this book, we explore strategies for handling this large amount of data. A neural network as well as techniques from image processing…

Real-time Biomechanical Modeling for Intraoperative Soft Tissue Registration
Computer assisted surgery systems intraoperatively support the surgeon by providing information on the location of hidden risk and target structures during surgery. However, soft tissue deformations make intraoperative registration (and thus…

Ranking for Web Data Search Using On-The-Fly Data Integration
Ranking - the algorithmic decision on how relevant an information artifact is for a given information need and the sorting of artifacts by their concluded relevancy - is an integral part of every search engine. In this book we investigate how…

Product lines for digital information products
Digital information products are an important class of widely used digital products, whose core benefit is the delivery of information or education (e.g., electronic books, online newspapers, e-learning courses).This book introduces a novel and…

Possibly imperfect ontologies for effective information retrieval
Ontologies and semantic metadata can theoretically solve all problems of traditional full-text search engines. In practice, however, they are always imperfect. This work analyzed whether the negative effect of ontology imperfection is higher than the…

Optimal Sequence-Based Control of Networked Linear Systems
In Networked Control Systems (NCS), components of a control loop are connected by data networks that may introduce time-varying delays and packet losses into the system, which can severly degrade control performance. Hence, this book presents the…

Optical Coherence Tomography guided Laser-Cochleostomy
Despite the high precision of laser, it remains challenging to control the laser-bone ablation without injuring the underlying critical structures. Providing an axial resolution on micrometre scale, OCT is a promising candidate for imaging…

Nonlinear Gaussian Filtering : Theory, Algorithms, and Applications
By restricting to Gaussian distributions, the optimal Bayesian filtering problem can be transformed into an algebraically simple form, which allows for computationally efficient algorithms. Three problem settings are discussed in this thesis: (1)…

New Methods to Improve Large-Scale Microscopy Image Analysis with Prior Knowledge and Uncertainty
Multidimensional imaging techniques provide powerful ways to examine various kinds of scientific questions. The routinely produced data sets in the terabyte-range, however, can hardly be analyzed manually and require an extensive use of automated…

Integrated Software Architecture-Based Reliability Prediction for IT Systems
With the increasing importance of reliability in business and industrial IT systems, new techniques for architecture-based software reliability prediction are becoming an integral part of the development process. This dissertation thesis introduces a…

Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
nformation flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input.…

The impact of inter-vehicle communication on vehicular traffic
The work addresses communication networks established over radio equipped vehicles in our everyday road traffic, so called Vehicular Ad Hoc Networks (VANETs), and discusses their impact on two major goals, namely traffic safety and traffic…

Identifying and Harnessing Concurrency for Parallel and Distributed Network Simulation
Although computer networks are inherently parallel systems, the parallel execution of network simulations on interconnected processors frequently yields only limited benefits. In this thesis, methods are proposed to estimate and understand the…

Hybrid routing in delay tolerant networks
This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and…

Learning to Understand Remote Sensing Images
With the recent advances in remote sensing technologies for Earth observation, many different remote sensors are collecting data with distinctive properties. The obtained data are so large and complex that analyzing them manually becomes impractical…

Learning to Understand Remote Sensing Images
With the recent advances in remote sensing technologies for Earth observation, many different remote sensors are collecting data with distinctive properties. The obtained data are so large and complex that analyzing them manually becomes impractical…

Hybrid routing in delay tolerant networks
This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and…

Computer Algebra in Scientific Computing<br /><br />
Although scientific computing is very often associated with numeric computations, the use of computer algebra methods in scientific computing has obtained considerable attention in the last two decades. Computer algebra methods are especially…

Computational Methods for Fracture
This book offers a collection of 17 scientific papers about the computational modeling of fracture. Some of the manuscripts propose new computational methods and/or how to improve existing cutting edge methods for fracture. These contributions can be…

Error-Correction Coding and Decoding: Bounds, Codes, Decoders, Analysis and Applications
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from…

Visualizing Mortality Dynamics in the Lexis Diagram
The goal of this book is simple: We would like to show how mortality dynamics can be visualized in the so-called Lexis diagram. To appeal to as many potential readers as possible, we do not require any specialist knowledge. This approach may be…

Solving PDEs in Python: The FEniCS Tutorial I
This book offers a concise and gentle introduction to finite element programming in Python based on the popular FEniCS software library. Using a series of examples, including the Poisson equation, the equations of linear elasticity, the…

Scaling a Software Business: The Digitalization Journey
Software has changed the rules of the game. The world talks about the digitalization in industry and society – how the focus has shifted from producing tangible things towards software and services. This trend started many years ago, but is now…

Re-engineering the Uptake of ICT in Schools
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale…

Programming for Computations - Python: A Gentle Introduction to Numerical Simulations with Python
Today, most people are experienced with computer programs, typically programs such as Word, Excel, PowerPoint, Internet Explorer, and Photoshop. The interaction with such programs is usually quite simple and intuitive: you click on buttons, pull down…

Control Theory Tutorial: Basic Concepts Illustrated by Software Examples
This open access Brief introduces the basic principles of control theory in a concise self-study guide. It complements the classic texts by emphasizing the simple conceptual unity of the subject. A novice can quickly see how and why the different…

Theory and Applications of Ordered Fuzzy Numbers: A Tribute to Professor Witold Kosiński
This open access book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by…

S-BPM in the Production Industry: A Stakeholder Approach
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective…

Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and…

S-BPM in the Wild: Practical Value Creation
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with…

From Data Modeling to Knowledge Engineering in Space System Design
The technologies currently employed for modeling complex systems, such as aircraft, spacecraft, or infrastructures, are sufficient for system description, but do not allow deriving knowledge about the modeled systems. This work provides the means to…

Managing the Complexity of Critical Infrastructures: A Modelling and Simulation Approach
This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is…

The Essence of Software Engineering
This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research…

Ecosystemic Evolution Feeded by Smart Systems
nformation Society is advancing along a route of ecosystemic evolution. ICT and Internet advancements, together with the progression of the systemic approach for enhancement and application of Smart Systems, are grounding such an evolution. The…

Dynamics of Evolution and Learning
The book develops a unifying perspective on how learning influences evolutionary dynamics which for the first time explains seemingly contradicting results from the literature. It also reveals formerly unknown facets of the complex interplay of the…

Document Image Processing
Document Image Processing allows systems like OCR, writer identification, writer recognition, check processing, historical document processing, etc., to extract useful information from document images. What we call a document image ranges from images…

Directional Estimation for Robotic Beating Heart Surgery
In robotic beating heart surgery, a remote-controlled robot can be used to carry out the operation while automatically canceling out the heart motion. The surgeon controlling the robot is shown a stabilized view of the heart. First, we consider the…

Coordinating Service Compositions : Model and Infrastructure for Collaborative Creation of Electronic Documents
Electronic documents frequently include contributions from different human and non-human sources. The Web, for instance, offers ever-changing content and services which can perform activities during document creation. This thesis introduces a…

A Contribution to Resource-Aware Architectures for Humanoid Robots
The goal of this work is to provide building blocks for resource-aware robot architectures. The topic of these blocks are data-driven generation of context-sensitive resource models, prediction of future resource utilizations, and resource-aware…

A Contribution to Active Infrared Laser Spectroscopy for Remote Substance Detection
n this work we present a stand-off, long wave infrared (LWIR) spectroscopy system for remote detection of hazardous substances. The principle is based upon wavelength selective illumination using External Cavity Quantum Cascade Lasers, that are…

Consolidation of Customized Product Copies into Software Product Lines
In software development, project constraints lead to customer-specific variants by copying and adapting the product. During this process, modifications are scattered all over the code. Although this is flexible and efficient in the short term, a…

Automated Improvement of Software Architecture Models for Performance and Other Quality Attributes
Quality attributes, such as performance or reliability, are crucial for the success of a software system and largely influenced by the software architecture. Their quantitative prediction supports systematic, goal-oriented software design and forms a…

Re-engineering the Uptake of ICT in Schools
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale…

Error-Correction Coding and Decoding: Bounds, Codes, Decoders, Analysis and Applications
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from…

The Essence of Software Engineering
This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research…

Big Data in Context: Legal, Social and Technological Insights
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor…

Advanced Signaling Support for IP-based Networks
his work develops a set of advanced signaling concepts for IP-based networks. It proposes a design for secure and authentic signaling and provides QoS signaling support for mobile users. Furthermore, this work develops methods which allow for…

Middleware Solutions for Wireless Internet of Things
Plan Ceibal is the name coined in Uruguay for the local implementation of the One Laptop Per Child (OLPC) initiative. Plan Ceibal distributes laptops and tablets to students and teachers, and also deploys a nationwide wireless network to provide…

Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Drugs are generally devised to alter the function of cells in a favorable manner. The actions of drugs can in some cases be represented by mathematical models often phrased in terms of differential equations. Our aim in these notes is to study…

Finite Difference Computing with PDEs: A Modern Software Approach
Vibration problems lead to differential equations with solutions that oscillate in time, typically in a damped or undamped sinusoidal fashion. Such solutions put certain demands on the numerical methods compared to other phenomena whose solutions are…

Controlled self-organisation using learning classifier systems
The complexity of technical systems increases, breakdowns occur quite often. The mission of organic computing is to tame these challenges by providing degrees of freedom for self-organised behaviour. To achieve these goals, new methods have to be…

Time Predictions: Understanding and Avoiding Unrealism in Project Planning and Everyday Life
The time prediction and planning capacity of the human race is particularly evident in some of the early great constructions. An excellent example is the building of the Great Pyramid of Giza, around 4500 years ago. We do not know much about the…

A Contribution to Resource-Aware Architectures for Humanoid Robots
The goal of this work is to provide building blocks for resource-aware robot architectures. The topic of these blocks are data-driven generation of context-sensitive resource models, prediction of future resource utilizations, and resource-aware…

Computer Vision Metrics: Survey, Taxonomy, and Analysis
In summary, my goal is to survey the methods people are using for feature description— the key metrics generated—and make it easier for anyone to understand the methods in practice, and how to evaluate the methods using the vision taxonomy and…

Computer science approach to quantum control
This work considers several hypothetical control processes on the nanoscopic level and show their analogy to computation processes. It shows that measuring certain types of quantum observables is such a complex task that every instrument that is able…

Computation and the Humanities: Towards an Oral History of Digital Humanities
This chapter begins with an introduction to Digital Humanities (DH) and outlines its development since c.1949. It demonstrates that the application of
computing to cultural heritage has been ongoing for some 70 years yet the histories of DH have,…

Complications and Quandaries in the ICT Sector: Standard Essential Patents and Competition Issues
Today’s technology product markets, particularly in the information and communications technology (henceforth “ICT”) sector, are inherently international.
Products designed in California may be assembled in Taiwan from parts sourced from Korea,…

Combined Scheduling and Control
This paper is about the incremental computation of control sequences for discrete event
systems in uncertain environments where uncontrollable events may occur. Timed Petri nets are used
for this purpose. The aim is to drive the marking of the net…

Challenging the Chain - Governing the Automated Exchange and Processing of Business Information
What is digital business reporting? Why do we need it? And how can we improve it? This book aims to address these questions by illustrating the rise of system-to-system information exchange and the opportunities for improving transparency and…

Certifying Software Component Performance Specifications
In component-based software engineering, performance prediction approaches support the design of business information systems on the architectural level. They are based on behavior specifications of components. This work presents a round-trip…

Building the Infrastructure for Cloud Security: A Solutions View
Security is an ever-present consideration for applications and data in the cloud. It is a concern for executives trying to come up with criteria for migrating an application, for marketing organizations in trying to position the company in a good…

Autonomous Control for a Reliable Internet of Services: Methods, Models, Approaches, Techniques, Algorithms, and Tools
The explosive growth of the Internet has fundamentally changed the
global society. The emergence of concepts like service-oriented architecture
(SOA), Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS),…

Applied Artificial Neural Networks
Heptafluoropropane (R227ea) is a good refrigerant that reduces greenhouse effects and ozone depletion. In practical applications, we usually have to know the compressed liquid densities at different temperatures and pressures. However, the measurement…

Android on x86: An Introduction to Optimizing for Intel® Architecture
We wrote Android on x86: an Introduction to Optimizing for Intel® Architecture to provide a one-stop, detailed resource for the topic’s best practices and procedures. The book encompasses the installation issues, hardware optimization issues,…

Android Application Development for the Intel Platform
The number of Android devices running on Intel processors has gradually increased ever since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel…

Analysis and recognition of human actions with flow features and temporal models
This work focuses the recognition of complex human activities in video data. A combination of new features and techniques from speech recognition is used to realize a recognition of action units and their combinations in video sequences. The…

 Electromyographic Continuous
Speech is the natural medium of human communication, but audible speech can be overheard by bystanders and excludes speech-disabled people. This work presents a speech recognizer based on surface electromyography, where electric potentials of the…

Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy
A System of System (SoS) stems from the integration of existing systems (legacy systems), normally operated by different organizations, and new systems that have been designed to take advantage of this integration. Many of the established assumptions…

Negotiating Internet Governance
On the Internet, everything we love and everything we hate has a name. It also has a number or a string of 0s and 1s making it technically viable. And, more often than not, it comes with a price tag, whether visible or disguised as data value. Since…

Security and Privacy in Wireless and Mobile Networks
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing…

The State of Open Data
It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile,…

Introduction to Programming using Fortran 95/2003/2008
Computers are everywhere in our daily lives. Between the desktop, laptop, phone, bank, and vehicle, it is difficult to completely get away from computers. It only makes sense to learn a little about how a computer really works.This text provides an…

MIPS Assembly Language Programming using QtSpim
There are a number of excellent, comprehensive, and in-depth texts on MIPS assembly language programming. This is not one of them.The purpose of this text is to provide a simple and free reference for university level programming and architecture…

x86-64 Assembly Language Programming with Ubuntu
The purpose of this text is to provide a reference for University level assembly language and systems programming courses. Specifically, this text addresses the x86-64 instruction set for the popular x86-64 class of processors using the Ubuntu 64-bit…

Presentation Software
PowerPoint 2010 is a complete presentation graphics program that allows you to produce professional looking presentations.
Slides can be created and displayed as a slide show on your computer, video projector, or on the Internet. Information from a…

High Performance Computing
The purpose of this book is to teach new programmers and scientists about the basics of High Performance Computing. Too many parallel and high performance computing books focus on the architecture, theory and computer science surrounding HPC. This…

A DIFFERENT ROAD TO COLLEGE: A GUIDE FOR TRANSITIONING TO COLLEGE FOR NON-TRADITIONAL<br /><br />
STUDENTS
A Different Road To College: A Guide For Transitioning Non-Traditional Students is designed to introduce students to the contextual issues of college. Non-traditional students have an ever-growing presence on college campuses, especially community…

Phylogenetic Comparative Methods
Evolution is happening all around us. In many cases – lately, due to technological advances in molecular biology – scientists can now describe the evolutionary
process in exquisite detail. For example, we know exactly which genes change in frequency…

Digital Foundations: Introduction to Media Design with the Adobe Creative Cloud, Revised Edition
Digital Foundations uses formal exercises of the Bauhaus to teach the Adobe Creative Suite. All students of digital design and production—whether learning in a classroom or on their own—need to understand the basic principles of design in order to…

Information Systems: A Manager&#039;s Guide to Harnessing<br /><br />
Technology
This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought…

Introduction to Design Equity
San Francisco, Portland, Austin, Madison, and Minneapolis are considered some of the country’s best-designed and most politically liberal cities. Mention of each brings to mind public parks, ample bike lanes, eclectic music scenes,…

Digital Accessibility as a Business Practice
Most business leaders would agree that reaching the broadest audience is good for a business’s bottom line. A good portion of that audience will be people with disabilities. How, though, would an organization go about ensuring it is as accessible as…

Web Accessibility for Developers : Essential Skills for Web Developers
Web Accessibility for Developers is a technical book aimed primarily at programmers. Learn how to develop accessible interactivity on the Web and gain expertise using WAI-ARIA, a W3C specification that enables optimal use of assistive technologies,…

Information Systems for Business and Beyond
Welcome to Information Systems for Business and Beyond. In this book, you will be introduced to the
concept of information systems, their use in business, and the larger impact they are having on our world.
This book is written as an introductory…

Computer Networking : Principles, Protocols and Practice<br /><br />
Release 0.25
When the first computers were built during the second world war, they were expensive and isolated. However, after about twenty years, as their prices gradually decreased, the first experiments began to connect computers together. In the early 1960s,…

Design and Testing of Laboratory Instruction<br /><br />
Management System (LIMS)
Laboratory Integration Management Solution (LIMS) is a software/hardware system which is used in
industrial laboratories for the integration of all laboratory software and instruments, training laboratory users, QA and QC. LIMS may also support data…

Research Methods in Psychology (New Zealand edition)
This textbook is an adaptation of the Research Methods in Psychology that is available on this site in US and Canadian editions. This New Zealand edition is an adaptation to the New Zealand context. The main changes are in Chapters 1 and 3 and the…

Steps to Success : Crossing the Bridge Between Literacy<br /><br />
Research and Practice
Steps to Success: Crossing the Bridge Between Literacy Research and Practice introduces instructional strategies linked to the most current research-supported practices in the field of literacy. The book includes chapters related to…

Introduction to Computer Graphics
Introduction to Computer Graphics is a free, on-line textbook covering the fundamentals of computer graphics and computer graphics programming. This book is meant for use as a textbook in a one-semester course that would typically be taken by…

Embedded Controllers Using C and Arduino / 2E
This text is designed to introduce and expand upon material related to the C programming language and embedded controllers, and specifically, the Arduino development system and associated Atmel ATmega microcontrollers. It is intended to fit the time…

Implementing a One Address CPU in Logisim
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users…

Think Data Structures: Algorithms and Information Retrieval in Java
This book is intended for college students in computer science and related fields, as well as professional software engineers, people training in software engineering, and people preparing for technical interviews. Before you start this book, you…

The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mathematics, Engineering, and Natural Science. Like mathematicians, computer…

Knowledge Services
Knowledge Services converges information management, knowledge management (KM), and strategic learning into a single enterprise-wide discipline for the benefit of the business or organization in which it is practiced. With the success of knowledge…

Digital Material
Three decades of societal and cultural alignment of new media have yielded a host of innovations, trials, and problems, accompanied by versatile popular and academic discourse. New Media Studies crystallized internationally into an established…

Safety and Reliability for Science and Technology
Safety and reliability are two important aspects of science and technology. They are
highly related, and they complement each other, i.e. they provide each other with
more information than could be obtained individually. When safety and reliability…

Web Site Design
Websites are created using a set of standard technologies. Many of these technologies
involve markup and programming languages for encoding page content and
specifying the appearance and interactive behaviour of Web elements. In this module,
you…

Introduction to G Programming
The Internet, personal devices and multicore computers have greatly changed and enhanced our lives by allowing us to access information and entertainment ondemand anytime, anywhere. While these technologies are great on their own merit,
the reality…

Computer And PC Designs
Before we go into details on various computer designs concepts, we need to
understand how to interpret the performance of a computer system. To start with, we will look at some basic metric and benchmarks for the measurement of a computer's…

Computer Networks
Nowadays, everyone is using the Internet. We have hooked our computers to the
Internet, where we can access information and transmit messages. The Internet is a
very large computer network. Computer networks are so important in our daily life
that…

Network Programming And Design<br /><br />
This module will enable you to understand various wireless technologies, especially
those that have been infused into our daily lives. Also, a range of wireless network
protocols and wireless LAN design models will be discussed. Another topic that…

Multimedia Technology
With the success of websites such as YouTube, streaming is no doubt one of the most important multimedia applications. This module explains two very different
approaches to building a streaming application.
With a streaming server such as Microsoft…

Beginning Excel
This textbook was written for a community college introductory course in spreadsheets utilizing Microsoft Excel. While the figures shown utilize Excel 2016, the textbook was written to be applicable to other versions of Excel as well. The book…

Digital Classics Outside the Echo-Chamber : Teaching, Knowledge Exchange &amp; Public Engagement

"Edited by organisers of “Digital Classicist” seminars in London and Berlin, this volume explores the impact of computational approaches to the study of antiquity on audiences other than the scholars who conventionally publish it. In addition to…

Laying the Foundation
Laying the Foundation: Digital Humanities in Academic Libraries examines the library’s role in the development, implementation, and instruction of successful digital humanities projects. It pays special attention to the critical role of librarians in…

The Missing Link: An Introduction to Web Development and Programming
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.
While it is easy to describe conceptually, implementation is…

Introduction to Internet Marketing
Internet marketing is the fastest growing and most exciting branch of marketing
today. as the world becomes ever more connected, keeping up with developments
and trends is vital for marketers trying to reach new audiences – who are…

Principles of Computer System Design: An Introduction <br /><br />
Principles of Computer System Design is the first textbook to take a principles-based approach to the computer system design. It identifies, examines, and illustrates fundamental concepts in computer system design that are common across operating…

Physical Modeling in MATLAB<br /><br />
<br /><br />
Most books that use MATLAB are aimed at readers who know how to program. This book is for people who have never programmed before.
As a result, the order of presentation is unusual. The book starts with scalar values and works up to vectors and…

Introduction to Computing
Computer science studies how to describe, predict properties of, and efficiently implement information processes. This book introduces the most important ideas in computing using the Scheme and Python programming languages. It focuses on how to…

Introduction to Computer Graphics
A free, on-line textbook covering the fundamentals of computer graphics and computer graphics programming.

Introduction to Autonomous Robots
This book introduces concepts in mobile, autonomous robotics to 3rd-4th year students in Computer Science or a related discipline. The book covers principles of robot motion, forward and inverse kinematics of robotic arms and simple wheeled…

Introductory Business Statistics with Interactive Spreadsheets
Introductory Business Statistics with Interactive Spreadsheets – 1st Canadian Edition is an adaptation of Thomas K. Tiemann’s book, Introductory Business Statistics. This new edition still contains the basic ideas behind statistics, such as…

How to Think Like a Computer Scientist
"How to Think Like a Computer Scientist: Learning with Python" is an introduction to computer science using the Python programming language. It covers the basics of computer programming, including variables and values, functions, conditionals and…

Android Programming Tutorials
This book has been replaced by the omnibus edition of The Busy Coder's Guide to Android Development, and so this book is no longer available in digital form as a separate title. Visit the page for The Busy Coder's Guide to Android Development to…

An Introduction to MATLAB and Mathcad
An introduction to programming and problem solving using both MATLAB and Mathcad.

An Introduction to Computer Networks
An introductory text for college or graduate course in computer networks, with a balance between practical matters and underlying principles. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP.

Database Design
This book presents the concepts used in database systems, focusing on design process.

Introduction to Programming Languages
Introduction to Programming Languages is designed to formalize and consolidate the knowledge of programming languages gained in the introductory courses a computer science curriculum and to provide a base for further studies in the semantics and…

Support Vector Machines
Support Vector Machines - One of the most successful learning algorithms; getting a complex model at the price of a simple one. Lecture 14 of 18 of Caltech's Machine Learning Course - CS 156 by Professor Yaser Abu-Mostafa. View course materials in…

Database Design - 2nd Edition<br /><br />
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.

Information Systems<br /><br />
Students need to understand systems and the systems concept, and they need to understand the role of ICT in enabling systems. Students will learn the characteristics of good systems (e.g., intuitive, likable, error-resistant, fast, flexible, and the…

Open Data Structures<br /><br />
There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book.

Algorithms and Data Structures<br /><br />
This is a textbook for first year Computer Science. Algorithms and Data Structures With Applications to Graphics and Geometry.
View all 177 items

Collection Tree