This book covers the critical as well as the less obvious aspects of managing Microsoft Team Foundation Server 2015 in a variety of development and test environments. Coverage includes basic installation, initial configuration, maintenance, and common trouble shooting techniques, sizing, and performance considerations. Essentials of Administering Team Foundation Server 2015 explains how TFS …
Providing an introduction to isogeometric methods with a focus on their mathematical foundations, this book is composed of four chapters, each devoted to a topic of special interests for isogeometric methods and their theoretical understanding. It contains a tutorial on splines and generalizations that are used in CAD parametrizations, and gives an overview of geometric modeling techniques that…
It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile, issues related to data rights and privacy have moved to the centre of public and political discourse. As the open data movement enters a new phase…
This book is a collection of the miscellaneous knowledge essential for transistor-level LSI circuit design, summarized as the issues that need to be considered in each design step. To design an LSI that actually functions and to be able to properly measure it, an extremely large amount of diverse, detailed knowledge is necessary. Even though one may read a textbook about an op-amp, for example,…
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields. It covers aspects …
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …
This brief systematically examines the trackback problem and its interaction with low-latency anonymous communication. First, it provides an overview of the common techniques a network-based attack may use to hide its origin and identity. Then the authors explore the MIX-based anonymity and the building blocks of low-latency anonymous communication. Later chapters offer a comprehensive study of…
This book is concerned with the importance of Human Computer Interaction (HCI), Usability, user participants, and Sustainability in the Information Communication Technology (ICT) industry throughout the world. ICT has become a crucial instrument for communication, entertainment, commerce and research and this increased usage is presenting new environmental and sustainability issues as we try an…