This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with nu…
Robustly maintaining balance on two legs is an important challenge for humanoid robots. The work presented in this book represents a contribution to this area. It investigates efficient methods for the decision-making from internal sensors about whether and where to step, several improvements to efficient whole-body postural balancing methods, and proposes and evaluates a novel method for effic…
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates for reusable knowledge. These templates capture reusable knowledge formally and can efficiently be integrated in architectural analyses.
This work develops highly efficient algorithms for analyzing large images. Applications include object-based change detection and screening. The algorithms are 10-100 times as fast as existing software, sometimes even outperforming FGPA/GPU hardware, because they are designed to suit the computer architecture. This thesis describes the implementation details and the underlying algorithm enginee…
Learning by reflection is one of the core processes for improving work performance. We provide a novel approach for reflective learning support by transferring and adapting practices from the Quantified Self to workplace settings. This book contributes with an integrated model for technical support of reflective learning, mobile and web-based applications designed for quantifying and gathering …
The topic of this work are two further developments of the Factorization method for electrical impedance tomography.We present a modification of this method that is capable of detecting mixed inclusions, i.e. both inclusions with a higher as well as inclusions with a lower conductivity than the background medium. In addition, we derive a new method to compute the conductivity inside inclusions …
This collection of science fiction writings by Jayant V. Narlikar offers readers a unique glimpse into the world-famous Indian astrophysicist’s vivid and highly imaginative concepts and stories. The fictional material comprises a witty short story ("The rare idol of Ganesha") that cleverly explores the possible consequences of a mirror-symmetric individual in the context of cricket test ma…
This book constitutes the proceedings of the 12th International Conference on the Integration of Artificial Intelligence (AI) and Operations Research (OR) Techniques in Constraint Programming, CPAIOR 2015, held in Barcelona, Spain, in May 2015. The 29 papers presented together with 8 short papers in this volume were carefully reviewed and selected from 90 submissions. The purpose of the confere…
This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated. To that end, the book employs principal-agent theory and the concepts of bounded rationality and social embeddedness. Beyond advancing IS research, the findings presented can greatly benefit governments, IT departm…