Robustly maintaining balance on two legs is an important challenge for humanoid robots. The work presented in this book represents a contribution to this area. It investigates efficient methods for the decision-making from internal sensors about whether and where to step, several improvements to efficient whole-body postural balancing methods, and proposes and evaluates a novel method for effic…
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates for reusable knowledge. These templates capture reusable knowledge formally and can efficiently be integrated in architectural analyses.
This work develops highly efficient algorithms for analyzing large images. Applications include object-based change detection and screening. The algorithms are 10-100 times as fast as existing software, sometimes even outperforming FGPA/GPU hardware, because they are designed to suit the computer architecture. This thesis describes the implementation details and the underlying algorithm enginee…
Learning by reflection is one of the core processes for improving work performance. We provide a novel approach for reflective learning support by transferring and adapting practices from the Quantified Self to workplace settings. This book contributes with an integrated model for technical support of reflective learning, mobile and web-based applications designed for quantifying and gathering …
The topic of this work are two further developments of the Factorization method for electrical impedance tomography.We present a modification of this method that is capable of detecting mixed inclusions, i.e. both inclusions with a higher as well as inclusions with a lower conductivity than the background medium. In addition, we derive a new method to compute the conductivity inside inclusions …
This collection of science fiction writings by Jayant V. Narlikar offers readers a unique glimpse into the world-famous Indian astrophysicist’s vivid and highly imaginative concepts and stories. The fictional material comprises a witty short story ("The rare idol of Ganesha") that cleverly explores the possible consequences of a mirror-symmetric individual in the context of cricket test ma…
This book constitutes the proceedings of the 12th International Conference on the Integration of Artificial Intelligence (AI) and Operations Research (OR) Techniques in Constraint Programming, CPAIOR 2015, held in Barcelona, Spain, in May 2015. The 29 papers presented together with 8 short papers in this volume were carefully reviewed and selected from 90 submissions. The purpose of the confere…
This book develops, evaluates and refines a cloud service relationship theory that explains how cloud users' uncertainties arise in these relationships and how they can be mitigated. To that end, the book employs principal-agent theory and the concepts of bounded rationality and social embeddedness. Beyond advancing IS research, the findings presented can greatly benefit governments, IT departm…
Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially…
This volume is a selection of written notes corresponding to courses taught at the CIMPA School: "New Trends in Applied Harmonic Analysis: Sparse Representations, Compressed Sensing and Multifractal Analysis". New interactions between harmonic analysis and signal and image processing have seen striking development in the last 10 years, and several technological deadlocks have been solved throug…