OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 477 from your keywords: subject="Computer Science"
First Page Previous 1 2 3 4 5 Next Last Page
cover
Signal processing : a mathematical approach
Comment Share
Byrne, Charles L.

Signal Processing: A Mathematical Approach is designed to show how many of the mathematical tools the reader knows can be used to understand and employ signal processing techniques in an applied environment. Assuming an advanced undergraduate- or graduate-level understanding of mathematics-including familiarity with Fourier series, matrices, probab

Edition
-
ISBN/ISSN
9780429158711
Collation
439 p
Series Title
-
Call Number
001 BYR s
Availability1
Add to basket
MARC DownloadCite
cover
Genetic algorithms and genetic programming: modern concepts and practical app…
Comment Share
Affenzeller, Michael

Genetic Algorithms and Genetic Programming: Modern Concepts and Practical Applications discusses algorithmic developments in the context of genetic algorithms (GAs) and genetic programming (GP). It applies the algorithms to significant combinatorial optimization problems and describes structure identification using HeuristicLab as a platform for al

Edition
-
ISBN/ISSN
9780429141973
Collation
379 p
Series Title
-
Call Number
001 AFF g
Availability1
Add to basket
MARC DownloadCite
cover
Information Security Governance Simplified : From the Boardroom to the Keyboard
Comment Share
Fitzgerald, Todd

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information i…

Edition
-
ISBN/ISSN
9780429131905
Collation
431 p
Series Title
-
Call Number
001 FIT i
Availability0
Add to basket
MARC DownloadCite
cover
Engineering Systems Integration : Theory, Metrics, and Methods
Comment Share
Langford, Gary O.

ABSTRACT The first book to address the underlying premises of systems integration and how to exposit them into a practical and productive manner, this book prepares systems managers and systems engineers to consider their decisions in light of systems integration metrics. The book addresses two questions: Is there a way to express the interplay of human actions and the result of system interac…

Edition
-
ISBN/ISSN
9780429109744
Collation
406 p
Series Title
-
Call Number
005 LAN e
Availability0
Add to basket
MARC DownloadCite
cover
Foundations of fuzzy logic and semantic web languages
Comment Share
Straccia, Umberto

Managing vagueness/fuzziness is starting to play an important role in Semantic Web research, with a large number of research efforts underway. Foundations of Fuzzy Logic and Semantic Web Languages provides a rigorous and succinct account of the mathematical methods and tools used for representing and reasoning with fuzzy information within Semantic

Edition
-
ISBN/ISSN
9780429109614
Collation
386 p
Series Title
-
Call Number
005 STR f
Availability1
Add to basket
MARC DownloadCite
cover
Improving the Performance of Wireless LANs
Comment Share
Sarkar, Nurul

While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical

Edition
-
ISBN/ISSN
9780429100369
Collation
472 p
Series Title
-
Call Number
005 SAR i
Availability1
Add to basket
MARC DownloadCite
cover
Advanced location-based technologies and services
Comment Share
Karimi, Hassan A.

ABSTRACT Since the publication of the first edition in 2004, advances in mobile devices, positioning sensors, WiFi fingerprinting, and wireless communications, among others, have paved the way for developing new and advanced location-based services (LBSs). This second edition provides up-to-date information on LBSs, including WiFi fingerprinting, mobile computing, geospatial clouds, geospatial…

Edition
-
ISBN/ISSN
9780429098468
Collation
348 p
Series Title
-
Call Number
005 ADV
Availability1
Add to basket
MARC DownloadCite
cover
Unauthorized Access : The Crisis in Online Privacy and Security.
Comment Share
SLOAN, RobertWarner, Richard

Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They…

Edition
-
ISBN/ISSN
9780429093791
Collation
398 p
Series Title
-
Call Number
005 SLO u
Availability1
Add to basket
MARC DownloadCite
cover
Building Better Interfaces for Remote Autonomous Systems: An Introduction for…
Comment Share
Jacob D. OuryFrank E. Ritter

This 'Open Access' SpringerBrief provides foundational knowledge for designing autonomous, asynchronous systems and explains aspects of users relevant to designing for these systems, introduces principles for user-centered design, and prepares readers for more advanced and specific readings. It provides context and the implications for design choices made during the design and development of th…

Edition
-
ISBN/ISSN
978-3-030-47775-2
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Security of Ubiquitous Computing Systems: Selected Topics
Comment Share
Gildas AvoineJulio Hernandez-Castro

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessmen…

Edition
-
ISBN/ISSN
978-3-030-10591-4
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 1 2 3 4 5 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?