The advances of live cell video imaging and high-throughput technologies for functional and chemical genomics provide unprecedented opportunities to understand how biological processes work in subcellular and multicellular systems. The interdisciplinary research field of Video Bioinformatics is defined by Bir Bhanu as the automated processing, analysis, understanding, data mining, visualizati…
How Bulgaria transformed the computer industry behind the Iron Curtain—and the consequences of that transformation for a society that dreamt of a brighter future. Bulgaria in 1963 was a communist country led by a centralized party trying to navigate a multinational Cold War. The state needed money, and it sought prestige. By cultivating a burgeoning computer industry, Bulgaria achieved bot…
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hacker…
This book introduces context-aware computing, providing definitions, categories, characteristics, and context awareness itself and discussing its applications with a particular focus on smart learning environments. It also examines the elements of a context-aware system, including acquisition, modelling, reasoning, and distribution of context. It also reviews applications of context-aware compu…
This book offers an accessible introduction and practical guide to Voice over Internet Protocol (VoIP) technology, providing readers with the know-how to solve the problems encountered in applying VoIP technology across all types of network. It incorporates the latest research findings and brings readers up to date with the challenges that are faced by researchers developing novel applications …
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…
This book covers studies of computational thinking related to linking, infusing, and embedding computational thinking elements to school curricula, teacher education and STEM related subjects. Presenting the distinguished and exemplary works by educators and researchers in the field highlighting the contemporary trends and issues, creative and unique approaches, innovative methods, frameworks, …
Fully updated and expanded from the previous edition, A Practical Guide to Database Design, Second Edition is intended for those involved in the design or development of a database system or application. It begins by illustrating how to develop a Third Normal Form data model where data is placed “where it belongs”. The reader is taken step-by-step through the Normalization process, first us…
The Internet is not an unchartered territory. On the Internet, norms matter. They interact, regulate, are contested and legitimated by multiple actors. But are they diverse and unstructured, or are they part of a recognizable order? And if the latter, what does this order look like? This collected volume explores these key questions while providing new perspectives on the role of law in time…
This book constitutes the refereed proceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2015, held in Mumbai, India, in January 2015. The 24 revised full papers presented were carefully reviewed and selected from 53 submissions. The papers cover a wide range of topics including program verification, model checking, abstract interpr…