Drawing on the authors' more than six years of R&D in location-based information systems (LBIS) as well as their participation in defining the Java ME Location API 2.0, Location-Based Information Systems: Developing Real-Time Tracking Applications provides information and examples for creating real-time LBIS based on GPS-enabled cellular phones
agile software development; lean development; scrum; project management; software development
A laboratory study that investigates how algorithms come into existence. Algorithms—often associated with the terms big data, machine learning, or artificial intelligence—underlie the technologies we use every day, and disputes over the consequences, actual or potential, of new algorithms arise regularly. In this book, Florian Jaton offers a new way to study computerized methods, providi…
The open access edition of this book was made possible by generous funding from Arcadia – a charitable fund of Lisbet Rausing and Peter Baldwin. A new wave of enthusiasm for smart cities, urban data, and the Internet of Things has created the impression that computation can solve almost any urban problem. Subjecting this claim to critical scrutiny, in this book, Andrés Luque-Ayala and Sim…
How Bulgaria transformed the computer industry behind the Iron Curtain—and the consequences of that transformation for a society that dreamt of a brighter future. Bulgaria in 1963 was a communist country led by a centralized party trying to navigate a multinational Cold War. The state needed money, and it sought prestige. By cultivating a burgeoning computer industry, Bulgaria achieved bot…
Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This important volume provides a holistic understanding of the cultural, psychological, neurological and biological elements involved in human facial expressions and of computational models in the analyses of expressions. It includes methodological and technical discussions by leading scholars across the world on the subject. Automated and manual analysis of facial expressions, involving cultur…
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gain…
Packed with real-world examples, industry insights and practical activities, this textbook is designed to teach machine learning in a way that is easy to understand and apply. It assumes only a basic knowledge of technology, making it an ideal resource for students and professionals, including those who are new to computer science. All the necessary topics are covered, including supervised and …