The two-volume set LNCS 9279 and 9280 constitutes the refereed proceedings of the 18th International Conference on Image Analysis and Processing, ICIAP 2015, held in Genoa, Italy, in September 2015. The 129 papers presented were carefully reviewed and selected from 231 submissions. The papers are organized in the following seven topical sections: video analysis and understanding, multiview geom…
This book constitutes the refereed proceedings of the 19th Scandinavian Conference on Image Analysis, SCIA 2015, held in Copenhagen, Denmark, in June 2015. The 45 revised papers presented were carefully reviewed and selected from 67 submissions. The contributions are structured in topical sections on novel applications of vision systems, pattern recognition, machine learning, feature extraction…
Build an enterprise search engine using Apache Solr: index and search documents; ingest data from varied sources; apply various text processing techniques; utilize different search capabilities; and customize Solr to retrieve the desired results. Apache Solr: A Practical Approach to Enterprise Search explains each essential concept-backed by practical and industry examples--to help you attain e…
Programming patterns are solutions to problems that require the creation of a small fragment of code that will be part of a larger program. Hence, this book is about teaching you how to write such fragments of code. However, it is not about teaching you the syntax of the statements in the fragments, it assumes that you already know the syntax. Instead, it is about finding solutions to problems …
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Financial Cryptography and Data Security, FC 2014, held in San Juan, Puerto Rico, in January 2015. The 23 revised full papers and 10 short papers were carefully selected and reviewed from 102 full papers submissions. The papers are grouped in the following topical sections: sidechan…
This monograph presents original research results on selected problems of dependability in contemporary Complex Information Systems (CIS). The ten chapters are concentrated around the following three aspects: methods for modelling of the system and its components, tasks? or in more generic and more adequate interpretation, functionalities? accomplished by the system and conditions for their cor…
This text is a practical guide for linguists, and programmers, who work with data in multilingual computational environments. We introduce the basic concepts needed to understand how writing systems and character encodings function, and how they work together at the intersection between the Unicode Standard and the International Phonetic Alphabet. Although these standards are often met with fru…
This book constitutes the refereed proceedings of the First International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2015, held in Nanjing, China, in November 2015. The 20 full papers presented together with 3 invited talks were carefully reviewed and selected from 60 submissions. The papers are organized on topical sections on probabilistic systems; …
This course-tested textbook describes the design and implementation of operating systems, and applies it to the MTX operating system, a Unix-like system designed for Intel x86 based PCs. Written in an evolutional style, theoretical and practical aspects of operating systems are presented as the design and implementation of a complete operating system is demonstrated. Throughout the text, comple…
This book presents perspectives for and by teachers, school and university administrators and educational researchers regarding the great impact pen and tablet technology can have on classrooms and education. presents three distinctly valuable threads of research: Emerging technologies and cutting-edge software invented by researchers and evaluated through real classroom deployments. Fir…