This open access book was prepared as a Final Publication of the COST Action IC1406 “High-Performance Modelling and Simulation for Big Data Applications (cHiPSet)“ project. Long considered important pillars of the scientific method, Modelling and Simulation have evolved from traditional discrete numerical methods to complex data-intensive continuous analytical optimisations. Resolution, sc…
This open access book introduces how to manage important tasks in industrial wireless networks. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executedfirst so th…
This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, res…
This open access book gives a complete and comprehensive introduction to the fields of medical imaging systems, as designed for a broad range of applications. The authors of the book first explain the foundations of system theory and image processing, before highlighting several modalities in a dedicated chapter. The initial focus is on modalities that are closely related to traditional camera …
This open access book was prepared as a Final Publication of the COST Action IC1303 “Algorithms, Architectures and Platforms for Enhanced Living Environments (AAPELE)”. The concept of Enhanced Living Environments (ELE) refers to the area of Ambient Assisted Living (AAL) that is more related with Information and Communication Technologies (ICT). Effective ELE solutions require appropriate IC…
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author’s experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Risk and Information Security provides thoug…
This open access collection of AI ethics case studies is the first book to present real-life case studies combined with commentaries and strategies for overcoming ethical challenges. Case studies are one of the best ways to learn about ethical dilemmas and to achieve insights into various complexities and stakeholder perspectives. Given the omnipresence of AI ethics in academic, policy and medi…
In this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs and requirements. And they will discover the business perspective and how big data technology can be exploited to deliver value within different se…
This Open Access book aims to present practical contributions to the ethics governance framework, the conceptualization and characteristics of ethics tools, as well as the experience gained from their application in different institutions. Its main objective is to provide a practical and useful guide that will help other institutions to start introducing Research Ethics effectively in their or…
This open access book surveys the progress in addressing selected challenges related to the growth of big data in combination with increasingly complicated hardware. It emerged from a research program established by the German Research Foundation (DFG) as priority program SPP 1736 on Algorithmics for Big Data where researchers from theoretical computer science worked together with application …