This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the book presents the authors’ twenty-five years of …
Software has changed the rules of the game. The world talks about the digitalization in industry and society – how the focus has shifted from producing tangible things towards software and services. This trend started many years ago, but is now affecting every company, whether it’s a software company or not. There are many companies that have already made a digitalization journey – and ma…
This book offers a concise and gentle introduction to finite element programming in Python based on the popular FEniCS software library. Using a series of examples, including the Poisson equation, the equations of linear elasticity, the incompressible Navier–Stokes equations, and systems of nonlinear advection–diffusion–reaction equations, it guides readers through the essential steps to …
Ontologies and semantic metadata can theoretically solve all problems of traditional full-text search engines. In practice, however, they are always imperfect. This work analyzed whether the negative effect of ontology imperfection is higher than the positive effect of exploiting the ontology features for IR. To answer this question, a complete ontology-based information retrieval system was im…
Ranking - the algorithmic decision on how relevant an information artifact is for a given information need and the sorting of artifacts by their concluded relevancy - is an integral part of every search engine. In this book we investigate how structured Web data can be leveraged for ranking with the goal to improve the effectiveness of search. We propose new solutions for ranking using on-the-f…
Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeg…
The Handbook of Simulation Optimization presents an overview of the state of the art of simulation optimization, providing a survey of the most well-established approaches for optimizing stochastic simulation models and a sampling of recent research advances in theory and methodology. Leading contributors cover such topics as discrete optimization via simulation, ranking and selection, efficien…
As well as updating the manifesto for an audio photography technology and practice, this book addresses issues in design history, the social shaping of technology and the management of innovation. In particular, it reveals the very different timescales over which design and innovation operate, and the way in which design ideas evolve across different research groups, companies and application a…
This book represents an attempt to fully review the phenomenon of the blogosphere. The intention is to provide a reliable guide to understanding and analyzing the world of the unimaginable number of diverse blogs, each consisting of innumerable posts, which in their entirety form the blogosphere. We go on to answer the questions of how to grasp the complexity of the blogosphere and extract usef…
E-learning has brought an enormous change to instruction, in terms of both rules and tools. Contemporary education requires diverse and creative uses of media technology to keep students engaged and to keep up with rapid developments in the ways they learn and teachers teach. Media Rich Instruction addresses these requirements with up-to-date learning theory and practices that incorporate inno…