Marknadens största urval
Snabb leverans

Böcker i SpringerBriefs in Computer Science-serien

Filter
Filter
Sortera efterSortera Serieföljd
  • av Pedro Mejia Alvarez
    606,-

    This book presents the fundamentals of exception handling with examples written in C++ and Python. Starting with its history and evolution, it explores the many facets of exception handling, such as its syntax, semantics, challenges, best practices, and implementation patterns.The book is composed of five chapters: Chapter 1 provides an introduction, covering the history, various definitions, and challenges of exception handling. Chapter 2 then delves into the basics, offering insights into the foundational concepts and techniques. Subsequently, chapter 3 touches upon the best practices for exception handling, including the differences between errors and exceptions, the use of assertions, and how to provide meaningful error messages. Chapter 4 takes a deep dive into advanced exception-handling techniques, exploring e.g. patterns, guard clauses, and hierarchical exception handling. Eventually, chapter 5 focuses on the complexities of exception handling in real-time and embedded systems.This book is mainly written for both students and professionals. Its readers will understand the nuances between syntax and semantic errors, learn how to employ try-catch blocks effectively, grasp the importance of logging exceptions, and delve into advanced exception-handling techniques. This way, they will be enabled to handle exceptions effectively and thus write more robust, reliable, and resilient code.

  • av Romano Fantacci
    606,-

    This book provides a comprehensive and systematic exploration of next-generation Edge Intelligence (EI) Networks. It delves deep into the critical design considerations within this context, emphasizing the necessity for functional and dependable interactions between networking strategies and the diverse application scenarios. This should help assist to encompass a wide range of environments.This book also discusses topics such as resource optimization, incentive mechanisms, channel prediction and cutting-edge technologies, which includes digital twins and advanced machine learning techniques. It underscores the importance of functional integration to facilitate meaningful collaborations between networks and systems, while operating across heterogeneous environments aiming support novel and disruptive human-oriented services and applications. Valuable insights into the stringent requirements for intelligence capabilities, communication latency and real-time response are discussed. This characterizes the new EI era, driving the creation of comprehensive cross-domain architectural ecosystems that infuse human-like intelligence into every aspect of emerging EI systems.This book primarily targets advanced-level students as well as postdoctoral researchers, who are new to this field and are searching for a comprehensive understanding of emerging EI systems. Practitioners seeking guidance in the development and implementation of EI systems in practical contexts will also benefit from this book.

  • av Max Smith-Creasey
    606,-

    This book offers an overview of the field of continuous biometric authentication systems, which capture and continuously authenticate biometrics from user devices. This book first covers the traditional methods of user authentication and discusses how such techniques have become cumbersome in the world of mobile devices and short usage sessions. The concept of continuous biometric authentication systems is introduced and their construction is discussed. The different biometrics that these systems may utilise (e.g.: touchscreen-gesture interactions) are described and relevant studies surveyed. It also surveys important considerations and challenges.This book brings together a wide variety of key motivations, components and advantages of continuous biometric authentication systems. The overview is kept high level, so as not to limit the scope to any single device, biometric trait, use-case, or scenario. Therefore, the contents of this book are applicable todevices ranging from smartphones to desktop computers, utilising biometrics ranging from face recognition to keystroke dynamics. It also provides metrics from a variety of existing systems such that users can identify the advantages and disadvantages of different approaches.This book targets researchers and lecturers working in authentication, as well as advanced-level students in computer science interested in this field. The book will also be of interest to technical professionals working in cyber security.

  • av Bin Duo
    606,-

    This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.

  • av Pedro Mejia Alvarez
    606,-

    This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, designing, and implementing them.To this end, the book is composed of four chapters: Chapter 1 ¿An Overview of Real-Time Database Systems¿ delves into the realm of RTDBs and discusses the specific requirements, transaction models, and scheduling algorithms that set RTDBs apart from conventional DBMs. Chapter 2 on ¿Experimental Real-Time Databases¿ presents various experimental RTDBs developed in academia with their architectures, features, and implementations, while chapter 3 on ¿Commercial Real-Time Databases¿ does so for systems developed and offered by commercial vendors as products or services. Eventually, chapter 4 on ¿Applications of Real-Time Database Systems¿ showcases various applications of RTDBs across different domains.This book will help researchers, graduate students and advanced professionals to get anoverview of the area and to understand the main challenges and systems available.

  • av Jiadi Yu
    540,-

    As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.Therefore, it is necessary to address the issues and build integrated systems for user authentication using WiFi signals. In this book, the development and progress of WiFi signal-based user authentication systems in extensive scenarios are presented, which provides a new direction and solution for ubiquitous security and privacy protection. This book gives strong motivation of leveraging WiFi signals to sense human activities for user authentication, and presents the keyissues of WiFi-based user authentication in diversified behaviors and complex scenarios. This book provides the approaches for digging WiFi signals to sense human activities and extract features, realizing user authentication under fine-grained finger gestures, undefined body gestures, and multi-user scenarios. State-of-the-art researches and future directions involved with WiFi signal-based user authentication are presented and discussed as well. This book will benefit researchers and practitioners in the related field.

  • av Xin Luo
    606,-

    This book mainly shows readers how to calibrate and control robots. In this regard, it proposes three control schemes: an error-summation enhanced Newton algorithm for model predictive control; RNN for solving perturbed time-varying underdetermined linear systems; and a new joint-drift-free scheme aided with projected ZNN, which can effectively improve robot control accuracy. Moreover, the book develops four advanced algorithms for robot calibration ¿ Levenberg-Marquarelt with diversified regularizations; improved covariance matrix adaptive evolution strategy; quadratic interpolated beetle antennae search algorithm; and a novel variable step-size Levenberg-Marquardt algorithm ¿ which can effectively enhance robot positioning accuracy.In addition, it is exceedingly difficult for experts in other fields to conduct robot arm calibration studies without calibration data. Thus, this book provides a publicly available dataset to assist researchers from other fields in conductingcalibration experiments and validating their ideas. The book also discusses six regularization schemes based on its robot error models, i.e., L1, L2, dropout, elastic, log, and swish. Robots¿ positioning accuracy is significantly improved after calibration. Using the control and calibration methods developed here, readers will be ready to conduct their own research and experiments.

  • av Philippe Besnard & Thomas Guyet
    606,-

    This book is intended as an introduction to a versatile model for temporal data. It exhibits an original lattice structure on the space of chronicles and proposes new counting approach for multiple occurrences of chronicle occurrences. This book also proposes a new approach for frequent temporal pattern mining using pattern structures. This book was initiated by the work of Ch. Dousson in the 1990¿s. At that time, the prominent format was Temporal Constraint Networks for which the article by Richter, Meiri and Pearl is seminal.Chronicles do not conflict with temporal constraint networks, they are closely related. Not only do they share a similar graphical representation, they also have in common a notion of constraints in the timed succession of events. However, chronicles are definitely oriented towards fairly specific tasks in handling temporal data, by making explicit certain aspects of temporal data such as repetitions of an event. The notion of chronicle has been applied both for situation recognition and temporal sequence abstraction. The first challenge benefits from the simple but expressive formalism to specify temporal behavior to match in a temporal sequence. The second challenge aims to abstract a collection of sequences by chronicles with the objective to extract characteristic behaviors.This book targets researchers and students in computer science (from logic to data science). Engineers who would like to develop algorithms based on temporal models will also find this book useful.

  • av Showmik Bhowmik
    606,-

    Document layout analysis (DLA) is a crucial step towards the development of an effective document image processing system. In the early days of document image processing, DLA was not considered as a complete and complex research problem, rather just a pre-processing step having some minor challenges. The main reason for that is the type of layout being considered for processing was simple. Researchers started paying attention to this complex problem as they come across a large variety of documents. This book presents a clear view of the past, present, and future of DLA, and it also discusses two recent methods developed to address the said problem.

  • av Hua Xu
    606,-

    Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In addition to helping readers master the key technologies and concepts of human-machine dialogue intention analysis and catch up on the latest advances, it includes valuable references for further research.

  • av Kaishun Wu
    606,-

    This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows heterogeneous devices to adopt proper transmission strategies. Second, the authors present two cross-technology interference management mechanisms in both the time domain and the frequency domain, which can mitigate interference and increase transmission opportunities for heterogeneous devices, thus improving network performance. Third, they present a cross-technology communication mechanism basedon symbol-level energy modulation, which allows heterogeneous devices to transmit information directly without a gateway, improving transmission efficiency and paving the way for new applications in IoT scenarios. Lastly, they outline several potential research directions to further improve the efficiency of cross-technology coexistence. This book is intended for researchers, computer scientists, and engineers who are interested in the research areas of wireless networking, wireless communication, mobile computing, and Internet of Things. Advanced-level students studying these topics will benefit from the book as well.

  • av Giancarlo Succi & Artem Kruglov
    496,-

    This open access book provides information how to choose and collect the appropriate metrics for a software project in an organization. There are several kinds of metrics, based on the analysis of source code and developed for different programming paradigms such as structured programming and object-oriented programming (OOP). This way, the book follows three main objectives: (i) to identify existing and easily-collectible measures, if possible in the early phases of software development, for predicting and modeling both the traditional attributes of software systems and attributes specifically related to their efficient use of resources, and to create new metrics for such purposes; (ii) to describe ways to collect these measures during the entire lifecycle of a system, using minimally-invasive monitoring of design-time processes, and consolidate them into conceptual frameworks able to support model building by using a variety of approaches, including statistics, data mining and computational intelligence; and (iii) to present models and tools to support design time evolution of systems based on design-time measures and to empirically validate them.The book provides researchers and advanced professionals with methods for understanding the full implications of alternative choices and their relative attractiveness in terms of enhancing system resilience. It also explores the simultaneous use of multiple models that reflect different system interpretations or stakeholder perspectives.

  • av Liang Wang
    606,-

    Although deep learning models have achieved great progress in vision, speech, language, planning, control, and many other areas, there still exists a large performance gap between deep learning models and the human cognitive system. Many researchers argue that one of the major reasons accounting for the performance gap is that deep learning models and the human cognitive system process visual information in very different ways.To mimic the performance gap, since 2014, there has been a trend to model various cognitive mechanisms from cognitive neuroscience, e.g., attention, memory, reasoning, and decision, based on deep learning models. This book unifies these new kinds of deep learning models and calls them deep cognitive networks, which model various human cognitive mechanisms based on deep learning models. As a result, various cognitive functions are implemented, e.g., selective extraction, knowledge reuse, and problem solving, for more effective information processing.This book first summarizes existing evidence of human cognitive mechanism modeling from cognitive psychology and proposes a general framework of deep cognitive networks that jointly considers multiple cognitive mechanisms. Then, it analyzes related works and focuses primarily but not exclusively, on the taxonomy of four key cognitive mechanisms (i.e., attention, memory, reasoning, and decision) surrounding deep cognitive networks. Finally, this book studies two representative cases of applying deep cognitive networks to the task of image-text matching and discusses important future directions.

  • av Mushu Li
    600,-

    This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative use cases in IoV, i.e., safety message broadcast and autonomous driving, the authors propose link-layer protocol design and application-layer computing task scheduling to achieve the objective given the unique characteristics and requirements of IoV. In particular, this book illustrates the challenges of resource management for IoV due to network dynamics, such as time-varying traffic intensity and vehicle mobility, and presents intelligent resource management solutions to adapt to the network dynamics. The Internet of Vehicles (IoV) enables vehicle-to-everything connectivity and supports a variety of applications for vehicles on the road.Intelligent resource management is critical for satisfying demanding communication and computing requirements on IoV, while the highly dynamic network environments pose challenges to the design of resource management schemes. This book provides insights into the significance of adaptive resource management in improving the performance of IoV. The customized communication protocol and computing scheduling scheme are designed accordingly by taking the network dynamics information as an integral design factor. Moreover, the decentralized designs of the proposed solutions guarantee low signaling overhead and high scalability.A comprehensive literature review summarizing recent resource management schemes in IoV, followed by the customized design of communication and computing solutions for the two IoV use cases is included which can serve as a useful reference for professionals from both academia and industry in the area of IoV and resource management. Researchers working within this field and computer science and electrical engineering students will find this book useful as well.

  • av John Lawrence Nazareth
    670,-

  • av Shuliang Wang, Jianfeng Xu, Zhenyu Liu, m.fl.
    375,-

    Objective Information Theory (OIT) is proposed to represent and compute the information in a large-scale complex information system with big data in this monograph. To formally analyze, design, develop, and evaluate the information, OIT interprets the information from essential nature, measures the information from mathematical properties, and models the information from concept, logic, and physic. As the exemplified applications, Air Traffic Control System (ATCS) and Smart Court SoSs (System of Systems) are introduced for practical OITs. This Open Access book can be used as a technical reference book in the field of information science and also a reference textbook for senior students and graduate ones in related majors.

  • av Bernard Chen
    616,-

    Wineinformatics is a new data science application with a focus on understanding wine through artificial intelligence. Thousands of new wine reviews are produced monthly, which benefits the understanding of wine through wine experts for winemakers and consumers. This book systematically investigates how to process human language format reviews and mine useful knowledge from a large volume of processed data.This book presents a human language processing tool named Computational Wine Wheel to process professional wine reviews and three novel Wineinformatics studies to analyze wine quality, price and reviewers. Through the lens of data science, the author demonstrates how the wine receives 90+ scores out of 100 points from Wine Spectator, how to predict a wine's specific grade and price through wine reviews and how to rank a group of wine reviewers. The book also shows the advanced application of the Computational Wine Wheel to capture more information hidden in wine reviews and the possibility of extending the wheel to coffee, tea beer, sake and liquors.This book targets computer scientists, data scientists and wine industrial researchers, who are interested in Wineinformatics. Senior data science undergraduate and graduate students may also benefit from this book.

  • av Di Wu
    616,-

    Incomplete big data are frequently encountered in many industrial applications, such as recommender systems, the Internet of Things, intelligent transportation, cloud computing, and so on. It is of great significance to analyze them for mining rich and valuable knowledge and patterns. Latent feature analysis (LFA) is one of the most popular representation learning methods tailored for incomplete big data due to its high accuracy, computational efficiency, and ease of scalability. The crux of analyzing incomplete big data lies in addressing the uncertainty problem caused by their incomplete characteristics. However, existing LFA methods do not fully consider such uncertainty.In this book, the author introduces several robust latent feature learning methods to address such uncertainty for effectively and efficiently analyzing incomplete big data, including robust latent feature learning based on smooth L1-norm, improving robustness of latent feature learning using L1-norm, improving robustness of latent feature learning using double-space, data-characteristic-aware latent feature learning, posterior-neighborhood-regularized latent feature learning, and generalized deep latent feature learning. Readers can obtain an overview of the challenges of analyzing incomplete big data and how to employ latent feature learning to build a robust model to analyze incomplete big data. In addition, this book provides several algorithms and real application cases, which can help students, researchers, and professionals easily build their models to analyze incomplete big data.

  • av Zehua Guo
    670,-

    Emerging machine learning techniques bring new opportunities to flexible network control and management. This book focuses on using state-of-the-art machine learning-based approaches to improve the performance of Software-Defined Networking (SDN). It will apply several innovative machine learning methods (e.g., Deep Reinforcement Learning, Multi-Agent Reinforcement Learning, and Graph Neural Network) to traffic engineering and controller load balancing in software-defined wide area networks, as well as flow scheduling, coflow scheduling, and flow migration for network function virtualization in software-defined data center networks. It helps readers reflect on several practical problems of deploying SDN and learn how to solve the problems by taking advantage of existing machine learning techniques. The book elaborates on the formulation of each problem, explains design details for each scheme, and provides solutions by running mathematical optimization processes, conducting simulated experiments, and analyzing the experimental results.

  • av Ye Yuan
    606,-

    Latent factor analysis models are an effective type of machine learning model for addressing high-dimensional and sparse matrices, which are encountered in many big-data-related industrial applications. The performance of a latent factor analysis model relies heavily on appropriate hyper-parameters. However, most hyper-parameters are data-dependent, and using grid-search to tune these hyper-parameters is truly laborious and expensive in computational terms. Hence, how to achieve efficient hyper-parameter adaptation for latent factor analysis models has become a significant question.This is the first book to focus on how particle swarm optimization can be incorporated into latent factor analysis for efficient hyper-parameter adaptation, an approach that offers high scalability in real-world industrial applications.The book will help students, researchers and engineers fully understand the basic methodologies of hyper-parameter adaptation via particle swarm optimization in latent factor analysis models. Further, it will enable them to conduct extensive research and experiments on the real-world applications of the content discussed.

  • av Chen Ye
    670,-

    This book addresses several knowledge discovery problems on multi-sourced data where the theories, techniques, and methods in data cleaning, data mining, and natural language processing are synthetically used. This book mainly focuses on three data models: the multi-sourced isomorphic data, the multi-sourced heterogeneous data, and the text data. On the basis of three data models, this book studies the knowledge discovery problems including truth discovery and fact discovery on multi-sourced data from four important properties: relevance, inconsistency, sparseness, and heterogeneity, which is useful for specialists as well as graduate students. Data, even describing the same object or event, can come from a variety of sources such as crowd workers and social media users. However, noisy pieces of data or information are unavoidable. Facing the daunting scale of data, it is unrealistic to expect humans to "e;label"e; or tell which data source is more reliable. Hence, it is crucial to identify trustworthy information from multiple noisy information sources, referring to the task of knowledge discovery. At present, the knowledge discovery research for multi-sourced data mainly faces two challenges. On the structural level, it is essential to consider the different characteristics of data composition and application scenarios and define the knowledge discovery problem on different occasions. On the algorithm level, the knowledge discovery task needs to consider different levels of information conflicts and design efficient algorithms to mine more valuable information using multiple clues. Existing knowledge discovery methods have defects on both the structural level and the algorithm level, making the knowledge discovery problem far from totally solved.

  • av Guoming Tang
    680,-

    The 5G technology has been commercialized worldwide and is expected to provide superior performance with enhanced mobile broadband, ultra-low latency transmission, and massive IoT connections. Meanwhile, the edge computing paradigm gets popular to provide distributed computing and storage resources in proximity to the users. As edge services and applications prosper, 5G and edge computing will be tightly coupled and continuously promote each other forward.Embracing this trend, however, mobile users, infrastructure providers, and service providers are all faced with the energy dilemma. On the user side, battery-powered mobile devices are much constrained by battery life, whereas mobile platforms and apps nowadays are usually power-hungry. At the infrastructure and service provider side, the energy cost of edge facilities accounts for a large proportion of operating expenses and has become a huge burden.This book provides a collection of most recent attempts to tackle the energy issues in mobile edge computing from new and promising perspectives. For example, the book investigates the pervasive low-battery anxiety among modern mobile users and quantifies the anxiety degree and likely behavior concerning the battery status. Based on the quantified model, a low-power video streaming solution is developed accordingly to save mobile devices' energy and alleviate users' low-battery anxiety. In addition to energy management for mobile users, the book also looks into potential opportunities to energy cost saving and carbon emission reduction at edge facilities, particularly the 5G base stations and geo-distributed edge datacenters.

  • av Carol Smidts
    606,-

    This SpringerBrief presents a brief introduction to probabilistic risk assessment (PRA), followed by a discussion of abnormal event detection techniques in industrial control systems (ICS). It also provides an introduction to the use of game theory for the development of cyber-attack response models and a discussion on the experimental testbeds used for ICS cyber security research. The probabilistic risk assessment framework used by the nuclear industry provides a valid framework to understand the impacts of cyber-attacks in the physical world. An introduction to the PRA techniques such as fault trees, and event trees is provided along with a discussion on different levels of PRA and the application of PRA techniques in the context of cybersecurity. A discussion on machine learning based fault detection and diagnosis (FDD) methods and cyber-attack detection methods for industrial control systems are introduced in this book as well.A dynamic Bayesian networks based method that can be used to detect an abnormal event and classify it as either a component fault induced safety event or a cyber-attack is discussed. An introduction to the stochastic game formulation of the attacker-defender interaction in the context of cyber-attacks on industrial control systems to compute optimal response strategies is presented. Besides supporting cyber-attack response, the analysis based on the game model also supports the behavioral study of the defender and the attacker during a cyber-attack, and the results can then be used to analyze the risk to the system caused by a cyber-attack. A brief review of the current state of experimental testbeds used in ICS cybersecurity research and a comparison of the structures of various testbeds and the attack scenarios supported by those testbeds is included. A description of a testbed for nuclear power applications, followed by a discussion on the design of experiments that can be carried out on the testbed and the associated results is covered as well.This SpringerBrief  is a useful resource tool for researchers working in the areas of cyber security for industrial control systems, energy systems and cyber physical systems. Advanced-level students that study these topics will also find this SpringerBrief useful as a study guide.

  • av Marwan Omar
    556,-

    This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks.This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program's behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well.This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques.The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.

  • av Timothy Kieras
    686,-

    This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation.This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems.The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT  These topics are supported by up-to-date summaries of the authors' recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development.This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.

  • av Guangtao Xue
    686,-

    This book investigates compressive sensing techniques to provide a robust and general framework for network data analytics. The goal is to introduce a compressive sensing framework for missing data interpolation, anomaly detection, data segmentation and activity recognition, and to demonstrate its benefits. Chapter 1 introduces compressive sensing, including its definition, limitation, and how it supports different network analysis applications. Chapter 2 demonstrates the feasibility of compressive sensing in network analytics, the authors we apply it to detect anomalies in the customer care call dataset from a Tier 1 ISP in the United States. A regression-based model is applied to find the relationship between calls and events. The authors illustrate that compressive sensing is effective in identifying important factors and can leverage the low-rank structure and temporal stability to improve the detection accuracy. Chapter 3  discusses that there are several challenges in applying compressive sensing to real-world data. Understanding the reasons behind the challenges is important for designing methods and mitigating their impact. The authors analyze a wide range of real-world traces. The analysis demonstrates that there are different factors that contribute to the violation of the low-rank property in real data. In particular, the authors find that (1) noise, errors, and anomalies, and (2) asynchrony in the time and frequency domains lead to network-induced ambiguity and can easily cause low-rank matrices to become higher-ranked. To address the problem of noise, errors and anomalies in Chap. 4, the authors propose a robust compressive sensing technique. It explicitly accounts for anomalies by decomposing real-world data represented in matrix form into a low-rank matrix, a sparse anomaly matrix, an error term and a small noise matrix. Chapter 5 addresses the problem of lack of synchronization, and the authors propose a data-driven synchronization algorithm. It can eliminate misalignment while taking into account the heterogeneity of real-world data in both time and frequency domains. The data-driven synchronization can be applied to any compressive sensing technique and is general to any real-world data. The authors illustrates that the combination of the two techniques can reduce the ranks of real-world data, improve the effectiveness of compressive sensing and have a wide range of applications. The networks are constantly generating a wealth of rich and diverse information. This information creates exciting opportunities for network analysis and provides insight into the complex interactions between network entities. However, network analysis often faces the problems of (1) under-constrained, where there is too little data due to feasibility and cost issues in collecting data, or (2) over-constrained, where there is too much data, so the analysis becomes unscalable. Compressive sensing is an effective technique to solve both problems. It utilizes the underlying data structure for analysis. Specifically, to solve the under-constrained problem, compressive sensing technologies can be applied to reconstruct the missing elements or predict the future data.  Also, to solve the over-constraint problem, compressive sensing technologies can be applied to identify significant elementsTo support compressive sensing in network data analysis, a robust and general framework is needed to support diverse applications. Yet this can be challenging for real-world data where noise, anomalies and lack of synchronization are common. First, the number of unknowns for network analysis can be much larger than the number of measurements. For example, traffic engineering requires knowing the complete traffic matrix between all source and destination pairs, in order to properly configure traffic and avoid congestion. However, measuring the flow between all source and destination pairs is very expensive or even infeasible. Reconstructing data from a small number of measurements is an underconstrained problem. In addition, real-world data is complex and heterogeneous, and often violate the low-level assumptions required by existing compressive sensing techniques. These violations significantly reduce the applicability and effectiveness of existing compressive sensing methods. Third, synchronization of network data reduces the data ranks and increases spatial locality. However, periodic time series exhibit not only misalignment but also different frequencies, which makes it difficult to synchronize data in the time and frequency domains.The primary audience for this book is data engineers, analysts and researchers, who need to deal with big data with missing anomalous and synchronization problems. Advanced level students focused on compressive sensing techniques will also benefit from this book as a reference.

  • av Marwan Omar
    686,-

    This SpringerBrief presents the underlying principles of machine learning and how to deploy various deep learning tools and techniques to tackle and solve certain challenges facing the cybersecurity industry.By implementing innovative deep learning solutions, cybersecurity researchers, students and practitioners can analyze patterns and learn how to prevent cyber-attacks and respond to changing malware behavior. The knowledge and tools introduced in this brief can also assist cybersecurity teams to become more proactive in preventing threats and responding to active attacks in real time. It can reduce the amount of time spent on routine tasks and enable organizations to use their resources more strategically. In short, the knowledge and techniques provided in this brief can help make cybersecurity simpler, more proactive, less expensive and far more effectiveAdvanced-level students in computer science studying machine learning with a cybersecurity focus will find this SpringerBrief useful as a study guide. Researchers and cybersecurity professionals focusing on the application of machine learning tools and techniques to the cybersecurity domain will also want to purchase this SpringerBrief.

  • av Pedro Mejia Alvarez
    680,-

    This book provides basic knowledge about main memory management in relational databases as it is needed to support large-scale applications processed completely in memory. In business operations, real-time predictability and high speed is a must. Hence every opportunity must be exploited to improve performance, including reducing dependency on the hard disk, adding more memory to make more data resident in the memory, and even deploying an in-memory system where all data can be kept in memory.The book provides one chapter for each of the main related topics, i.e. the memory system, memory management, virtual memory, and databases and their memory systems, and it is complemented by a short survey of six commercial systems: TimesTen, MySQL, VoltDB, Hekaton, HyPer/ScyPer, and SAP HANA.

  • av Wanja Zaeske
    686,-

    This Springer Brief presents a selection of tools and techniques which either enable or improve the use of DevOps for airborne software engineering. They are evaluated against the unique challenges of the aviation industry such as safety and airworthiness, and exercised using a demonstrator in order to gather first experience.The book is structured as follows: after a short introduction to the main topics of the work in chapter 1, chapter 2 provides more information on the tools, techniques, software and standards required to implement the subsequently presented ideas. In particular, the development practice BDD, the relation between DevOps, CI & CD and both the Rust & the Nix programming language are introduced. In chapter 3 the authors explain and justify their ideas towards advancing the state of the art, mapping the aforementioned tools and techniques to the DevOps Cycle while considering aspects of Do-178C. Next, in chapter 4 the experiences gathered while implementing a demonstrator using the tools and techniques are described. Eventually, chapter 5 briefly summarizes the findings and presents a compilation of open points and missing pieces which are yet to be resolved.The book targets three different reader groups. The first one are development managers from the aerospace industry who need to see examples and experience reports for the application of DevOps for airborne software. The second group are investigators in the safety-critical embedded systems domain who look for benchmarks at various application domains. And the third group are lecturers who offer graduate level software engineering courses for safety-critical software engineering.

  • av Yixiang Fang
    556,-

    This SpringerBrief provides the first systematic review of the existing works of cohesive subgraph search (CSS) over large heterogeneous information networks (HINs). It also covers the research breakthroughs of this area, including models, algorithms and comparison studies in recent years. This SpringerBrief offers a list of promising future research directions of performing CSS over large HINs.The authors first classify the existing works of CSS over HINs according to the classic cohesiveness metrics such as core, truss, clique, connectivity, density, etc., and then extensively review the specific models and their corresponding search solutions in each group. Note that since the bipartite network is a special case of HINs, all the models developed for general HINs can be directly applied to bipartite networks, but the models customized for bipartite networks may not be easily extended for other general HINs due to their restricted settings. The authors also analyze and compare these cohesive subgraph models (CSMs) and solutions systematically. Specifically, the authors compare different groups of CSMs and analyze both their similarities and differences, from multiple perspectives such as cohesiveness constraints, shared properties, and computational efficiency. Then, for the CSMs in each group, the authors further analyze and compare their model properties and high-level algorithm ideas.This SpringerBrief targets researchers, professors, engineers and graduate students, who are working in the areas of graph data management and graph mining. Undergraduate students who are majoring in computer science, databases, data and knowledge engineering, and data science will also want to read this SpringerBrief.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.