000 Computer Science, Information & General Works
Dublin Core
Title
000 Computer Science, Information & General Works
Subject
Computer Science, Information & General Works
Description
Computer Science, Information & General Works
Collection Items
Knowledge For Humans
Knowledge for Humans is a textbook aimed at introducing students to fundamental questions about knowledge and skepticism. Many topics often covered in epistemology textbooks are also covered here, such as radical Cartesian skepticism, phenomenalism,…
Culturally Responsive Computing: An Introduction into Computer Science, Security, and Technology
"Culturally Responsive Computing" is an essential textbook that explores the intricate relationship between technology and global societies. It gives students and professionals a deep understanding of how cultural contexts shape and are shaped by…
Practicing Embodied Thinking in Research and Learning
This book delves into the embodied ground of thinking, illuminating the transition from theorising about the embodied mind to actively practising embodied thinking in research, teaching, and learning. The authors speak from immersing themselves in…
A Primer on Memory Consistency and Cache Coherence, Second Edition
Many modern computer systems, including homogeneous and heterogeneous architectures, support shared memory in hardware. In a shared memory system, each of the processor cores may read and write to a single shared address space. For a shared memory…
Research Data Management in the Canadian Context
Research Data Management is a term for all the things that researchers do to structure, organize and maintain data before, during and after doing research. RDM is also an emerging discipline that is concerned with researching and developing ways to…
Designing Arguments for Academic, Public, and Professional Audiences - Fourteenth Edition
This college-level textbook guides students through five different types of arguments: evaluations, responses, persuasive rhetorical arguments, proposals, and practical professional development arguments. Students are introduced to rhetorical…
Qualitative Research – a practical guide for health and social care researchers and practitioners
This guide is designed to support health and social care researchers and practitioners to integrate qualitative research into the evidence base of health and social care research. Qualitative research designs are diverse and each design has a…
An Open Guide to Data Structures and Algorithms
This textbook serves as a gentle introduction for undergraduates to theoretical concepts in data structures and algorithms in computer science while providing coverage of practical implementation (coding) issues. The field of computer science (CS)…
Experiences in Biodiversity Research: A Field Course
This handbook was developed to support the course, Experiences in Biodiversity Research, which exists to provide early undergraduates with experience in the practice of biodiversity research and demystify the path to careers in this field. Although…
Communicating Fashion: Trend Research and Forecasting
Communicating Fashion offers a holistic view of the interrelationships involved in trend research, including data collection, analysis and reporting, and forecasting what that direction means for design. The book’s primary focus is on the process of…
Conducting Mixed-Methods Research: From Classical Social Sciences to the Age of Big Data and Analytics
Scholars in the social sciences are increasingly expected to incorporate both quantitative and qualitative techniques and methods into their research. The growth of “mixed-methods” research is evident in social science disciplines ranging from…
Workplace Software and Skills
Workplace Software and Skills is designed to flexibly support a range of courses covering computer literacy, Microsoft Office, and Google Suite applications. The textbook covers both hard and soft skills that are applicable to a broad range of…
Advanced Legal Research: Process and Practice
Written for students and instructors in an advanced legal research course, this book uses the steps of the legal research process to facilitate skills practice, collaboration, and reflection. It proposes a hypothetical as a basis for practicing the…
Advanced Legal Research: Process and Practice
Written for students and instructors in an advanced legal research course, this book uses the steps of the legal research process to facilitate skills practice, collaboration, and reflection. It proposes a hypothetical as a basis for practicing the…
A Narratological Approach to Lists in Detective Fiction
This open access book examines how the form of the list features as a tool for meaning-making in the genre of detective fiction from the nineteenth to the twenty-first century. The book analyzes how both readers and detectives rely on listing as an…
3D Research Challenges in Cultural Heritage III
Complexity and Quality in Digitisation
This open access book presents a collection of papers focusing on current 3D research challenges in the domain of digital cultural heritage. 3D technologies find considerable use within the field of cultural heritage at the beginning of the 21st…
Contemporary Issues in Collection Management
This edited, openly licensed, textbook examines several different issues in collection management. Topics covered include physical vs. digital collections; the impact of BookTok on collections; challenges to 2SLGBTQ+ collections ; ebook licensing;…
Power, Profit, and Privilege: Problematizing Scholarly Publishing
This open course introduces students to the scholarly communications system — with particular emphasis on the scholarly journal publishing mechanism — wherein new information is created, evaluated, disseminated, and preserved.
Peer Review: A Critical Primer and Practical Course
This book is a self-paced, open access training in peer review. In eight modules it asks readers to engage in a variety of activities to learn the who, what, why, and how of peer review. It is geared to library professionals, library school students,…
International Libraries: An Open Textbook
International Libraries: An Open Textbook is a reference sourcebook about the libraries and the field of librarianship in non-North American countries around the world. Each chapter in this volume includes a profile of a featured country’s variety of…
Polimetrics: A Stata Companion to Introduction to Political Science Research Methods - 1st Edition
Polimetrics: A Stata Companion, authored by Dr. Josh Franco, is an Open Education Resource workbook licensed CC BY-NC and designed as a Stata companion to Introduction to Political Science Research Methods.
This workbook provides a tour of the…
This workbook provides a tour of the…
An Animated Introduction to Digital Logic Design
This book is designed for use in an introductory course on digital logic design, typically offered in computer engineering, electrical engineering, computer science, and other related programs. Such a course is usually offered at the sophomore level.…
Social Data Analysis
Social data analysis enables you, as a researcher, to organize the facts you collect during your research. Your data may have come from a questionnaire survey, a set of interviews, or observations. They may be data that have been made available to…
Critical Thinking in Academic Research - Second Edition
Critical Thinking in Academic Research - 2nd Edition provides examples and easy-to-understand explanations to equip students with the skills to develop research questions, evaluate and choose the right sources, search for information, and understand…
Air Safety Investigation: The Journey
"Air Safety Investigation – The Journey" is an introductory book that explores the world of air safety investigation. Unlike a how-to manual for investigating aviation accidents, this book focuses on the essential knowledge and mindset required to…
Cataloging with MARC, RDA, and Classification Systems
This book goes over a wide range of cataloging schemata, tools, and norms. It presents a concise but thorough view of the basics of library cataloging practice.
Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 24th International Conference on Agile Software Development, XP 2023, which took place in Amsterdam, The Netherlands, during June 13-16, 2023. XP is the premier agile software development…
AI in Learning: Designing the Future
AI (Artificial Intelligence) is predicted to radically change teaching and learning in both schools and industry causing radical disruption of work. AI can support well-being initiatives and lifelong learning but educational institutions and…
AI in Learning: Designing the Future
AI (Artificial Intelligence) is predicted to radically change teaching and learning in both schools and industry causing radical disruption of work. AI can support well-being initiatives and lifelong learning but educational institutions and…
Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 23rd International Conference on Agile Software Development, XP 2022, which was held in Copenhagen, Denmark, in June 2022. XP is the premier agile software development conference combining…
Advances in Intelligent Data Analysis XVIII
This open access book constitutes the proceedings of the 18th International Conference on Intelligent Data Analysis, IDA 2020, held in Konstanz, Germany, in April 2020. The 45 full papers presented in this volume were carefully reviewed and selected…
Doing Critical and Creative Research in Adult Education
Doing Critical and Creative Research in Adult Education brings together leading and emerging scholars in adult education in order to capture the vitality and complexity of contemporary adult education research, marked by the desire to conduct…
Algorithms for Big Data
This open access book surveys the progress in addressing selected challenges related to the growth of big data in combination with increasingly complicated hardware. It emerged from a research program established by the German Research Foundation…
A Guide to Responsible Research
This Open Access book is a guide to good, responsible research at each step of the process of research discovery, so that a researcher at the beginning of a scientific career has a clear pathway to doing good research and producing reliable results.…
Close Reading with Computers
Rather than working at the usual scales of distant reading, this book shows what happens when we bring techniques from the digital humanities to bear on a single novel for close readings.
Crawford Automation – A Guided Application of Structured Problem Solving
his is a multimedia-enabled case in which students will be guided, by an industry expert, to apply structured problem-solving that addresses a typical supply chain problem, missing parts. What first appears as the issue may be a symptom of a root…
Introduction to Library and Information Science
This book explores the history, present, and future of library science, both in theory and in practice. It examines the place of the librarian as arbiter of information access in a constantly-changing and modernizing global community
Introduction to College Research
This book acknowledges our changing information landscape, covering key concepts in information literacy to support a research process with intention. We start by critically examining the online environment many of us already engage with every day,…
Producing Open Source Software: How to Run a Successful Free Software Project
Producing Open Source Software is a book about the human side of open source development. It describes how successful projects operate, the expectations of users and developers, and the culture of free software. The book is released under an open…
Programming Persistent Memory: A Comprehensive Guide for Developers
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better…
Early Childhood Literacy: Engaging and Empowering Emergent Readers and Writers, Birth – Age 5
Engaging and Empowering Emergent Readers and Writers, Birth - Age 5
Basic Engineering Data Collection and Analysis
In Basic Engineering Data Collection and Analysis, Stephen B. Vardeman and J. Marcus Jobe stress the practical over the theoretical. Step by step, students get real engineering data and scenario examples along with chapter-long case studies that…
Practicing and Presenting Social Research
This open-access textbook is for those who want to write exemplary social research. It provides an extensive outline of each step of the research process: outlining practical tools for conceptualizing its beginnings, generating proposals, getting…
Making Sense of Digital Humanities
Taking up the challenge of navigating the complex world of digital humanities, Making Sense of Digital Humanities offers readers an exploration of the many ways scholars have employed the diverse toolkit of digital humanities to create a better…
Reframing Digital Humanities: Conversations with Digital Humanists
Growing from Reframing History, a podcast about history theory and practice, Reframing Digital Humanities: Conversations with Digital Humanists, Julian Chambliss, Professor of English at Michigan State University, brings together a diverse group of…
Tools and Algorithms for the Construction and Analysis of Systems
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the…
Tools and Algorithms for the Construction and Analysis of Systems
This open access book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2022, which was held during April 2-7, 2022, in Munich, Germany, as part of the…
Programming Languages and Systems
This open access book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April 5-7, 2022, in Munich, Germany, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS…
Fundamental Approaches to Software Engineering
This open access book constitutes the proceedings of the 25th International Conference on Fundamental Approaches to Software Engineering, FASE 2022, which was held during April 4-5, 2022, in Munich, Germany, as part of the European Joint Conferences…
Foundations of Software Science and Computation Structures
This open access book constitutes the proceedings of the 25th International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2022, which was held during April 4-6, 2022, in Munich, Germany, as part of the European…
Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 22nd International Conference on Agile Software Development, XP 2021, which was held virtually during June 14-18, 2021. XP is the premier agile software development conference combining…
Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 23rd International Conference on Agile Software Development, XP 2022, which was held in Copenhagen, Denmark, in June 2022. XP is the premier agile software development conference combining…
The Future of Software Quality Assurance
This open access book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing…
Information—Consciousness—Reality
This open access book chronicles the rise of a new scientific paradigm offering novel insights into the age-old enigmas of existence. Over 300 years ago, the human mind discovered the machine code of reality: mathematics. By utilizing abstract…
A Journey of Embedded and Cyber-Physical Systems
This Open Access book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical systems. The contributions in the book summarize the content of invited lectures given at the workshop “Embedded…
Critical Thinking in Academic Research
Critical Thinking in Academic Research will introduce students to the techniques and principles of critical thinking. However, a commitment to lifelong learning is required for critical thinking, it takes more than a single course or reading a book.…
Patterns for Beginning Programmers
Programming patterns are solutions to problems that require the creation of a small fragment of code that will be part of a larger program. Hence, this book is about teaching you how to write such fragments of code. However, it is not about teaching…
Research Methods for Criminal Justice Students
This book is based on two open-access textbooks: Bhattacherjee’s (2012) Social science research: Principles, methods, and practices and Blackstone’s (2012) Principles of sociological inquiry: Qualitative and quantitative methods. I first used…
Visuals for influence: in project management and beyond
Visuals for influence: in project management and beyond’ is a practical guide with 24 visuals to download, adapt and deploy to engage your stakeholders. This practical guide will build your confidence and practical skills to quickly and effectively…
Documentary Making for Digital Humanists
This fluent and comprehensive field guide responds to increased interest, across the humanities, in the ways in which digital technologies can disrupt and open up new research and pedagogical avenues. It is designed to help scholars and students…
A Mixed Course-Based Research Approach to Human Physiology
The Biology 256 Laboratory course was designed to provide students with hands-on access to modern techniques in human physiological analyses using the course-based research pedagogical approach. In this course, students will learn how to perform…
Open Signals and Systems Laboratory Exercises
Open Signals and Systems Laboratory Exercises is a collection of lab assignments that have been used in EE 224: Signals and Systems I in the Department of Electrical and Computer Engineering at Iowa State University. These lab exercises have been…
Library 160: Introduction to College-Level Research
You will learn how scholarly information is produced, organized, and accessed; how to construct and use effective search strategies in a variety of web tools and scholarly databases; how to choose finding tools appropriate to the type of information…
Foundations of Social Work Research
This textbook was created to provide an introduction to research methods for BSW and MSW students, with particular emphasis on research and practice relevant to students at the University of Texas at Arlington. It provides an introduction to social…
Brain and Human Body Modeling 2020 :
Computational Human Models Presented at EMBC 2019 and the BRAIN Initiative® 2019 Meeting
This open access book describes modern applications of computational human modeling in an effort to advance neurology, cancer treatment, and radio-frequency studies including regulatory, safety, and wireless communication fields. Readers working on…
Dependable Embedded Systems
This Open Access book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have emerged particularly within the last five years. This book introduces the most prominent reliability concerns…
Data Privacy and Trust in Cloud Computing
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a…
Data and Text Processing for Health and Life Sciences
This open access book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health and Life specialists face everyday with minimal software dependencies. The examples presented in the book show…
Data Privacy and Trust in Cloud Computing
This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a…
The Coupling of Safety and Security
This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the…
Contextual Process Digitalization
This open access book presents an overview and step-by-step explanation of process management. It starts with the individual participants’ perspectives on their work in a process and its structuring and harmonization, and then moves on to its…
Computational Cognitive Modeling and Linguistic Theory
This open access book introduces a general framework that allows natural language researchers to enhance existing competence theories with fully specified performance and processing components. Gradually developing increasingly complex and…
Co-creating Digital Public Services for an Ageing Society
This open access book attends to the co-creation of digital public services for ageing societies. Increasingly public services are provided in digital form; their uptake however remains well below expectations. In particular, amongst older adults the…
The Cloud-to-Thing Continuum
The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it,…
A Person-Centered Guide to Demystifying Technology: Working together to observe, question, design, prototype, and implement/reject technology in support of people's valued beings and doings
Digital technologies old and new are not objects that can be packed inside a box. They are a seamless, indivisible combination of people, organizations, policies, economies, histories, cultures, knowledge, and material things that are continuously…
First Semester in Numerical Analysis with Python
The book is based on “First semester in Numerical Analysis with Julia”, written by Giray Ökten. The contents of the original book are retained, while all the algorithms are implemented in Python (Version 3.8.0). Python is an open source (under OSI),…
Automated Machine Learning
This open access book presents the first comprehensive overview of general methods in Automated Machine Learning (AutoML), collects descriptions of existing systems based on these methods, and discusses the first series of international challenges of…
Annals of Scientific Society for Assembly, Handling and Industrial Robotics
This Open Access proceedings present a good overview of the current research landscape of industrial robots. The objective of MHI Colloquium is a successful networking at academic and management level. Thereby the colloquium is focussing on a high…
The Amazing Journey of Reason
This Open Access book explores questions such as why and how did the first biological cells appear? And then complex organisms, brains, societies and –now– connected human societies? Physicists have good models for describing the evolution of the…
AI based Robot Safe Learning and Control
This open access book mainly focuses on the safe control of robot manipulators. The control schemes are mainly developed based on dynamic neural network, which is an important theoretical branch of deep reinforcement learning. In order to enhance the…
Agile Processes in Software Engineering and Extreme Programming – Workshops
This open access book constitutes the research workshops, doctoral symposium and panel summaries presented at the 20th International Conference on Agile Software Development, XP 2019, held in Montreal, QC, Canada, in May 2019. XP is the premier agile…
Agile Processes in Software Engineering and Extreme Programming
This open access book constitutes the proceedings of the 21st International Conference on Agile Software Development, XP 2020, which was planned to be held during June 8-12, 2020, at the IT University of Copenhagen, Denmark. However, due to the…
Business Computers 365
The material in this text consists of many screenshots of Microsoft® Office 365 using Windows 10.
The goal of this text was to create a resource for students that was effective, concise and cost-effective. This text will not include extra content…
The goal of this text was to create a resource for students that was effective, concise and cost-effective. This text will not include extra content…
Blueprints: Creating, Describing, and Implementing Designs for Larger-Scale Software Projects - version 2.2
Blueprints is a concise yet comprehensive coverage of Object-Oriented Analysis and Design concepts, suitable for a second programming course in Computer Science. It introduces and teaches application development in a command-line environment, and…
Doing Research
A modules-based approach to learning research skills that emphasizes the reflective nature of information discovery, the contextual basis for evaluating that information, and a recognition that information has value.
Transfer Entropy
Statistical relationships among the variables of a complex system reveal a lot about its physical behavior. Therefore, identification of the relevant variables and characterization of their interactions are crucial for a better understanding of a…
Short-Term Load Forecasting by Artificial Intelligent Technologies
In last few decades, short-term load forecasting (STLF) has been one of the most important research issues for achieving higher efficiency and reliability in power system operation, to facilitate the minimization of its operation cost by providing…
Security and Privacy in Wireless and Mobile Networks
Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless…
Multi-Objective and Multi-Attribute Optimisation for Sustainable Development Decision Aiding
Optimization is considered as a decision-making process for getting the most out of available resources for the best attainable results. Many real-world problems are multi-objective or multi-attribute problems that naturally involve several competing…
Methods in Computational Biology
Modern biology is rapidly becoming a study of large sets of data. Understanding these data sets is a major challenge for most life sciences, including the medical, environmental, and bioprocess fields. Computational biology approaches are essential…
Tunable Security for Deployable Data Outsourcing
Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design…
Tracking Extended Objects with Active Models and Negative Measurements
Extended object tracking deals with estimating the shape and pose of an object based on noisy point measurements. This task is not straightforward, as we may be faced with scarce low-quality measurements, little a priori information, or we may be…
Situation Interpretation for Knowledge- and Model Based Laparoscopic Surgery
To manage the influx of information into surgical practice, new man-machine interaction methods are necessary to prevent information overflow. This work presents an approach to automatically segment surgeries into phases and select the most…
Realtime Analysis of Large-Scale Data
In photon science more and more data are taken. It is not possible anymore to store and process all data offline. In this book, we explore strategies for handling this large amount of data. A neural network as well as techniques from image processing…
Real-time Biomechanical Modeling for Intraoperative Soft Tissue Registration
Computer assisted surgery systems intraoperatively support the surgeon by providing information on the location of hidden risk and target structures during surgery. However, soft tissue deformations make intraoperative registration (and thus…
Ranking for Web Data Search Using On-The-Fly Data Integration
Ranking - the algorithmic decision on how relevant an information artifact is for a given information need and the sorting of artifacts by their concluded relevancy - is an integral part of every search engine. In this book we investigate how…
Product lines for digital information products
Digital information products are an important class of widely used digital products, whose core benefit is the delivery of information or education (e.g., electronic books, online newspapers, e-learning courses).This book introduces a novel and…
Possibly imperfect ontologies for effective information retrieval
Ontologies and semantic metadata can theoretically solve all problems of traditional full-text search engines. In practice, however, they are always imperfect. This work analyzed whether the negative effect of ontology imperfection is higher than the…
Optimal Sequence-Based Control of Networked Linear Systems
In Networked Control Systems (NCS), components of a control loop are connected by data networks that may introduce time-varying delays and packet losses into the system, which can severly degrade control performance. Hence, this book presents the…
Optical Coherence Tomography guided Laser-Cochleostomy
Despite the high precision of laser, it remains challenging to control the laser-bone ablation without injuring the underlying critical structures. Providing an axial resolution on micrometre scale, OCT is a promising candidate for imaging…
Nonlinear Gaussian Filtering : Theory, Algorithms, and Applications
By restricting to Gaussian distributions, the optimal Bayesian filtering problem can be transformed into an algebraically simple form, which allows for computationally efficient algorithms. Three problem settings are discussed in this thesis: (1)…
New Methods to Improve Large-Scale Microscopy Image Analysis with Prior Knowledge and Uncertainty
Multidimensional imaging techniques provide powerful ways to examine various kinds of scientific questions. The routinely produced data sets in the terabyte-range, however, can hardly be analyzed manually and require an extensive use of automated…
Integrated Software Architecture-Based Reliability Prediction for IT Systems
With the increasing importance of reliability in business and industrial IT systems, new techniques for architecture-based software reliability prediction are becoming an integral part of the development process. This dissertation thesis introduces a…
Information flow control for java : a comprehensive approach based on path conditions in dependence Graphs
nformation flow control (IFC) is a technique to assert the security of a given program with respect to a given security policy. The classical policy noninterference requires that public output of a program may not be influenced from secret input.…
The impact of inter-vehicle communication on vehicular traffic
The work addresses communication networks established over radio equipped vehicles in our everyday road traffic, so called Vehicular Ad Hoc Networks (VANETs), and discusses their impact on two major goals, namely traffic safety and traffic…
Identifying and Harnessing Concurrency for Parallel and Distributed Network Simulation
Although computer networks are inherently parallel systems, the parallel execution of network simulations on interconnected processors frequently yields only limited benefits. In this thesis, methods are proposed to estimate and understand the…
Hybrid routing in delay tolerant networks
This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and…
Learning to Understand Remote Sensing Images
With the recent advances in remote sensing technologies for Earth observation, many different remote sensors are collecting data with distinctive properties. The obtained data are so large and complex that analyzing them manually becomes impractical…
Learning to Understand Remote Sensing Images
With the recent advances in remote sensing technologies for Earth observation, many different remote sensors are collecting data with distinctive properties. The obtained data are so large and complex that analyzing them manually becomes impractical…
Imaging Sensors and Technologies
This book provides different technologies and procedures related to imaging sensors. Active or passive imaging sensors capture electromagnetic radiation across the whole spectra or acoustic echoes, which, conveniently arranged in images, allow the…
The impact of inter-vehicle communication on vehicular traffic
The work addresses communication networks established over radio equipped vehicles in our everyday road traffic, so called Vehicular Ad Hoc Networks (VANETs), and discusses their impact on two major goals, namely traffic safety and traffic…
Hybrid routing in delay tolerant networks
This work addresses the integration of today's infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and…
Human-Inspired Balancing and Recovery Stepping for Humanoid Robots
Robustly maintaining balance on two legs is an important challenge for humanoid robots. The work presented in this book represents a contribution to this area. It investigates efficient methods for the decision-making from internal sensors about…
Framework for Analysis and Identification of Nonlinear Distributed Parameter Systems using Bayesian Uncertainty Quantification based on Generalized Polynomial Chaos
In this work, the Uncertainty Quantification (UQ) approaches combined systematically to analyze and identify systems. The generalized Polynomial Chaos (gPC) expansion is applied to reduce the computational effort. The framework using gPC based on…
Flexible Integration and Efficient Analysis of Multidimensional Datasets from the Web
If numeric data from the Web are brought together, natural scientists can compare climate measurements with estimations, financial analysts can evaluate companies based on balance sheets and daily stock market values, and citizens can explore the GDP…
Efficiently Conducting Quality-of-Service Analyses by Templating Architectural Knowledge
Previously, software architects were unable to effectively and efficiently apply reusable knowledge (e.g., architectural styles and patterns) to architectural analyses. This work tackles this problem with a novel method to create and apply templates…
Efficient Algorithms for Large-Scale Image Analysis
This work develops highly efficient algorithms for analyzing large images. Applications include object-based change detection and screening. The algorithms are 10-100 times as fast as existing software, sometimes even outperforming FGPA/GPU hardware,…
Dynamics of Evolution and Learning
The book develops a unifying perspective on how learning influences evolutionary dynamics which for the first time explains seemingly contradicting results from the literature. It also reveals formerly unknown facets of the complex interplay of the…
Detection and characterization of inclusions in impedance tomography
The topic of this work are two further developments of the Factorization method for electrical impedance tomography.We present a modification of this method that is capable of detecting mixed inclusions, i.e. both inclusions with a higher as well as…
Design and Application of Quantified Self Approaches for Reflective Learning in the Workplace
Learning by reflection is one of the core processes for improving work performance. We provide a novel approach for reflective learning support by transferring and adapting practices from the Quantified Self to workplace settings. This book…
Computer Algebra in Scientific Computing
Although scientific computing is very often associated with numeric computations, the use of computer algebra methods in scientific computing has obtained considerable attention in the last two decades. Computer algebra methods are especially…
Computational Methods for Fracture
This book offers a collection of 17 scientific papers about the computational modeling of fracture. Some of the manuscripts propose new computational methods and/or how to improve existing cutting edge methods for fracture. These contributions can be…
Error-Correction Coding and Decoding: Bounds, Codes, Decoders, Analysis and Applications
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from…
Visualizing Mortality Dynamics in the Lexis Diagram
The goal of this book is simple: We would like to show how mortality dynamics can be visualized in the so-called Lexis diagram. To appeal to as many potential readers as possible, we do not require any specialist knowledge. This approach may be…
Solving PDEs in Python: The FEniCS Tutorial I
This book offers a concise and gentle introduction to finite element programming in Python based on the popular FEniCS software library. Using a series of examples, including the Poisson equation, the equations of linear elasticity, the…
Scaling a Software Business: The Digitalization Journey
Software has changed the rules of the game. The world talks about the digitalization in industry and society – how the focus has shifted from producing tangible things towards software and services. This trend started many years ago, but is now…
Re-engineering the Uptake of ICT in Schools
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale…
Programming for Computations - Python: A Gentle Introduction to Numerical Simulations with Python
Today, most people are experienced with computer programs, typically programs such as Word, Excel, PowerPoint, Internet Explorer, and Photoshop. The interaction with such programs is usually quite simple and intuitive: you click on buttons, pull down…
Programming for Computations - MATLAB/Octave
This book presents computer programming as a key method for solving mathematical problems. There are two versions of the book, one for MATLAB and one for Python. The book was inspired by the Springer book TCSE 6: A Primer on Scientific Programming…
Enabling Things to Talk
The Internet of Things (IoT) is an emerging network superstructure that will connect physical resources and actual users. It will support an ecosystem of smart applications and services bringing hyper-connectivity to our society by using augmented…
Foundations of Trusted Autonomy
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together…
Control Theory Tutorial: Basic Concepts Illustrated by Software Examples
This open access Brief introduces the basic principles of control theory in a concise self-study guide. It complements the classic texts by emphasizing the simple conceptual unity of the subject. A novice can quickly see how and why the different…
Theory and Applications of Ordered Fuzzy Numbers: A Tribute to Professor Witold Kosiński
This open access book offers comprehensive coverage on Ordered Fuzzy Numbers, providing readers with both the basic information and the necessary expertise to use them in a variety of real-world applications. The respective chapters, written by…
S-BPM in the Production Industry: A Stakeholder Approach
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective…
S-BPM Illustrated: A Storybook about Business Process Modeling and Execution
S-BPM stands for “subject-oriented business process management” and focuses on subjects that represent the entities (people, programs etc.) that are actively engaged in processes. S-BPM has become one of the most widely discussed approaches for…
Preparing for Life in a Digital Age: The IEA International Computer and Information Literacy Study International Report
Ability to use information and communication technologies (ICT) is an imperative for effective participation in today’s digital age. Schools worldwide are responding to the need to provide young people with that ability. But how effective are they in…
New Horizons for a Data-Driven Economy: A Roadmap for Usage and Exploitation of Big Data in Europe
n this book readers will find technological discussions on the existing and emerging technologies across the different stages of the big data value chain. They will learn about legal aspects of big data, the social impact, and about education needs…
Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Flow of ions through voltage gated channels can be represented theoretically using stochastic differential equations where the gating mechanism is represented by a Markov model. The flow through a channel can be manipulated using various drugs, and…
S-BPM in the Wild: Practical Value Creation
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with…
From Data Modeling to Knowledge Engineering in Space System Design
The technologies currently employed for modeling complex systems, such as aircraft, spacecraft, or infrastructures, are sufficient for system description, but do not allow deriving knowledge about the modeled systems. This work provides the means to…
Managing the Complexity of Critical Infrastructures: A Modelling and Simulation Approach
This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is…
The Essence of Software Engineering
This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research…
Ecosystemic Evolution Feeded by Smart Systems
nformation Society is advancing along a route of ecosystemic evolution. ICT and Internet advancements, together with the progression of the systemic approach for enhancement and application of Smart Systems, are grounding such an evolution. The…
Dynamics of Evolution and Learning
The book develops a unifying perspective on how learning influences evolutionary dynamics which for the first time explains seemingly contradicting results from the literature. It also reveals formerly unknown facets of the complex interplay of the…
Document Image Processing
Document Image Processing allows systems like OCR, writer identification, writer recognition, check processing, historical document processing, etc., to extract useful information from document images. What we call a document image ranges from images…
Directional Estimation for Robotic Beating Heart Surgery
In robotic beating heart surgery, a remote-controlled robot can be used to carry out the operation while automatically canceling out the heart motion. The surgeon controlling the robot is shown a stabilized view of the heart. First, we consider the…
Coordinating Service Compositions : Model and Infrastructure for Collaborative Creation of Electronic Documents
Electronic documents frequently include contributions from different human and non-human sources. The Web, for instance, offers ever-changing content and services which can perform activities during document creation. This thesis introduces a…
A Contribution to Resource-Aware Architectures for Humanoid Robots
The goal of this work is to provide building blocks for resource-aware robot architectures. The topic of these blocks are data-driven generation of context-sensitive resource models, prediction of future resource utilizations, and resource-aware…
A Contribution to Active Infrared Laser Spectroscopy for Remote Substance Detection
n this work we present a stand-off, long wave infrared (LWIR) spectroscopy system for remote detection of hazardous substances. The principle is based upon wavelength selective illumination using External Cavity Quantum Cascade Lasers, that are…
Consolidation of Customized Product Copies into Software Product Lines
In software development, project constraints lead to customer-specific variants by copying and adapting the product. During this process, modifications are scattered all over the code. Although this is flexible and efficient in the short term, a…
Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks
This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can…
Automated Improvement of Software Architecture Models for Performance and Other Quality Attributes
Quality attributes, such as performance or reliability, are crucial for the success of a software system and largely influenced by the software architecture. Their quantitative prediction supports systematic, goal-oriented software design and forms a…
Re-engineering the Uptake of ICT in Schools
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale…
Library and Information Sciences: Trends and Research
This book explores the development, trends and research of library and information sciences (LIS) in the digital age. Inside, readers will find research and case studies written by LIS experts, educators and theorists, most of whom have visited…
Error-Correction Coding and Decoding: Bounds, Codes, Decoders, Analysis and Applications
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from…
The Essence of Software Engineering
This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research…
Big Data in Context: Legal, Social and Technological Insights
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ’s Safe Harbor…
Access to Online Resources: A Guide for the Modern Librarian
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and…
Advanced Signaling Support for IP-based Networks
his work develops a set of advanced signaling concepts for IP-based networks. It proposes a design for secure and authentic signaling and provides QoS signaling support for mobile users. Furthermore, this work develops methods which allow for…
Wireless Sensor and Actuator Networks for Smart Cities
Our lives are being transformed by the interplay between mobile networks, wireless communications, and artificial intelligence. This transformation is an outcome of the emerging Internet of Things (IoT) concept and advancements in computer…
Middleware Solutions for Wireless Internet of Things
Plan Ceibal is the name coined in Uruguay for the local implementation of the One Laptop Per Child (OLPC) initiative. Plan Ceibal distributes laptops and tablets to students and teachers, and also deploys a nationwide wireless network to provide…
Scalable Interactive Visualization
Data available in today’s information society is ever growing in size and complexity—i.e., unstructured, multidimensional, uncertain, etc.—making it impossible to survey and understand this data. Traditionally, most of these datasets are stored and…
Computing Characterizations of Drugs for Ion Channels and Receptors Using Markov Models
Drugs are generally devised to alter the function of cells in a favorable manner. The actions of drugs can in some cases be represented by mathematical models often phrased in terms of differential equations. Our aim in these notes is to study…
Hybrid Advanced Techniques for Forecasting in Energy Sector
Electric load forecasting is an important issue for a power utility, associated with the management of daily operations such as energy transfer scheduling, unit commitment, and load dispatch. Inspired by strong non-linear learning capability of…
Finite Difference Computing with PDEs: A Modern Software Approach
Vibration problems lead to differential equations with solutions that oscillate in time, typically in a damped or undamped sinusoidal fashion. Such solutions put certain demands on the numerical methods compared to other phenomena whose solutions are…
Controlled self-organisation using learning classifier systems
The complexity of technical systems increases, breakdowns occur quite often. The mission of organic computing is to tame these challenges by providing degrees of freedom for self-organised behaviour. To achieve these goals, new methods have to be…
Time Predictions: Understanding and Avoiding Unrealism in Project Planning and Everyday Life
The time prediction and planning capacity of the human race is particularly evident in some of the early great constructions. An excellent example is the building of the Great Pyramid of Giza, around 4500 years ago. We do not know much about the…
A Contribution to Resource-Aware Architectures for Humanoid Robots
The goal of this work is to provide building blocks for resource-aware robot architectures. The topic of these blocks are data-driven generation of context-sensitive resource models, prediction of future resource utilizations, and resource-aware…
Socio-Cognitive and Affective Computing
Social cognition focuses on how people process, store, and apply information about other people
and social situations. It focuses on the role that cognitive processes play in our social interactions [1].
On the other hand, the term cognitive…
and social situations. It focuses on the role that cognitive processes play in our social interactions [1].
On the other hand, the term cognitive…
Computer Vision Metrics: Survey, Taxonomy, and Analysis
In summary, my goal is to survey the methods people are using for feature description— the key metrics generated—and make it easier for anyone to understand the methods in practice, and how to evaluate the methods using the vision taxonomy and…
Computer science approach to quantum control
This work considers several hypothetical control processes on the nanoscopic level and show their analogy to computation processes. It shows that measuring certain types of quantum observables is such a complex task that every instrument that is able…
Computation and the Humanities: Towards an Oral History of Digital Humanities
This chapter begins with an introduction to Digital Humanities (DH) and outlines its development since c.1949. It demonstrates that the application of
computing to cultural heritage has been ongoing for some 70 years yet the histories of DH have,…
computing to cultural heritage has been ongoing for some 70 years yet the histories of DH have,…
Complications and Quandaries in the ICT Sector: Standard Essential Patents and Competition Issues
Today’s technology product markets, particularly in the information and communications technology (henceforth “ICT”) sector, are inherently international.
Products designed in California may be assembled in Taiwan from parts sourced from Korea,…
Products designed in California may be assembled in Taiwan from parts sourced from Korea,…
Combined Scheduling and Control
This paper is about the incremental computation of control sequences for discrete event
systems in uncertain environments where uncontrollable events may occur. Timed Petri nets are used
for this purpose. The aim is to drive the marking of the net…
systems in uncertain environments where uncontrollable events may occur. Timed Petri nets are used
for this purpose. The aim is to drive the marking of the net…
Challenging the Chain - Governing the Automated Exchange and Processing of Business Information
What is digital business reporting? Why do we need it? And how can we improve it? This book aims to address these questions by illustrating the rise of system-to-system information exchange and the opportunities for improving transparency and…
Certifying Software Component Performance Specifications
In component-based software engineering, performance prediction approaches support the design of business information systems on the architectural level. They are based on behavior specifications of components. This work presents a round-trip…
Building the Infrastructure for Cloud Security: A Solutions View
Security is an ever-present consideration for applications and data in the cloud. It is a concern for executives trying to come up with criteria for migrating an application, for marketing organizations in trying to position the company in a good…
Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks
This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can…
Autonomous Control for a Reliable Internet of Services: Methods, Models, Approaches, Techniques, Algorithms, and Tools
The explosive growth of the Internet has fundamentally changed the
global society. The emergence of concepts like service-oriented architecture
(SOA), Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS),…
global society. The emergence of concepts like service-oriented architecture
(SOA), Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS),…
Applied Artificial Neural Networks
Heptafluoropropane (R227ea) is a good refrigerant that reduces greenhouse effects and ozone depletion. In practical applications, we usually have to know the compressed liquid densities at different temperatures and pressures. However, the measurement…
Android on x86: An Introduction to Optimizing for Intel® Architecture
We wrote Android on x86: an Introduction to Optimizing for Intel® Architecture to provide a one-stop, detailed resource for the topic’s best practices and procedures. The book encompasses the installation issues, hardware optimization issues,…
Android Application Development for the Intel Platform
The number of Android devices running on Intel processors has gradually increased ever since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel…
Analysis and recognition of human actions with flow features and temporal models
This work focuses the recognition of complex human activities in video data. A combination of new features and techniques from speech recognition is used to realize a recognition of action units and their combinations in video sequences. The…
Electromyographic Continuous
Speech is the natural medium of human communication, but audible speech can be overheard by bystanders and excludes speech-disabled people. This work presents a speech recognizer based on surface electromyography, where electric potentials of the…
Cyber-Physical Systems of Systems: Foundations – A Conceptual Model and Some Derivations: The AMADEOS Legacy
A System of System (SoS) stems from the integration of existing systems (legacy systems), normally operated by different organizations, and new systems that have been designed to take advantage of this integration. Many of the established assumptions…
Negotiating Internet Governance
On the Internet, everything we love and everything we hate has a name. It also has a number or a string of 0s and 1s making it technically viable. And, more often than not, it comes with a price tag, whether visible or disguised as data value. Since…
Security and Privacy in Wireless and Mobile Networks
Intrusions are becoming more complicated with the recent development of adversarial techniques. To boost the detection accuracy of a separate intrusion detector, the collaborative intrusion detection network (CIDN) has thus been developed by allowing…
The State of Open Data
It’s been ten years since open data first broke onto the global stage. Over the past decade, thousands of programmes and projects around the world have worked to open data and use it to address a myriad of social and economic challenges. Meanwhile,…
Introduction to Programming using Fortran 95/2003/2008
Computers are everywhere in our daily lives. Between the desktop, laptop, phone, bank, and vehicle, it is difficult to completely get away from computers. It only makes sense to learn a little about how a computer really works.This text provides an…
MIPS Assembly Language Programming using QtSpim
There are a number of excellent, comprehensive, and in-depth texts on MIPS assembly language programming. This is not one of them.The purpose of this text is to provide a simple and free reference for university level programming and architecture…
x86-64 Assembly Language Programming with Ubuntu
The purpose of this text is to provide a reference for University level assembly language and systems programming courses. Specifically, this text addresses the x86-64 instruction set for the popular x86-64 class of processors using the Ubuntu 64-bit…
Presentation Software
PowerPoint 2010 is a complete presentation graphics program that allows you to produce professional looking presentations.
Slides can be created and displayed as a slide show on your computer, video projector, or on the Internet. Information from a…
Slides can be created and displayed as a slide show on your computer, video projector, or on the Internet. Information from a…
High Performance Computing
The purpose of this book is to teach new programmers and scientists about the basics of High Performance Computing. Too many parallel and high performance computing books focus on the architecture, theory and computer science surrounding HPC. This…
A DIFFERENT ROAD TO COLLEGE: A GUIDE FOR TRANSITIONING TO COLLEGE FOR NON-TRADITIONAL
STUDENTS
A Different Road To College: A Guide For Transitioning Non-Traditional Students is designed to introduce students to the contextual issues of college. Non-traditional students have an ever-growing presence on college campuses, especially community…
Phylogenetic Comparative Methods
Evolution is happening all around us. In many cases – lately, due to technological advances in molecular biology – scientists can now describe the evolutionary
process in exquisite detail. For example, we know exactly which genes change in frequency…
process in exquisite detail. For example, we know exactly which genes change in frequency…
Digital Foundations: Introduction to Media Design with the Adobe Creative Cloud, Revised Edition
Digital Foundations uses formal exercises of the Bauhaus to teach the Adobe Creative Suite. All students of digital design and production—whether learning in a classroom or on their own—need to understand the basic principles of design in order to…
Information Systems: A Manager's Guide to Harnessing
Technology
This book is written for a world that has changed radically in the past decade. At the start of the prior decade, Google barely existed and well-known strategists dismissed Internet advertising models (Porter, 2001). By decade’s end, Google brought…
Introduction to Design Equity
San Francisco, Portland, Austin, Madison, and Minneapolis are considered some of the country’s best-designed and most politically liberal cities. Mention of each brings to mind public parks, ample bike lanes, eclectic music scenes,…
Digital Accessibility as a Business Practice
Most business leaders would agree that reaching the broadest audience is good for a business’s bottom line. A good portion of that audience will be people with disabilities. How, though, would an organization go about ensuring it is as accessible as…
Web Accessibility for Developers : Essential Skills for Web Developers
Web Accessibility for Developers is a technical book aimed primarily at programmers. Learn how to develop accessible interactivity on the Web and gain expertise using WAI-ARIA, a W3C specification that enables optimal use of assistive technologies,…
Information Systems for Business and Beyond
Welcome to Information Systems for Business and Beyond. In this book, you will be introduced to the
concept of information systems, their use in business, and the larger impact they are having on our world.
This book is written as an introductory…
concept of information systems, their use in business, and the larger impact they are having on our world.
This book is written as an introductory…
Computer Networking : Principles, Protocols and Practice
Release 0.25
When the first computers were built during the second world war, they were expensive and isolated. However, after about twenty years, as their prices gradually decreased, the first experiments began to connect computers together. In the early 1960s,…
Information Gathering: Computer Security Lectures 2014/15 S2
This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds Beckett University. Laboratory work sheets, slides, and other open educational resources are available at…
Introduction to Cloud Computing and Virtual Machines
This is the first module in the 2016 Bioinformatics for Big Data: Cloud Computing on the Human Genome workshop hosted by the Canadian Bioinformatics Workshops.
Introduction to Tools, Computing Infrastructure, and Data
This is the second lecture in the Bioinformatics of Genomic Medicine 2017 workshop hosted by the Canadian Bioinformatics Workshops. This lecture is by Mathieu Bourgey from the Canadian Centre for Computational Genomics. For tutorials and lecture…
Introduction to Tools, Computing Infrastructure, and Data
This is the second lecture in the Bioinformatics of Genomic Medicine 2017 workshop hosted by the Canadian Bioinformatics Workshops. This lecture is by Mathieu Bourgey from the Canadian Centre for Computational Genomics. For tutorials and lecture…
Introduction to Cloud Computing
This is the first module in the 2016 Informatics for RNA-Seq Analysis workshop hosted by the Canadian Bioinformatics Workshops. This lecture is by Obi Griffith from Washington University School of Medicine.
Design and Testing of Laboratory Instruction
Management System (LIMS)
Laboratory Integration Management Solution (LIMS) is a software/hardware system which is used in
industrial laboratories for the integration of all laboratory software and instruments, training laboratory users, QA and QC. LIMS may also support data…
industrial laboratories for the integration of all laboratory software and instruments, training laboratory users, QA and QC. LIMS may also support data…
Research Methods in Psychology (New Zealand edition)
This textbook is an adaptation of the Research Methods in Psychology that is available on this site in US and Canadian editions. This New Zealand edition is an adaptation to the New Zealand context. The main changes are in Chapters 1 and 3 and the…
Steps to Success : Crossing the Bridge Between Literacy
Research and Practice
Steps to Success: Crossing the Bridge Between Literacy Research and Practice introduces instructional strategies linked to the most current research-supported practices in the field of literacy. The book includes chapters related to…
OER: A Field Guide for Academic Librarians
We intend this book to act as a guide writ large for would-be champions of OER, that anyone—called to
action by the example set by our chapter authors—might serve as guides themselves. The following chapters
tap into the deep experience of…
action by the example set by our chapter authors—might serve as guides themselves. The following chapters
tap into the deep experience of…
Introduction to Computer Graphics
Introduction to Computer Graphics is a free, on-line textbook covering the fundamentals of computer graphics and computer graphics programming. This book is meant for use as a textbook in a one-semester course that would typically be taken by…
Embedded Controllers Using C and Arduino / 2E
This text is designed to introduce and expand upon material related to the C programming language and embedded controllers, and specifically, the Arduino development system and associated Atmel ATmega microcontrollers. It is intended to fit the time…
Implementing a One Address CPU in Logisim
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users…
Think Data Structures: Algorithms and Information Retrieval in Java
This book is intended for college students in computer science and related fields, as well as professional software engineers, people training in software engineering, and people preparing for technical interviews. Before you start this book, you…
How to think like a computer scientist
The goal of this book is to teach you to think like a computer scientist. I like the way computer scientists think because they combine some of the best features of Mathematics, Engineering, and Natural Science. Like mathematicians, computer…
Knowledge Services
Knowledge Services converges information management, knowledge management (KM), and strategic learning into a single enterprise-wide discipline for the benefit of the business or organization in which it is practiced. With the success of knowledge…
Digital Material
Three decades of societal and cultural alignment of new media have yielded a host of innovations, trials, and problems, accompanied by versatile popular and academic discourse. New Media Studies crystallized internationally into an established…
Corporate Memory : Records and Information Management in the Knowledge Age
Modify Search | New Search
Corporate memory' is the body of information that an organization needs to keep for re-use. It is the active and historical information that an organization has that is worth sharing, managing and preserving to enable it to function effectively. This…
Safety and Reliability for Science and Technology
Safety and reliability are two important aspects of science and technology. They are
highly related, and they complement each other, i.e. they provide each other with
more information than could be obtained individually. When safety and reliability…
highly related, and they complement each other, i.e. they provide each other with
more information than could be obtained individually. When safety and reliability…
Polaris : The Chief Scientist's Recollections of the American North Pole Expedition, 1871-73
Emil Bessels was chief scientist and medical officer on George Francis Hall's ill-fated American North Pole Expedition of 1871-73 on board the ship Polaris. Bessels' book, translated from the German in its entirety for the first time, is one of…
Web Site Design
Websites are created using a set of standard technologies. Many of these technologies
involve markup and programming languages for encoding page content and
specifying the appearance and interactive behaviour of Web elements. In this module,
you…
involve markup and programming languages for encoding page content and
specifying the appearance and interactive behaviour of Web elements. In this module,
you…
Introduction to G Programming
The Internet, personal devices and multicore computers have greatly changed and enhanced our lives by allowing us to access information and entertainment ondemand anytime, anywhere. While these technologies are great on their own merit,
the reality…
the reality…
Computer And PC Designs
Before we go into details on various computer designs concepts, we need to
understand how to interpret the performance of a computer system. To start with, we will look at some basic metric and benchmarks for the measurement of a computer's…
understand how to interpret the performance of a computer system. To start with, we will look at some basic metric and benchmarks for the measurement of a computer's…
Computer Networks
Nowadays, everyone is using the Internet. We have hooked our computers to the
Internet, where we can access information and transmit messages. The Internet is a
very large computer network. Computer networks are so important in our daily life
that…
Internet, where we can access information and transmit messages. The Internet is a
very large computer network. Computer networks are so important in our daily life
that…
Network Programming And Design
This module will enable you to understand various wireless technologies, especially
those that have been infused into our daily lives. Also, a range of wireless network
protocols and wireless LAN design models will be discussed. Another topic that…
those that have been infused into our daily lives. Also, a range of wireless network
protocols and wireless LAN design models will be discussed. Another topic that…
The symbiosis between information system project complexity and information system project success
Project success is widely covered, and the discourse on project complexity is proliferating. The purpose of this book is to merge and investigate the two concepts within the context of information system (IS) projects and understand the symbiosis…
Writing, Medium, Machine: Modern Technographies
Writing, Medium, Machine: Modern Technographies is a collection of thirteen essays by leading scholars which explores the mutual determination of forms of writing and forms of technology in modern literature. The essays unfold from a variety of…
Multimedia Technology
With the success of websites such as YouTube, streaming is no doubt one of the most important multimedia applications. This module explains two very different
approaches to building a streaming application.
With a streaming server such as Microsoft…
approaches to building a streaming application.
With a streaming server such as Microsoft…
Beginning Excel
This textbook was written for a community college introductory course in spreadsheets utilizing Microsoft Excel. While the figures shown utilize Excel 2016, the textbook was written to be applicable to other versions of Excel as well. The book…
Augmented Reality
There is at present no publication specifically dedicated to analyzing the philosophical implications of augmented reality. Applications cover diverse fields like psychopathology and education, implications concern issues as diverse as negative…
Digital Classics Outside the Echo-Chamber : Teaching, Knowledge Exchange & Public Engagement
"Edited by organisers of “Digital Classicist” seminars in London and Berlin, this volume explores the impact of computational approaches to the study of antiquity on audiences other than the scholars who conventionally publish it. In addition to…
Laying the Foundation
Laying the Foundation: Digital Humanities in Academic Libraries examines the library’s role in the development, implementation, and instruction of successful digital humanities projects. It pays special attention to the critical role of librarians in…
The Missing Link: An Introduction to Web Development and Programming
Web development is an evolving amalgamation of languages that work in concert to receive, modify, and deliver information between parties using the Internet as a mechanism of delivery.
While it is easy to describe conceptually, implementation is…
While it is easy to describe conceptually, implementation is…
The Information Literacy User’s Guide: An Open
Good researchers have a host of tools at their disposal that make navigating today’s complex information ecosystem much more manageable. Gaining the knowledge, abilities, and self-reflection necessary to be a good researcher helps not only in…
Introduction to Internet Marketing
Internet marketing is the fastest growing and most exciting branch of marketing
today. as the world becomes ever more connected, keeping up with developments
and trends is vital for marketers trying to reach new audiences – who are…
today. as the world becomes ever more connected, keeping up with developments
and trends is vital for marketers trying to reach new audiences – who are…
Principles of Computer System Design: An Introduction
Principles of Computer System Design is the first textbook to take a principles-based approach to the computer system design. It identifies, examines, and illustrates fundamental concepts in computer system design that are common across operating…
Physical Modeling in MATLAB
Most books that use MATLAB are aimed at readers who know how to program. This book is for people who have never programmed before.
As a result, the order of presentation is unusual. The book starts with scalar values and works up to vectors and…
As a result, the order of presentation is unusual. The book starts with scalar values and works up to vectors and…
Introduction to Computing
Computer science studies how to describe, predict properties of, and efficiently implement information processes. This book introduces the most important ideas in computing using the Scheme and Python programming languages. It focuses on how to…
Introduction to Computer Graphics
A free, on-line textbook covering the fundamentals of computer graphics and computer graphics programming.
Introduction to Autonomous Robots
This book introduces concepts in mobile, autonomous robotics to 3rd-4th year students in Computer Science or a related discipline. The book covers principles of robot motion, forward and inverse kinematics of robotic arms and simple wheeled…
Introductory Business Statistics with Interactive Spreadsheets
Introductory Business Statistics with Interactive Spreadsheets – 1st Canadian Edition is an adaptation of Thomas K. Tiemann’s book, Introductory Business Statistics. This new edition still contains the basic ideas behind statistics, such as…
How to Think Like a Computer Scientist
"How to Think Like a Computer Scientist: Learning with Python" is an introduction to computer science using the Python programming language. It covers the basics of computer programming, including variables and values, functions, conditionals and…
Android Programming Tutorials
This book has been replaced by the omnibus edition of The Busy Coder's Guide to Android Development, and so this book is no longer available in digital form as a separate title. Visit the page for The Busy Coder's Guide to Android Development to…
Journalism
1.1 Why Study Journalism?
• Describe the purpose of the press.
• Explain the Founding Fathers’ motive for the First Amendment.
• Relate the watchdog role of a free press and its impact on society.
• Relate the role of a citizen in a democracy.
• Describe the purpose of the press.
• Explain the Founding Fathers’ motive for the First Amendment.
• Relate the watchdog role of a free press and its impact on society.
• Relate the role of a citizen in a democracy.
An Introduction to MATLAB and Mathcad
An introduction to programming and problem solving using both MATLAB and Mathcad.
An Introduction to Computer Networks
An introductory text for college or graduate course in computer networks, with a balance between practical matters and underlying principles. It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP.
Database Design
This book presents the concepts used in database systems, focusing on design process.
Introduction to Programming Languages
Introduction to Programming Languages is designed to formalize and consolidate the knowledge of programming languages gained in the introductory courses a computer science curriculum and to provide a base for further studies in the semantics and…
Support Vector Machines
Support Vector Machines - One of the most successful learning algorithms; getting a complex model at the price of a simple one. Lecture 14 of 18 of Caltech's Machine Learning Course - CS 156 by Professor Yaser Abu-Mostafa. View course materials in…
Database Design - 2nd Edition
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
Information Systems
Students need to understand systems and the systems concept, and they need to understand the role of ICT in enabling systems. Students will learn the characteristics of good systems (e.g., intuitive, likable, error-resistant, fast, flexible, and the…
Open Data Structures
There are plenty of books that teach introductory data structures. Some of them are very good. Most of them cost money, and the vast majority of computer science undergraduate students will shell out at least some cash on a data structures book.
Algorithms and Data Structures
This is a textbook for first year Computer Science. Algorithms and Data Structures With Applications to Graphics and Geometry.
Foundations of Computation
Foundations of Computation is a free textbook for a one-semester course in theoretical computer science. It has been used for several years in a course at Hobart and William Smith Colleges.