eBooks-it.org Logo
eBooks-IT.org Inner Image

Springer eBooks Page 42

Download free Springer eBooks Page 42

Fault-Tolerant Search Algorithms

Reliable Computation with Unreliable Information
Fault-Tolerant Search Algorithms Image
Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent complexity, information systems are naturally prone to errors, which may appear at any level as imprecisions in the data, bugs in the software, or transient or permanent hardware failures. This book provides a concise, rigorous and up-to-date account of different approaches to fault-tolerance in the context of algorithmic search theory. Thanks to their basic st...

Fuzzy XML Data Management

Fuzzy XML Data Management Image
This book presents an exhaustive and timely review of key research work on fuzzy XML data management, and provides readers with a comprehensive resource on the state-of-the art tools and theories in this fast growing area. Topics covered in the book include: representation of fuzzy XML, query of fuzzy XML, fuzzy database models, extraction of fuzzy XML from fuzzy database models, reengineering of fuzzy XML into fuzzy database models, and reasoning of fuzzy XML. The book is intended as a reference guide for researchers, practitioners and graduate students working and/or studying in the field of Web Intelligence, as well as for data and knowledge engineering professionals seeking new approaches to replace traditional methods, which may be unnecessarily...

Enterprise Networks and Logistics for Agile Manufacturing

Enterprise Networks and Logistics for Agile Manufacturing Image
Enterprise Networks and Logistics for Agile Manufacturing presents a focused collection of quality chapters on state-of-the-art research efforts in the areas of enterprise networks and logistics, as well as their practical applications towards agile manufacturing. With the increasing decentralisation of manufacturing systems and outsourcing of processes, more robust and practical approaches and systems are needed to support agile manufacturing operations. Enterprise Networks and Logistics for Agile Manufacturing consists of two major sections: the first presents a broad-based review of the key areas of research in enterprise networks and logistics; the second focuses on an in-depth treatment of a particular methodology or system relevant to the book ...

Agile Software Development

Best Practices for Large Software Development Projects
Agile Software Development Image
Software Development is moving towards a more agile and more flexible approach. It turns out that the traditional "waterfall" model is not supportive in an environment where technical, financial and strategic constraints are changing almost every day. But what is agility? What are todays major approaches? And especially: What is the impact of agile development principles on the development teams, on project management and on software architects? How can large enterprises become more agile and improve their business processes, which have been existing since many, many years? What are the limitations of Agility? And what is the right balance between reliable structures and flexibility? This book will give answers to these questions. A strong ...

Security-aware Cooperation in Cognitive Radio Networks

Security-aware Cooperation in Cognitive Radio Networks Image
This brief investigates spectrum efficient and energy efficient strategies, known as cognitive radio networks (CRNs), to ensure secure cooperation between licensed and unlicensed users. The authors address issues of spectrum scarcity, spectrum sensing, transmission performance, trust-aware cooperation, and secure communications. Two security-aware cooperation based spectrum access schemes are presented. The first is a trust-aware cooperative framework for CRNs to improve the throughput or energy efficiency of licensed users and offer transmission opportunities to unlicensed users, taking into consideration the trustworthiness of unlicensed users. The second scheme is a cooperative framework to enhance secure communications of licensed users. An intro...



2007 - 2017 © eBooks-IT.org