eBooks-it.org Logo
eBooks-IT.org Inner Image

Springer eBooks Page 75

Download free Springer eBooks Page 75

Semantic Web

Concepts, Technologies and Applications
Semantic Web Image
The Web is growing at an astounding pace surpassing the 8 billion page mark. However, most pages are still designed for human consumption and cannot be processed by machines. This book provides a well-paced introduction to the Semantic Web. It covers a wide range of topics, from new trends (ontologies, rules) to existing technologies (Web Services and software agents) to more formal aspects (logic and inference). It includes: real-world (and complete) examples of the application of Semantic Web concepts; how the technology presented and discussed throughout the book can be extended to other application areas....

Ajax in Oracle JDeveloper

Ajax in Oracle JDeveloper Image
Asynchronous JavaScript and XML (Ajax) is a web technique used to transfer data between a browser and server asynchronously without posting the web page to the server. "Asynchronously" implies that the processing of the web page continues while the Ajax request is sent to the server and a response is received from the server. The web page, or section(s) of the web page,is refreshed with the Ajax response without reposting the web page. Ajax has the following advantages over non-Ajax web applications. - Reduced response time and reduced server load, as the complete web page is not reposted. - Reduced bandwidth of web applications as only data is transferred and the HTML format is applied in the browser. - Separation of data, format and sty...

Coding Theory and Algebraic Geometry

Coding Theory and Algebraic Geometry Image
About ten years ago, V.D. Goppa found a surprising connection between the theory of algebraic curves over a finite field and error-correcting codes. The aim of the meeting "Algebraic Geometry and Coding Theory" was to give a survey on the present state of research in this field and related topics. The proceedings contain research papers on several aspects of the theory, among them: Codes constructed from special curves and from higher-dimensional varieties, Decoding of algebraic geometric codes, Trace codes, Exponen- tial sums, Fast multiplication in finite fields, Asymptotic number of points on algebraic curves, Sphere packings....

Fractal Image Compression

Theory And Application
Fractal Image Compression Image
This book presents the theory and application of new methods of image compression based on self-transformations of an image. These methods lead to a representation of an image as a fractal, an object with detail at all scales. Very practical and completely up-to-date, this book will serve as a useful reference for those working in image processing and encoding and as a great introduction for those unfamiliar with fractals. The book begins with an elementary introduction to the concept of fractal image compression and contains a rigorous description of all the relevant mathemtics of the subjects....

Computer Viruses and Malware

Computer Viruses and Malware Image
Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for advanced-level students in computer science....



2007 - 2017 © eBooks-IT.org