5b3ec6e36348a.jpeg
PDF
Network Innovation through OpenFlow and SDN: Principles and Design

Software-defined networking (SDN) technologies powered by the OpenFlow protocol provide viable options to address the bandwidth needs of next-generation computer networks. And, since many large corporations already produce network devices that support the OpenFlow standard, there are opportunities for those who can manage complex and large-scale networks using these technologies. Network Innovation through OpenFlow and SDN: Principle...

5b3ec6dfb7efa.jpeg
PDF
Powerful PowerPoint for Educators

This timely book helps educators unleash the interactive potential of PowerPoint to build their own multimedia material that perfectly matches the needs of their students. • Tips for modifying included examples into classroom projects • Updated material includes advanced scripting techniques, new figures, and new interactive features of PowerPoint • Numerous quizzes and tests to reinforce skills • A selection of commonly-used templat...

5b3c26ba37c36.jpeg
PDF
Knowledge Mining Using Intelligent Agents

Knowledge Mining Using Intelligent Agents explores the concept of knowledge discovery processes and enhances decision-making capability through the use of intelligent agents like ants, termites and honey bees. In order to provide readers with an integrated set of concepts and techniques for understanding knowledge discovery and its practical utility, this book blends two distinct disciplines -- data mining and knowledge discovery pro...

5b3afa6292661.jpg
PDF
Irods Primer 2: Integrated Rule-Oriented Data System

Policy-based data management enables the creation of community-specific collections. Every collection is created for a purpose. The purpose defines the set of properties that will be associated with the collection. The properties are enforced by management policies that control the execution of procedures that are applied whenever data are ingested or accessed. The procedures generate state information that defines the outcome of enf...

5b3afa613166a.jpeg
PDF
Anonymous Communication Networks

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous commun...

5b3af18f7c4b0.jpg
PDF
Mobile User Research: A Practical Guide

This book will give you a practical overview of several methods and approaches for designing mobile technologies and conducting mobile user research, including how to understand behavior and evaluate how such technologies are being (or may be) used out in the world. Each chapter includes case studies from our own work and highlights advantages, limitations, and very practical steps that should be taken to increase the validity of the...

5b397908e83b1.jpeg
PDF
Models of Network Reliability

Unique in its approach, Models of Network Reliability: Analysis, Combinatorics, and Monte Carlo provides a brief introduction to Monte Carlo methods along with a concise exposition of reliability theory ideas. From there, the text investigates a collection of principal network reliability models, such as terminal connectivity for networks with unreliable edges and/or nodes, network lifetime distribution in the process of its destruct...

5b397907544c8.jpeg
PDF
Learning OpenCV: Computer Vision with the OpenCV Library

Learning OpenCV puts you in the middle of the rapidly expanding field of computer vision. Written by the creators of the free open source OpenCV library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on that data. Computer vision is everywhere-in security systems, manufacturing inspection systems, medical image analysis, Unma...

5b3813107c855.jpeg
PDF
Advanced Techniques in Multimedia Watermarking

In recent years, the tremendous advancement of digital technology has increased the ease with which digital multimedia files are stored, transmitted, and reproduced. Because traditional copyright methods are unsuitable for establishing ownership, digital watermarking is considered one of the best solutions to prevent illegal and malicious copying and distribution of digital media. Advanced Techniques in Multimedia Watermarking: Image...

5b38130e5ebb4.jpg
PDF
Think Like a Data Scientist

Summary Think Like a Data Scientist presents a step-by-step approach to data science, combining analytic, programming, and business perspectives into easy-to-digest techniques and thought processes for solving real world data-centric problems. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Data collected from customers, scientific measurements, IoT sen...