Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Android Application Development for the Intel Platform
The number of Android devices running on Intel processors has increased since Intel and Google announced, in late 2011, that they would be working together to optimize future versions of Android for Intel Atom processors. Today, Intel processors can be found in Android smartphones and tablets made by some of the top manufacturers of Android devices...
Programming Languages and Systems
This book constitutes the proceedings of the 27th European Symposium on Programming, ESOP 2018, which took place in Thessaloniki, Greece in April 2018, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018. The 36 papers presented in this volume were carefully reviewed and selected from 114 submissions. The ...
Computer Vision Metrics
Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, ...
Investigations Into the Phenomenology and the Ontology of the Work of Art
This book investigates the nature of aesthetic experience and aesthetic objects. Written by leading philosophers, psychologists, literary scholars and semioticians, the book addresses two intertwined issues. The first is related to the phenomenology of aesthetic experience: The understanding of how human beings respond to artworks, how we process l...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
Computer Aided Verification
The book set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organ...
Knowledge and Institutions
This book bridges the disciplinary boundaries within the social sciences to explore the role of social institutions in shaping geographical contexts, and in creating new knowledge. It includes theorizations as well as original empirical case studies on the emergence, maintenance and change of institutions as well as on their constraining and enabli...
Migration in the Southern Balkans
This book collects ten essays that look at intra-regional migration in the Southern Balkans from the late Ottoman period to the present. It examines forced as well as voluntary migrations and places these movements within their historical context, including ethnic cleansing, population exchanges, and demographic engineering in the service of nation...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Principles and Practice of Case-based Clinical Reasoning Education
This book describes and explains the educational method of Case-Based Clinical Reasoning (CBCR) used successfully in medical schools to prepare students to think like doctors before they enter the clinical arena and become engaged in patient care. Although this approach poses the paradoxical problem of a lack of clinical experience that is so essen...
Interdisciplinary Perspectives on Mortality and its Timings
This volume provides a series of illuminating perspectives on the timings of death, through in-depth studies of Shakespearean tragedy, criminal execution, embalming practices, fears of premature burial, rumours of Adolf Hitler's survival, and the legal concept of brain death. In doing so, it explores a number of questions, including: how do we...
Remembering and Disremembering the Dead
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this wa...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x...
Embedded Firmware Solutions
Embedded Firmware Solutions is the perfect introduction and daily-use field guide - for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate IntelĀ® Architecture designs into their plans. Featuring hands-on exampl...
Forecasting and Assessing Risk of Individual Electricity Peaks
The overarching aim of this book is to present self-contained theory and algorithms for investigation and prediction of electric demand peaks. A cross-section of popular demand forecasting algorithms from statistics, machine learning and mathematics is presented, followed by extreme value theory techniques with examples.In order to achieve carbon t...
Cloud Native Applications
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Think Java
Think Java is a hands-on introduction to computer science and programming used by many universities and high schools around the world. Its conciseness, emphasis on vocabulary, and informal tone make it particularly appealing for readers with little or no experience. The book starts with the most basic programming concepts and gradually works its wa...
Lifestyle in Siberia and the Russian North
Lifestyle in Siberia and the Russian North breaks new ground by exploring the concept of lifestyle from a distinctly anthropological perspective. Showcasing the collective work of ten experienced scholars in the field, the book goes beyond concepts of tradition that have often been the focus of previous research, to explain how political, economic ...
Essays on Paula Rego
In these powerful and stylishly written essays, Maria Manuel Lisboa dissects the work of Paula Rego, the Portuguese-born artist considered one of the greatest artists of modern times. Focusing primarily on Rego's work since the 1980s, Lisboa explores the complex relationships between violence and nurturing, power and impotence, politics and th...
The Poetics and Politics of Alzheimer's Disease Life-Writing
This is the first book-length exploration of the thoughts and experiences expressed by dementia patients in published narratives over the last thirty years. It contrasts third-person caregiver and first-person patient accounts from different languages and a range of media, focusing on the poetical and political questions these narratives raise: wha...
Compositionality and Concepts in Linguistics and Psychology
By highlighting relations between experimental and theoretical work, this volume explores new ways of addressing one of the central challenges in the study of language and cognition. The articles bring together work by leading scholars and younger researchers in psychology, linguistics and philosophy. An introductory chapter lays out the background...
Children and Peace
This free book brings together discourse on children and peace from the 15th International Symposium on the Contributions of Psychology to Peace, covering issues pertinent to children and peace and approaches to making their world safer, fairer and more sustainable. The book is divided into nine sections that examine traditional themes (social con...
Heterogeneity, High Performance Computing, Self-Organization and the Cloud
This book addresses the most recent developments in cloud computing such as HPC in the Cloud, heterogeneous cloud, self-organising and self-management, and discusses the business implications of cloud computing adoption. Establishing the need for a new architecture for cloud computing, it discusses a novel cloud management and delivery architecture...
Digital Video Concepts, Methods, and Metrics
Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to...
Think Data Structures
If you're a student studying computer science or a software developer preparing for technical interviews, this practical book will help you learn and review some of the most important ideas in software engineering - data structures and algorithms - in a way that's clearer, more concise, and more engaging than other materials. By emphas...
Tales of Darkness and Light
Soso Tham (1873-1940), the acknowledged poet laureate of the Khasis of northeastern India, was one of the first writers to give written poetic form to the rich oral tradition of his people. Poet of landscape, myth and memory, Soso Tham paid rich and poignant tribute to his tribe in his masterpiece The Old Days of the Khasis. Janet Hujon's v...
Linux Appliance Design
Modern appliances are complex machines with processors, operating systems, and application software. While there are books that will tell you how to run Linux on embedded hardware, and books on how to build a Linux application, Linux Appliance Design is the first book to demonstrate how to merge the two and create a Linux appliance. You'll see...
Hacking the Xbox
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects ...
The Design and Implementation of the Anykernel and Rump Kernels
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
Blown to Bits
For thousands of years, people have been saying that the world is changing and will never again be the same. Yet the profound changes happening today are different, because they result from a specific technological development. It is now possible, in principle, to remember everything that anyone says, writes, sings, draws, or photographs. Everythi...

1 2 3 4 5 6