Search Constraints
Number of results to display per page
Results for:
Search Results
-
Courseware
This course examines human-computer interaction in the context of graphical user interfaces. The course covers human capabilities, design principles, prototyping techniques, evaluation techniques, and the implementation of graphical user interfaces. Deliverables include short programming assignments and a semester-long group project. Students taking the graduate version also have readings from current literature and additional assignments.
- Subjects:
- Computing
- Keywords:
- Human-computer interaction User interfaces (Computer systems)
- Resource Type:
- Courseware
-
Courseware
This is an intermediate algorithms course with an emphasis on teaching techniques for the design and analysis of efficient algorithms, emphasizing methods of application. Topics include divide-and-conquer, randomization, dynamic programming, greedy algorithms, incremental improvement, complexity, and cryptography.
- Subjects:
- Computing
- Keywords:
- Algorithms
- Resource Type:
- Courseware
-
Courseware
This course includes interactive demonstrations which are intended to stimulate interest and to help students gain intuition about how artificial intelligence methods work under a variety of circumstances.
- Subjects:
- Computing
- Keywords:
- Artificial intelligence
- Resource Type:
- Courseware
-
Courseware
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- Courseware
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book
-
e-book
Pattern recognition has gained significant attention due to the rapid explosion of internet- and mobile-based applications. Among the various pattern recognition applications, face recognition is always being the center of attraction. With so much of unlabeled face images being captured and made available on internet (particularly on social media), conventional supervised means of classifying face images become challenging. This clearly warrants for semi-supervised classification and subspace projection. Another important concern in face recognition system is the proper and stringent evaluation of its capability. This book is edited keeping all these factors in mind. This book is composed of five chapters covering introduction, overview, semi-supervised classification, subspace projection, and evaluation techniques.
- Subjects:
- Electronic and Information Engineering and Computing
- Keywords:
- Human face recognition (Computer science)
- Resource Type:
- e-book
-
e-book
Advances and Applications in Mobile Computing offers guidelines on how mobile software services can be used in order to simplify the mobile users' life. The main contribution of this book is enhancing mobile software application development stages as analysis, design, development and test. Also, recent mobile network technologies such as algorithms, decreasing energy consumption in mobile network, and fault tolerance in distributed mobile computing are the main concern of the first section. In the mobile software life cycle section, the chapter on human computer interaction discusses mobile device handset design strategies, following the chapters on mobile application testing strategies. The last section, mobile applications as service, covers different mobile solutions and different application sectors.
- Subjects:
- Mobile Computing
- Keywords:
- Mobile computing
- Resource Type:
- e-book
-
e-book
Nowadays, mobile communication services are penetrating into our society at an explosive growth rate. Applications in mobile devices offer limitations, restriction, and guidelines on how mobile software can be used in order to simplify the mobile usage. As smart phones and tablets are becoming the daily computing device of choice for young ages, it is expected that mobile applications and services should be as flexible, high quality, and secure as the desktop systems. In this book, latest trends in mobile computing will be discussed. In the first section, cloud computing topics will be discussed widely into four chapters to give information to the reader about topics such as challenges, services, edge computing, and distributed clouds needed to integrate this promising issue into the next generation.
- Subjects:
- Mobile Computing
- Keywords:
- Mobile computing
- Resource Type:
- e-book
-
e-book
Evolutionary algorithms are successively applied to wide optimization problems in the engineering, marketing, operations research, and social science, such as include scheduling, genetics, material selection, structural design and so on. Apart from mathematical optimization problems, evolutionary algorithms have also been used as an experimental framework within biological evolution and natural selection in the field of artificial life.
- Subjects:
- Computing
- Keywords:
- Mathematical optimization Genetic algorithms Evolutionary programming (Computer science)
- Resource Type:
- e-book
-
e-book
The development of modern information systems is a demanding task. New technologies and tools are designed, implemented and presented in the market on a daily bases. User needs change dramatically fast and the IT industry copes to reach the level of efficiency and adaptability for its systems in order to be competitive and up-to-date. Thus, the realization of modern information systems with great characteristics and functionalities implemented for specific areas of interest is a fact of our modern and demanding digital society and this is the main scope of this book. Therefore, this book aims to present a number of innovative and recently developed information systems. It is titled "Modern Information Systems" and includes 8 chapters. This book may assist researchers on studying the innovative functions of modern systems in various areas like health, telematics, knowledge management, etc. It can also assist young students in capturing the new research tendencies of the information systems' development.
- Subjects:
- Environmental Sciences and Computing
- Keywords:
- Medical informatics Knowledge management Management information systems
- Resource Type:
- e-book