This book proposes new ways of thinking about high-dimensional spaces using two models: the skeleton that relates the clusters to one another, and the boundaries in empty space that provide new perspectives on outliers and on outlying regions.
After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners.
Since the introduction of Hoares’ Communicating Sequential Process (CSP) notation, powerful new tools have transformed CSP into a practical way of describing industrial-sized problems. This book presents the basic CSP knowledge needed to utilize those tools.
This book examines trends in ubiquitous computing, assessing artificial intelligence, temporal and spatial reasoning and user-centric design methodologies along with mobile and wireless networking, group displays and context-driven adaptive presentations.
This book focuses on a critical concept of intellectual turning points in the context of critical thinking, scientific discovery, and problem solving. The author presents a novel analytical and experimental system that applies to both past and future data.
This is one of the first books to provide an overview of trust management for open service-oriented environments. It presents social network-based techniques for establishing trust in decentralized environments.