This book proposes new ways of thinking about high-dimensional spaces using two models: the skeleton that relates the clusters to one another, and the boundaries in empty space that provide new perspectives on outliers and on outlying regions.
After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners.
Since the introduction of Hoares’ Communicating Sequential Process (CSP) notation, powerful new tools have transformed CSP into a practical way of describing industrial-sized problems. This book presents the basic CSP knowledge needed to utilize those tools.
This book describes the essentials of radio frequency identification (RFID)systems as well as their target markets. It provides a comparative analysis of commercially off the shelf RFID systems and emphasizes the strengths and weaknesses of each.
This book examines trends in ubiquitous computing, assessing artificial intelligence, temporal and spatial reasoning and user-centric design methodologies along with mobile and wireless networking, group displays and context-driven adaptive presentations.
This book focuses on a critical concept of intellectual turning points in the context of critical thinking, scientific discovery, and problem solving. The author presents a novel analytical and experimental system that applies to both past and future data.