SpringerBriefs in computer science
Resource Information
The series SpringerBriefs in computer science represents a set of related resources, especially of a specified kind, found in Sydney Jones Library, University of Liverpool.
The Resource
SpringerBriefs in computer science
Resource Information
The series SpringerBriefs in computer science represents a set of related resources, especially of a specified kind, found in Sydney Jones Library, University of Liverpool.
- Label
- SpringerBriefs in computer science
209 Items in the Series SpringerBriefs in computer science
Context
Context of SpringerBriefs in computer scienceMembers
No resources found
No enriched resources found
- SpringerBriefs in computer science, 8
- 4G femtocells : resource allocation and interference management
- A Primer on Quantum Computing
- A Survey on 3D Cameras : Metrological Comparison of Time-of-Flight, Structured-Light and Active Stereoscopy Technologies
- A contrario line segment detection
- A general framework for reasoning on inconsistency
- A primer of multicast routing
- A proof theory for description logics
- A survey of core research in information systems
- A survey of data leakage detection and prevention solutionsh[electronic book]
- A survey of fractal dimensions of networks
- Agile risk management
- An introduction to distance geometry applied to molecular geometry
- Android application security : a semantics and context-aware approach
- Annual dynamics of daylight variability and contrast : a simulation-based approach to quantifying visual effects in architecture
- Applications of algebra to communications, control, and signal processing
- Art, design and technology : collaboration and implementation
- Auction based resource provisioning in cloud computing
- Automated configuration problem solving
- Automated software and service composition : a survey and evaluating review
- Automatic Design of Decision-Tree Induction Algorithms
- Automatic generation of combinatorial test data
- Automatic malware analysis : an emulator based approach
- Autonomic cooperative networking
- Belief revision in non-classical logics
- Big data 2.0 processing systems : a survey
- Bioinformatics techniques for drug discovery : applications for complex diseases
- Boosted statistical relational learners : from benchmarks to data-driven medicine
- Bootstrapping trust in modern computers
- Building secure defenses against code-reuse attacks
- COMPUTATIONAL TECHNIQUES FOR HUMAN SMILE ANALYSIS
- Cloud based 5G wireless networks
- Cognitive virtual network operator games
- Combinatorial testing in cloud computing
- Communication challenges and solutions in the smart grid
- Compilation for secure multi-party computation
- Composing fisher kernels from deep neural models : a practitioner's approach
- Computational methods for processing and analysis of biological pathways
- Context management for distributed and dynamic context-aware computing
- Context-aware collaborative prediction
- Cooperative networking in a heterogeneous wireless medium
- Criminal justice forecasts of risk : a machine learning approach
- Cross-cultural multimedia computing : semantic and aesthetic modeling
- Crowd-powered mobile computing and smart things
- Cyber security : deterrence and IT protection for critical infrastructures
- Cyber-risk management
- Data and energy integrated communication networks : a brief introduction
- Data dissemination and query in mobile social networksh[electronic book]
- Data mining in large sets of complex data
- Data science careers, training, and hiring : a comprehensive guide to the data ecosystem : how to build a successful data science career, program, or unit
- Decentralized Reasoning in Ambient Intelligence
- Deep Learning : convergence to big data analytics
- Diffusion in social networks
- Digital image processing : practical approach
- Digital watermarking techniques in curvelet and ridgelet domain
- Discriminative pattern discovery on biological networks
- Distributed medium access control in wireless networks
- Distributed space-time coding
- Dynamic cloud collaboration platform : a market-oriented approach
- Edge computing : a primer
- Efficient algorithms for discrete wavelet transform
- Efficient biometric indexing and retrieval techniques for large-scale systems
- Elements of cloud computing security : a survey of key practicalities
- Elements of cloud storage security : concepts, designs and optimized practices
- Emergent Interfaces for Feature Modularization
- Enabling secure and privacy preserving communications in smart grids
- Energy-aware scheduling on multiprocessor platforms
- Energy-aware scheduling on multiprocessor platforms
- Energy-efficient area coverage for intruder detection in sensor networks
- Energy-efficient high performance computing : measurement and tuning
- Enhanced building information models : using IoT services and integration patterns
- Entropy guided transformation learning : algorithms and applications
- Event-driven surveillance : possibilities and challenges
- Explaining algorithms using metaphors
- Exploring the use of eye gaze controlled interfaces in automotive environments
- Facial kinship verification : a machine learning approach
- Failure-modes-based software reading
- Fast compact algorithms and software for spline smoothing
- From fault classification to fault tolerance for multi-agent systems
- Fundamental computing forensics for Africa : a case study of the science in Nigeria
- GIS-based analysis of coastal lidar time-series
- Generalized Jeffrey conditionalization : A Frequentist Semantics of Partial Conditionalization
- Group cell architecture for cooperative communications
- Guide to Cisco routers configuration : becoming a router geek
- Guide to ILDJIT
- Guide to digital forensics : a concise and practical introduction
- Guide to modeling and simulation of systems of systems : user's reference
- Guide to programming for the digital humanities : lessons for introductory Python
- Health informatics in the cloud
- Heterogeneous facial analysis and synthesis
- Homomorphic encryption and applications
- Homomorphic signature schemes : a survey
- Human action recognition with depth cameras
- ITIL® 2011 at a glance
- Image quality assessment of computer-generated images : based on machine learning and soft computing
- Innovative technologies in everyday life
- Innovative web applications for analyzing traffic operations
- Interactive co-segmentation of objects in image collections
- Intermittently connected mobile ad hoc networks : from routing to content distribution
- Internet video data streaming : energy-saving and cost-aware methods
- Interrupt handling schemes in operating systems
- Interworking of wireless LANs and cellular networks
- Introduction to image processing using R : learning by examples
- JRuby Rails web application development
- Large group decision making : creating decision support approaches at scale
- Linear network error correction coding
- Link prediction in social networks : role of power law distribution
- Location privacy preservation in cognitive radio networks
- Maritime wideband communication networks : video transmission scheduling
- Markov models for handwriting recognition
- Markov models for handwriting recognition
- Matrix and tensor factorization techniques for recommender systems
- Mining lurkers in online social networks : principles, models, and computational methods
- Mobile authentication : problems and solutions
- Mobile data mining
- Mobile information retrieval
- Mobile web browsing using the cloud
- Modeling and simulating command and control : for organizations under extreme situations
- Modeling trust context in networks
- Morphological modeling of terrains and volume data
- Motion history images for action recognition and understanding
- Multimedia QoE evaluation
- Network robustness under large-scale attacks
- Network-based analysis of dynamical systems : methods for controllability and observability analysis, and optimal sensor placement
- Non-orthogonal multiple access for massive connectivity
- Omnidirectional vision systems : calibration, feature extraction and 3D information
- On the Construction of Engineering Handbooks : with an Illustration from the Railway Safety Domain
- On the mathematics of modelling, metamodelling, ontologies and modelling languages
- Online social media content delivery : a data-driven approach
- Ontology-based data access leveraging subjective reports
- Open problems in spectral dimensionality reduction
- Optical flow and trajectory estimation methods
- Parallel Computing Hits the Power Wall : Principles, Challenges, and a Survey of Solutions
- Parallel and distributed map merging and localization : algorithms, tools and strategies for robotic networks
- Peer-to-peer query processing over multidimensional data
- Performance evaluation software : moving object detection and tracking in videos
- Pervasive wireless environments : detecting and localizing user spoofing
- Physical layer approaches for securing wireless communication systems
- Physical layer security in random cellular networks
- Physical play and children's digital games
- Point-of-interest recommendation in location-based social networks
- Power distribution and performance analysis for wireless communication networksh[electronic book]
- Privately and publicly verifiable computing techniques : a survey
- Protein homology detection through alignment of Markov random fields : using MRFalign
- QoS prediction in cloud and service computing : approaches and applications
- Quantitative security risk assessment of enterprise networks
- Querying moving objects detected by sensor networks
- RFID as an infrastructure
- Rapid serial visual presentation : design for cognition
- Real-time detection of lines and grids : by PClines and other approaches
- Recurrent neural networks for short-term load forecasting : an overview and comparative analysis
- Repairing and querying databases under aggregate constraints
- Research and development in art, design and creativity
- Research and development in the academy, creative industries and applications
- Resource Allocation for Software Defined Networks
- Resource Management in Utility and Cloud Computing
- Resource management for Internet of Things
- Resource management for device-to-device underlay communication
- Rhodes framework for Android platform and BlackBerry® smartphonesh[electronic book]
- Robust motion detection in real-life scenarios
- Routing for wireless multi-hop networks
- Scalable parallel programming applied to H.264/AVC decoding
- Secure and trustworthy transportation cyber-physical systems
- Security and privacy in mobile social networks
- Security for Multi-hop Wireless Networks
- Security for cloud storage systems
- Security for wireless implantable medical devices
- Self-* and P2P for network management : design principles and case studies
- Semantic Web-based systems : quality assessment models
- Semantic web-based intelligent geospatial web services
- Sentiment analysis for PTSD signals
- Service placement in ad hoc networks
- Smart TV security : media playback and digital video broadcast.
- Smartphone-based indoor map construction : principles and applications
- Social media audit : measure for impact
- Software Defined Systems : Sensing, Communication and Computation
- Software fault detection and correction : modeling and applications
- Software similarity and classificationh[electronic book]
- Software testing in the cloud : migration and execution
- Spatial AutoRegression (SAR) model : parameter estimation techniques
- Spatial auditory human-computer interfaces
- Spatial network data : concepts and techniques for summarization
- Spatio-temporal data streams
- Spatio-temporal networks : modeling and algorithms
- Spatio-temporal recommendation in social media
- Spatiotemporal frequent pattern mining from evolving region trajectories
- State of the art in digital media and applications
- Studies on urban vehicular ad-hoc networks
- Support vector machines and perceptrons : learning, optimization, classification, and application to social networks
- Syntactic n-grams in computational linguistics
- Systems for big graph analytics
- The design of cloud workflow systems
- Thread and data mapping for multicore systems : improving communication and memory accesses
- Time-of-flight cameras : principles, methods and applications
- Traceback and anonymity
- Traffic measurement on the internet
- Traffic-sign recognition systems
- Twitter data analytics
- Two bit circus and the future of entertainment
- Two-dimensional change detection methods : remote sensing applications
- Understanding high-dimensional spaces
- Understanding modern dive computers and operation : protocols, models, tests, data, risk and applications
- Unsupervised information extraction by text segmentation
- Visual and text sentiment analysis through hierarchical deep learning networks
- Visual indexing and retrieval
- Web proxy cache replacement strategies : simulation, implementation, and performance evaluation
- Wireless communications networks for the smart grid
- Wireless coordinated multicell systems : architectures and precoding designs
- Wireless health
- Wireless sensor networks : distributed consensus estimation
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/mibIE77yv_M/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/mibIE77yv_M/">SpringerBriefs in computer science</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Series SpringerBriefs in computer science
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/mibIE77yv_M/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/mibIE77yv_M/">SpringerBriefs in computer science</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>