Towards Extensible And Adaptable Methods In Computing


Download Towards Extensible And Adaptable Methods In Computing PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Towards Extensible And Adaptable Methods In Computing book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Towards Extensible and Adaptable Methods in Computing


Towards Extensible and Adaptable Methods in Computing

Author: Shampa Chakraverty

language: en

Publisher: Springer

Release Date: 2018-11-04


DOWNLOAD





This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. The book is divided into five main sections: Agile Software Development, Data Management, Web Intelligence, Machine Learning and Computing in Education. These sub-domains of computing work together in mutually complementary ways to build systems and applications that scale well, and which can successfully meet the demands of changing times and contexts. The topics under each track have been carefully selected to highlight certain qualitative aspects of applications and systems, such as scalability, flexibility, integration, efficiency and context awareness. The first section (Agile Software Development) includes six contributions that address related issues, including risk management, test case prioritization and tools, open source software reliability and predicting the change proneness of software. The second section (Data Management) includes discussions on myriad issues, such as extending database caches using solid-state devices, efficient data transmission, healthcare applications and data security. In turn, the third section (Machine Learning) gathers papers that investigate ML algorithms and present their specific applications such as portfolio optimization, disruption classification and outlier detection. The fourth section (Web Intelligence) covers emerging applications such as metaphor detection, language identification and sentiment analysis, and brings to the fore web security issues such as fraud detection and trust/reputation systems. In closing, the fifth section (Computing in Education) focuses on various aspects of computer-aided pedagogical methods.

Workshop Proceedings of the 13th International AAAI Conference on Web and Social Media


Workshop Proceedings of the 13th International AAAI Conference on Web and Social Media

Author: Emilio Zagheni

language: en

Publisher: Frontiers Media SA

Release Date: 2020-07-31


DOWNLOAD





Modern Theories and Practices for Cyber Ethics and Security Compliance


Modern Theories and Practices for Cyber Ethics and Security Compliance

Author: Yaokumah, Winfred

language: en

Publisher: IGI Global

Release Date: 2020-04-10


DOWNLOAD





In today’s globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.