If the intelligence of artificial systems were to surpass that of humans, humanity would face significant risks. The time has come to consider these issues, and this consideration must include progress in artificial intelligence (AI) as much as insights from AI theory.Featuring contributions from le..
If the intelligence of artificial systems were to surpass that of humans, humanity would face significant risks. The time has come to consider these issues, and this consideration must include progress in artificial intelligence (AI) as much as insights from AI theory.Featuring contributions from le..
As computers become faster, use more energy, and older models become obsolete more quickly, the question is often asked: What can the engineering and computer science community do to make computing greener? Roadmap to Greener Computing defines the challenges involved in making computing more environ..
As computers become faster, use more energy, and older models become obsolete more quickly, the question is often asked: What can the engineering and computer science community do to make computing greener? Roadmap to Greener Computing defines the challenges involved in making computing more environ..
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.T..
Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.T..
This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores practical solutions to a wide range of private cloud computing security issues. The knowledge imparted will enable readers to deter..
This book provides a deep understanding of state-of-art methods for simulation of heterogeneous crowds in computer graphics. It will cover different aspects that are necessary to achieve plausible crowd behaviors. The book will be a review of the most recent literature in this field that can help pr..
This book uses tutorials and new material to describe the basic concepts of soft-computing which potentially can be used in real-life sensor network applications. It is organized in a manner that exemplifies the use of an assortment of soft-computing applications for solving different problems in se..
This book uses tutorials and new material to describe the basic concepts of soft-computing which potentially can be used in real-life sensor network applications. It is organized in a manner that exemplifies the use of an assortment of soft-computing applications for solving different problems in se..
The key focus of the book is on engineering aspects of the subject field
Updated, comprehensive text covering offshore drilling, production and field development and offers complete coverage of offshore oil and gas operations.Also, key maintenance issues like pigging, corrosion, subsidence are di..
The key focus of the book is on engineering aspects of the subject field
Updated, comprehensive text covering offshore drilling, production and field development and offers complete coverage of offshore oil and gas operations.Also, key maintenance issues like pigging, corrosion, subsidence are di..