Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Degree Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Granting Institution
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
1,637,108 result(s) for "processing"
Sort by:
Big Data, Little Data, No Data
\"Big Data\" is on the covers ofScience, Nature, theEconomist, andWiredmagazines, on the front pages of theWall Street Journaland theNew York Times.But despite the media hyperbole, as Christine Borgman points out in this examination of data and scholarly research, having the right data is usually better than having more data; little data can be just as valuable as big data. In many cases, there are no data -- because relevant data don't exist, cannot be found, or are not available. Moreover, data sharing is difficult, incentives to do so are minimal, and data practices vary widely across disciplines.Borgman, an often-cited authority on scholarly communication, argues that data have no value or meaning in isolation; they exist within a knowledge infrastructure -- an ecology of people, practices, technologies, institutions, material objects, and relationships. After laying out the premises of her investigation -- six \"provocations\" meant to inspire discussion about the uses of data in scholarship -- Borgman offers case studies of data practices in the sciences, the social sciences, and the humanities, and then considers the implications of her findings for scholarly practice and research policy. To manage and exploit data over the long term, Borgman argues, requires massive investment in knowledge infrastructures; at stake is the future of scholarship.
Distributed computing pearls
\"Computers and computer networks are one of the most incredible inventions of the 20th century, having an ever-expanding role in our daily lives by enabling complex human activities in areas such as entertainment, education, and commerce. One of the most challenging problems in computer science for the 21st century is to improve the design of distributed systems where computing devices have to work together as a team to achieve common goals. In this book, the author has tried to gently introduce the general reader to some of the most fundamental issues and classical results of computer science underlying the design of algorithms for distributed systems, so that the reader can get a feel of the nature of this exciting and fascinating field called distributed computing. The book will appeal to the educated layperson, while computer-knowledgeable readers will be able to learn something new.\"--Page 4 of cover.
A real-time in-memory discovery service : leveraging hierarchical packaging information in a unique identifier network to retrieve track and trace information
The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called \"Discovery Service\" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book. This important book cover subjects such as: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management Security policies and mechanisms, various categories of attacks (e.g., denial-of-service),  global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.
Corpus Stylistics
This book combines stylistic analysis with corpus linguistics to present an innovative account of the phenomenon of speech, writing and thought presentation - commonly referred to as 'speech reporting' or 'discourse presentation'. This new account is based on an extensive analysis of a quarter-of-a-million word electronic collection of written narrative texts, including both fiction and non-fiction. The book includes detailed discussions of: The construction of this corpus of late twentieth-century written British narratives taken from fiction, newspaper news reports and (auto)biographies The development of a manual annotation system for speech, writing and thought presentation and its application to the corpus. The findings of a quantitive and qualitative analysis of the forms and functions of speech, writing and thought presentation in the three genres represented in the corpus. The findings of the analysis of a range of specific phenomena, including hypothetical speech, writing and thought presentation, embedded speech, writing and thought presentation and ambiguities in speech, writing and thought presentation. Two case studies concentrating on specific texts from the corpus. Corpus Stylistics shows how stylistics, and text/discourse analysis more generally, can benefit from the use of a corpus methodology and the authors' innovative approach results in a more reliable and comprehensive categorisation of the forms of speech, writing and thought presentation than have been suggested so far. This book is essential reading for linguists interested in the areas of stylistics and corpus linguistics. Elena Semino is Senior Lecturer in the Department of Linguistics and Modern English Language at Lancaster University. She is the author of Language and World Creation in Poems and Other Texts (1997), and co-editor (with Jonathan Culpetter) of Cognitive Stylistics: Language and Cognition in Text Analysis (2002). Mick Short is Professor of English Language and Literature at Lancaster University. He has written Exploring the Language of Poems, Plays and Prose (1997) and (with Geoffrey Leech) Style in Fiction (1997). He founded the Poetics and Linguistics Association and was the founding editor of its international journal, Language and Literature. 1. A Corpus-Based Approach to the Study of Discourse Presentation in Written Narratives 2. Methodology: The Construction and Annotation of the Corpus 3. A Revised Model of Speech, Writing and Thought Presentation 4. Speech Presentation in the Corpus: A Quantitative and Qualitative Analysis 5. Writing Presentation in the Corpus: A Quantitative and Qualitative Analysis 6. Thought Presentation in the Corpus: A Quantitative and Qualitative Analysis 7. Specific Phenomena in Speech, Writing Presentation 8. Case Studies of Specific Texts from the Corpus 9. Conclusion