Author(s): Simone Barbosa, Panos Markopoulos, Fabio Paternò, Simone Stumpf, Stefano Valtolina
This book constitutes the refereed proceedings of the 6th International Symposium on End-User Development, IS-EUD 2017, held in Eindhoven, The…Author(s): Soyata, Tolga
Today’s smartphones utilize a rapidly developing range of sophisticated applications, pushing the limits of mobile processing power. The increased demand…Author(s): Nathan Wallace
Key features include integrated learning about all four aspects of COM (COM, Automation, ActiveX, and DCOM), an emphasized component creation…Author(s): Paul Yao, David Durant
If you’re interested in developing for this burgeoning platform, there is no one better able to get you up-to-speed.”Author(s): Derar Alhussein
Data engineers proficient in Databricks are currently in high demand. As organizations gather more data than ever before, skilled data…Author(s): Rashmi Shah
This comprehensive guide, presented by QuickTechie.com, is meticulously designed to prepare individuals for the Databricks Certified Generative AI Engineer Associate…Author(s): Lucas Daudt
Master the Databricks Certified Data Analyst Associate Exam with Confidence Data analysts proficient in Databricks are in high demand as…Author(s): Xiao-Zhi Gao, Shailesh Tiwari, Munesh C. Trivedi, Krishn K. Mishra
This book features high-quality papers presented at the International Conference on Computational Intelligence and Communication Technology (CICT 2019) organized by…Author(s): Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy,…Author(s): George Bebis, Richard Boyle, Bahram Parvin, Darko Koracin, Ryan McMahan, Jason Jerald, Hui Zhang, Steven Drucker, Kambhamettu Chandra, El Choubassi Maha, Zhigang Deng, Mark Carlson
The two volume set LNCS 8887 and 8888 constitutes the refereed proceedings of the 10th International Symposium on Visual Computing,…Author(s): Sabu M Thampi, Pradeep K. Atrey, Chun I. Fan, Gregorio Martinez Perez
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2013, held in…Author(s): Shalli Rani, R. Maheswar, G. R. Kanagachidambaresan, Sachin Ahuja, Deepali Gupta
MACHINE LEARNING PARADIGM FOR INTERNET OF THINGS APPLICATIONS As companies globally realize the revolutionary potential of the IoT, they have…Author(s): Paula Kotzé, Gary Marsden, Gitte Lindgaard, Janet Wesson, Marco Winckler
The four-volume set LNCS 8117-8120 constitutes the refereed proceedings of the 14th IFIP TC13 International Conference on Human-Computer Interaction, INTERACT…Author(s): Mrutyunjaya Panda, Ajith Abraham, Aboul Ella Hassanien
Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity…Author(s): Preeti Malik, Lata Nautiyal, Mangey Ram
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring…Author(s): Khosrow-Pour, D.B.A., Mehdi
From cloud computing to data analytics, society stores vast supplies of information through wireless networks and mobile computing. As organizations…Author(s): Noel Rappin
Provides information on the capabilities and subsystems of Ruby on Rails for the design and development of complex Web applications.Author(s): Louis Marinos, Ioannis Askoxylakis
This book constitutes the refereed proceedings of the First International Conference on Human Aspects of Information Security, Privacy and Trust,…