ABSTRACT

This book covers all aspects of computer science, engineering, and technology. It includes computer scientists, computer engineers computing professionals, managers, software professionals, and other technology professionals.

chapter |18 pages

Fuzzy Set Theory

chapter |10 pages

Fuzzy Sets and Fuzzy Logic

chapter |12 pages

Genetic Algorithms

chapter |6 pages

Hash Algorithms

chapter |10 pages

Human–Robot Interaction

chapter |19 pages

Image Processing and Measurement

chapter |11 pages

Internet Security

chapter |6 pages

Languages

chapter |8 pages

Languages: Domain-Specific

chapter |10 pages

LDPC Decoders: Acceleration

chapter |11 pages

Learning and Teaching Programming

chapter |13 pages

Locality Sensitive Hashing

chapter |8 pages

Location-Based Services

chapter |15 pages

Mathematics of Computer Security

chapter |9 pages

Mobile Ad Hoc Networks

chapter |6 pages

Modeling and Simulation

chapter |9 pages

Modeling: Sparse

chapter |8 pages

Optical Character Recognition (OCR)

chapter |4 pages

Parallel Algorithms

chapter |9 pages

Pedestrian Detection and Tracking

chapter |17 pages

Predictive and Anticipatory Computing

chapter |7 pages

Programming Languages: Concurrency

chapter |10 pages

Securing Software

chapter |4 pages

Security Risks: Managing Software

chapter |11 pages

Semantics: Learning

chapter |13 pages

Sentiment Analysis

chapter |4 pages

Set Theory

chapter |4 pages

Steganography

chapter |8 pages

Turing Machines

chapter |14 pages

Turing Machines: Completeness

chapter |25 pages

Ubiquitous Computing Systems

chapter |7 pages

Undecidability

chapter |10 pages

Undecidability and Reducibility

chapter |11 pages

Virtual Worlds: Design

chapter |8 pages

Viruses: History

chapter |11 pages

Wireless Embedded Systems: Secure Design

chapter |9 pages

Wireless LANs (WLANs)

chapter |3 pages

Wireless LANs (WLANs): IEEE 802.11

chapter |8 pages

Wireless Networks: VoIP Service

chapter |8 pages

Wireless Sensor Networks (WSNs)

chapter |9 pages

Women in Computer Science: Deterrents

chapter |7 pages

XML and Other Metadata Languages