Search (3 results, page 1 of 1)

  • × subject_ss:"Telecommunication"
  1. Innovations and advanced techniques in systems, computing sciences and software engineering (2008) 0.01
    0.012979962 = product of:
      0.051919848 = sum of:
        0.051919848 = product of:
          0.103839695 = sum of:
            0.103839695 = weight(_text_:processing in 4319) [ClassicSimilarity], result of:
              0.103839695 = score(doc=4319,freq=12.0), product of:
                0.18956426 = queryWeight, product of:
                  4.048147 = idf(docFreq=2097, maxDocs=44218)
                  0.046827413 = queryNorm
                0.547781 = fieldWeight in 4319, product of:
                  3.4641016 = tf(freq=12.0), with freq of:
                    12.0 = termFreq=12.0
                  4.048147 = idf(docFreq=2097, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=4319)
          0.5 = coord(1/2)
      0.25 = coord(1/4)
    
    Content
    Inhalt: Image and Pattern Recognition: Compression, Image processing, Signal Processing Architectures, Signal Processing for Communication, Signal Processing Implementation, Speech Compression, and Video Coding Architectures. Languages and Systems: Algorithms, Databases, Embedded Systems and Applications, File Systems and I/O, Geographical Information Systems, Kernel and OS Structures, Knowledge Based Systems, Modeling and Simulation, Object Based Software Engineering, Programming Languages, and Programming Models and tools. Parallel Processing: Distributed Scheduling, Multiprocessing, Real-time Systems, Simulation Modeling and Development, and Web Applications. New trends in computing: Computers for People of Special Needs, Fuzzy Inference, Human Computer Interaction, Incremental Learning, Internet-based Computing Models, Machine Intelligence, Natural Language Processing, Neural Networks, and Online Decision Support System
  2. Beierle, C.; Kern-Isberner, G.: Methoden wissensbasierter Systeme : Grundlagen, Algorithmen, Anwendungen (2008) 0.01
    0.0051730038 = product of:
      0.020692015 = sum of:
        0.020692015 = weight(_text_:data in 4622) [ClassicSimilarity], result of:
          0.020692015 = score(doc=4622,freq=2.0), product of:
            0.14807065 = queryWeight, product of:
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.046827413 = queryNorm
            0.1397442 = fieldWeight in 4622, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.03125 = fieldNorm(doc=4622)
      0.25 = coord(1/4)
    
    Abstract
    Dieses Buch präsentiert ein breites Spektrum aktueller Methoden zur Repräsentation und Verarbeitung (un)sicheren Wissens in maschinellen Systemen in didaktisch aufbereiteter Form. Neben symbolischen Ansätzen des nichtmonotonen Schließens (Default-Logik, hier konstruktiv und leicht verständlich mittels sog. Default-Bäume realisiert) werden auch ausführlich quantitative Methoden wie z.B. probabilistische Markov- und Bayes-Netze vorgestellt. Weitere Abschnitte beschäftigen sich mit Wissensdynamik (Truth Maintenance-Systeme), Aktionen und Planen, maschinellem Lernen, Data Mining und fallbasiertem Schließen.In einem vertieften Querschnitt werden zentrale alternative Ansätze einer logikbasierten Wissensmodellierung ausführlich behandelt. Detailliert beschriebene Algorithmen geben dem Praktiker nützliche Hinweise zur Anwendung der vorgestellten Ansätze an die Hand, während fundiertes Hintergrundwissen ein tieferes Verständnis für die Besonderheiten der einzelnen Methoden vermittelt . Mit einer weitgehend vollständigen Darstellung des Stoffes und zahlreichen, in den Text integrierten Aufgaben ist das Buch für ein Selbststudium konzipiert, eignet sich aber gleichermaßen für eine entsprechende Vorlesung. Im Online-Service zu diesem Buch werden u.a. ausführliche Lösungshinweise zu allen Aufgaben des Buches angeboten.Zahlreiche Beispiele mit medizinischem, biologischem, wirtschaftlichem und technischem Hintergrund illustrieren konkrete Anwendungsszenarien. Von namhaften Professoren empfohlen: State-of-the-Art bietet das Buch zu diesem klassischen Bereich der Informatik. Die wesentlichen Methoden wissensbasierter Systeme werden verständlich und anschaulich dargestellt. Repräsentation und Verarbeitung sicheren und unsicheren Wissens in maschinellen Systemen stehen dabei im Mittelpunkt. In der vierten, verbesserten Auflage wurde die Anzahl der motivierenden Selbsttestaufgaben mit aktuellem Praxisbezug nochmals erweitert. Ein Online-Service mit ausführlichen Musterlösungen erleichtert das Lernen.
  3. Fuller, M.: Media ecologies : materialist energies in art and technoculture (2005) 0.00
    0.0025865019 = product of:
      0.0103460075 = sum of:
        0.0103460075 = weight(_text_:data in 469) [ClassicSimilarity], result of:
          0.0103460075 = score(doc=469,freq=2.0), product of:
            0.14807065 = queryWeight, product of:
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.046827413 = queryNorm
            0.0698721 = fieldWeight in 469, product of:
              1.4142135 = tf(freq=2.0), with freq of:
                2.0 = termFreq=2.0
              3.1620505 = idf(docFreq=5088, maxDocs=44218)
              0.015625 = fieldNorm(doc=469)
      0.25 = coord(1/4)
    
    Footnote
    Moving on to Web pages-Heath Bunting's cctv-world wide watch, where users watching four Webcams are encouraged to report crimes on an HTML form, which is then sent to the nearest police station-Fuller shows how cultural and technological components mesh uneasily in the project. Fuller argues that the "meme" (a kind of replicator that mutates as it passes from person to person or media to media, and works in combination with its immediate environment) or "bit" of identity constitutes a problem for surveillance. Packets of information-often the most common "meme" in Web technology-is, for Fuller, the standard object around which an ecology gets built. Networks check packets as they pass isolating passwords, URLS, credit data, and items of interest. The packet is the threshold of operations. The meme's "monitorability" enables not only dissemination through the network, but also its control. Memes, or what Fuller calls "flecks of identity" are referents in the flows of information-they "locate" and "situate" a user. Fuller's work is full of rich insights, especially into the ways in which forces of power operate within media ecologies. Even when the material/technological object, such as the camera or the Webcam turns in on itself, it is situated within a series of interrelated forces, some of which are antagonistic to the object. This insight-that contemporary media technology works within a field of antagonistic forces too-is Fuller's major contribution. Fuller is alert also to the potential within such force fields for subversion. Pirate radio and phreaking, therefore, emblematize how media ecologies create the context, possibility, and even modalities of political and social protest. Unfortunately, Fuller's style is a shade too digressive and aleatory for us to discover these insights. In his eagerness to incorporate as many theorists and philosophers of media/technology-he moves from Nietzsche to Susan Blackmore, sometimes within the space of a single paragraph-Fuller often takes a long time to get to his contribution to the debate or analysis. The problem, therefore, is mainly with style rather than content, and the arguments would have been perfectly fine if they had been couched in easier forms."