This open access brief introduces the basic principles of control theory in a concise self-study guide. It complements the classic texts by emphasizing the simple conceptual unity of the subject. A novice can quickly see how and why the different parts fit together. The concepts build slowly and naturally one after another, until the reader soon ha...
This book focuses on both the theory and practice associated with the tools and approaches for decisionmaking in the face of deep uncertainty. It explores approaches and tools supporting the design of strategic plans under deep uncertainty, and their testing in the real world, including barriers and enablers for their use in practice. The book broa...
This book analyzes and seeks to consolidate the use of robust quantitative tools and qualitative methods for the design and assessment of energy and climate policies. In particular, it examines energy and climate policy performance and associated risks, as well as public acceptance and portfolio analysis in climate policy, and presents methods for ...
Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors actually work, ...
When considering "the Internet of Things," it's easy to miss the bigger pattern: we are no longer just building software for individual devices, but creating networks of intelligence and action that make it possible to completely rethink how we organize work, play, and society itself. This report provides the complete text of Tim O...
Welcome to InnerSource, the powerful movement for developing open source software within the walls of a single organization, where the "openness" of a project extends across teams inside the company. In this report, O'Reilly editor and author Andy Oram takes you inside InnerSource, first by reviewing the principles that make open sou...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...
This book provides a comprehensive overview of volcanic crisis research, the goal being to establish ways of successfully applying volcanology in practice and to identify areas that need to be addressed for future progress. It shows how volcano crises are managed in practice, and helps to establish best practices. Consequently the book brings toge...
This book is a must-have for anyone serious about rendering in real time. With the announcement of new ray tracing APIs and hardware to support them, developers can easily create real-time applications with ray tracing as a core component. As ray tracing on the GPU becomes faster, it will play a more central role in real-time rendering. Ray Tracing...
This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2017, held in Buenos Aires, Argentina, in May 2017.
The 16 revised full papers and 3 short papers presented were carefully reviewed and selected from 32 submissions. The papers cover a wide range of topics related to free, l...
This open access volume explores how UN peace operations are adapting to four trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) incr...
This book presents simple, robust pre-field screening protocols that allow plant breeders to screen for enhanced tolerance to heat stress in rice. Two critical heat-sensitive stages in the lifecycle of the rice crop are targeted – the seedling and flowering stages – with screening based on simple phenotypic responses. The protocols are based on...
This book provides standards and guidelines for
quantifying greenhouse gas emissions and removals in smallholder agricultural systems
and comparing options for climate change mitigation based on emission
reductions and livelihood trade-offs. Globally, agriculture is directly
responsible for about 11% of annual greenhouse gas (GHG) emissions a...
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Inte...
In this bold and original study, Jeff Kochan constructively combines the sociology of scientific knowledge (SSK) with Martin Heidegger's early existential conception of science. Kochan shows convincingly that these apparently quite different approaches to science are, in fact, largely compatible, even mutually reinforcing.
By combining Heid...
This open access volume presents a comprehensive account of all aspects of biological invasions in South Africa, where research has been conducted over more than three decades, and where bold initiatives have been implemented in attempts to control invasions and to reduce their ecological, economic and social effects. It covers a broad range of the...
This open access report presents findings from the five Latin American countries that participated in the second cycle of the IEA International Civic and Citizenship Education Study (ICCS 2016). ICCS 2016 investigated the ways in which a range of countries are preparing their young people to undertake their roles as citizens during the second decad...
This free book presents up-to-date analyses of community-based approaches to sustainable resource management of SEPLS (socio-ecological production landscapes and seascapes) in areas where a harmonious relationship between the natural environment and the people who inhabit it is essential to ensure community and environmental well-being as well as t...
This book about the Zadeh Project demonstrates and explores a core question in clinical ethics: how can ethics consultants be accountable in the face of a robust plurality of ethical standpoints, especially those that underwrite practices and methods for doing ethics consultation as well as those viewpoints and values encountered in daily clinical ...
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This b...
The proceedings of the international conference "SMSEC2014", a joint conference of the first "Social Modeling and Simulations" and the 10th "Econophysics Colloquium", held in Kobe in November 2014 with 174 participants, are gathered herein. Cutting edge scientific researches on various social phenomena are reviewed. Ne...
This open access monograph argues established democratic norms for freedom of expression should be implemented on the internet. Moderating policies of tech companies as Facebook, Twitter and Google have resulted in posts being removed on an industrial scale. While this moderation is often encouraged by governments - on the pretext that terrorism, b...
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment.
Too often as deve...
This book is directed toward students for whom mathematical statistics is or will become an important part of their lives. Obviously, such students should be able to work through the details of 'hard' proofs and derivations. In addition, students at this level should acquire, or begin acquiring, a deep appreciation for the field, includin...
This timely and applied textbook brings together leading scientists to illustrate how key theories and concepts in social psychology help to predict and explain behavior, and can be successfully applied to benefit social and practical problems. It focuses on robust theories and models known for their successful applications and covers a diverse ran...
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...
With so much media and political criticism of their shortcomings and failures, it is easy to overlook the fact that many governments work pretty well much of the time. Great Policy Successes turns the spotlight on instances of public policy that are remarkably successful. It develops a framework for identifying and assessing policy successes, payin...
The demand for skilled data science practitioners in industry, academia, and government is rapidly growing. This book introduces concepts and skills that can help you tackle real-world data analysis challenges. It covers concepts from probability, statistical inference, linear regression and machine learning. It also helps you develop skills such a...
This open book highlights the complexities around making adaptation decisions and building resilience in the face of climate risk. It is based on experiences in sub-Saharan Africa through the Future Climate For Africa (FCFA) applied research programme. It begins by dealing with underlying principles and structures designed to facilitate effective e...
This open book discusses the impact of human-induced global climate change on the Indian subcontinent and regional monsoon, the adjoining Indian Ocean and the Himalayas. It also examines the regional climate change projections based on the climate models used by the IPCC Fifth Assessment Report (AR5) and national climate change modeling studies usi...
This groundbreaking, open volume analyses and compares data practices across several fields through the analysis of specific cases of data journeys. It brings together leading scholars in the philosophy, history and social studies of science to achieve two goals: tracking the travel of data across different spaces, times and domains of research pra...