The series ‘‘Springer Theses’’ brings together a selection of the very best Ph.D.
theses from around the world and across the physical sciences. Nominated and
endorsed by two recognized specialists, each published volume has been selected
for its scientific excellence and the high impact of its contents for the pertinent
field of research. For greater accessibility to non-specialists, the published versions
include an extended introduction, as well as a foreword by the student’s supervisor
explaining the special relevance of the work for the field. As a whole, the series
will provide a valuable resource both for newcomers to the research fields
described, and for other scientists seeking detailed background information on
special questions. Finally, it provides an accredited documentation of the valuable
contributions made by today’s younger generation of scientists.
Nearly everyone knows K-means algorithm in the fields of data mining and business intelligence. But the ever-emerging data with extremely complicated characteristics bring new challenges to this "old" algorithm. This book addresses these challenges and makes novel contributions in establishing theoretical frameworks for K-means distances and K-means based consensus clustering, identifying the "dangerous" uniform effect and zero-value dilemma of K-means, adapting right measures for cluster validity, and integrating K-means with SVMs for rare class analysis. This book not only enriches the clustering and optimization theories, but also provides good guidance for the practical use of K-means, especially for important tasks such as network intrusion detection and credit fraud prediction. The thesis on which this book is based has won the "2010 National Excellent Doctoral Dissertation Award", the highest honor for not more than 100 PhD theses per year in China.
Cryptography: An Introduction Nigel Smart’s Cryptography provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics. Covering the latest developments in computer cryptography, including the Rijndael algorithm chosen for the... Cell Line Development (Cell Engineering)
Mammalian cell lines command an effective monopoly for the production of therapeutic proteins that require post-translational modifications. This unique advantage outweighs the costs associated with mammalian cell culture, which are far grater in terms of development time and manufacturing when compared to microbial culture. The development of...
The Finite Element Method Using MATLAB, Second Edition
Expanded to include a broader range of problems than the bestselling first edition, Finite Element Method Using MATLAB: Second Edition presents finite element approximation concepts, formulation, and programming in a format that effectively streamlines the learning process. It is written from a general engineering and mathematical...
Best Practices in Business Technology Management A Tour de Force of Business Technology Management
Despite the exponential growth of computing and communications technology, the inertia of old business technology management practices still drives most investment decisions in this area. Companies spend too much money on new technology, while their business models and...
Parameterized and Exact Computation: 5th International Symposium
The International Symposium on Parameterized and Exact Computation (IPEC, formerly IWPEC) is an international symposium series that covers research in all aspects of parameterized and exact algorithms and complexity. Started in 2004 as a biennial workshop, it became an annual event from 2008.
The four previous meetings of the...