Angebote zu "Evaluation" (23 Treffer)

Evaluation of Novel Approaches to Software Engi...
61,99 € *
ggf. zzgl. Versand

This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2017, held in Porto, Portugal, in April 2017. The 12 full papers presented were carefully reviewed and selected from 102 submissions. The mission of ENASE is to be a prime international forum to discuss and publish research findings and IT industry experiences with relation to the evaluation of novel approaches to software engineering. The conference acknowledges necessary changes in systems and software thinking due to contemporary shifts of computing paradigm to e-services, cloud computing, mobile connectivity, business processes, and societal participation.

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
Data Governance Tools: Evaluation Criteria, Big...
58,99 € *
ggf. zzgl. Versand

A guide for business enterprises on how to manage and govern big data, covering such topics as categories of data governance tools, data modeling, analytics and reporting, data security, and evaluation criteria for data governance platforms.

Anbieter: buecher.de
Stand: 19.07.2018
Zum Angebot
The UX Book
69,99 € *
ggf. zzgl. Versand

The UX Book: Process and Guidelines for Ensuring a Quality User Experience aims to help readers learn how to create and refine interaction designs that ensure a quality user experience (UX). The book seeks to expand the concept of traditional usability to a broader notion of user experience; to provide a hands-on, practical guide to best practices and established principles in a UX lifecycle; and to describe a pragmatic process for managing the overall development effort. The book provides an iterative and evaluation-centered UX lifecycle template, called the Wheel, for interaction design. Key concepts discussed include contextual inquiry and analysis; extracting interaction design requirements; constructing design-informing models; design production; UX goals, metrics, and targets; prototyping; UX evaluation; the interaction cycle and the user action framework; and UX design guidelines. This book will be useful to anyone interested in learning more about creating interaction designs to ensure a quality user experience. These include interaction designers, graphic designers, usability analysts, software engineers, programmers, systems analysts, software quality-assurance specialists, human factors engineers, cognitive psychologists, cosmic psychics, trainers, technical writers, documentation specialists, marketing personnel, and project managers. A very broad approach to user experience through its components-usability, usefulness, and emotional impact with special attention to lightweight methods such as rapid UX evaluation techniques and an agile UX development process Universal applicability of processes, principles, and guidelines-not just for GUIs and the Web, but for all kinds of interaction and devices: embodied interaction, mobile devices, ATMs, refrigerators, and elevator controls, and even highway signage Extensive design guidelines applied in the context of the various kinds of affordances necessary to support all aspects of interaction Real-world stories and contributions from accomplished UX practitioners A practical guide to best practices and established principles in UX A lifecycle template that can be instantiated and tailored to a given project, for a given type of system development, on a given budget The UX Book: Process and Guidelines for Ensuring a Quality User Experience aims to help readers learn how to create and refine interaction designs that ensure a quality user experience (UX). The book seeks to expand the concept of traditional usability to a broader notion of user experience; to provide a hands-on, practical guide to best practices and established principles in a UX lifecycle; and to describe a pragmatic process for managing the overall development effort. The book provides an iterative and evaluation-centered UX lifecycle template, called the Wheel, for interaction design. Key concepts discussed include contextual inquiry and analysis; extracting interaction design requirements; constructing design-informing models; design production; UX goals, metrics, and targets; prototyping; UX evaluation; the interaction cycle and the user action framework; and UX design guidelines. This book will be useful to anyone interested in learning more about creating interaction designs to ensure a quality user experience. These include interaction designers, graphic designers, usability analysts, software engineers, programmers, systems analysts, software quality-assurance specialists, human factors engineers, cognitive psychologists, cosmic psychics, trainers, technical writers, documentation specialists, marketing personnel, and project managers. A very broad approach to user experience through its components-usability, usefulness, and emotional impact with special attention to lightweight methods such as rapid UX evaluation techniques and an agile UX development process Universal applicability of processes, principles, and guidelines-not just for GUIs and the Web, but for all kinds of interaction and devices: embodied interaction, mobile devices, ATMs, refrigerators, and elevator controls, and even highway signage Extensive design guidelines applied in the context of the various kinds of affordances necessary to support all aspects of interaction Real-world stories and contributions from accomplished UX practitioners A practical guide to best practices and established principles in UX A lifecycle template that can be instantiated and tailored to a given project, for a given type of system

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
Data Mining with Rattle and R
55,99 € *
ggf. zzgl. Versand

Data mining is the art and science of intelligent data analysis. By building knowledge from information, data mining adds considerable value to the ever increasing stores of electronic data that abound today. In performing data mining many decisions need to be made regarding the choice of methodology, the choice of data, the choice of tools, and the choice of algorithms. Throughout this book the reader is introduced to the basic concepts and some of the more popular algorithms of data mining. With a focus on the hands-on end-to-end process for data mining, Williams guides the reader through various capabilities of the easy to use, free, and open source Rattle Data Mining Software built on the sophisticated R Statistical Software. The focus on doing data mining rather than just reading about data mining is refreshing. The book covers data understanding, data preparation, data refinement, model building, model evaluation, and practical deployment. The reader will learn to rapidly deliver a data mining project using software easily installed for free from the Internet. Coupling Rattle with R delivers a very sophisticated data mining environment with all the power, and more, of the many commercial offerings.

Anbieter: buecher.de
Stand: 19.07.2018
Zum Angebot
Data and Applications Security and Privacy XXXII
60,99 € *
ggf. zzgl. Versand

This book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems.

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
Data Mining for Dummies
29,99 € *
ggf. zzgl. Versand

Delve into your data for the key to success Data mining is quickly becoming integral to creating value and business momentum. The ability to detect unseen patterns hidden in the numbers exhaustively generated by day-to-day operations allows savvy decision-makers to exploit every tool at their disposal in the pursuit of better business. By creating models and testing whether patterns hold up, it is possible to discover new intelligence that could change your business´s entire paradigm for a more successful outcome. Data Mining for Dummies shows you why it doesn´t take a data scientist to gain this advantage, and empowers average business people to start shaping a process relevant to their business´s needs. In this book, you´ll learn the hows and whys of mining to the depths of your data, and how to make the case for heavier investment into data mining capabilities. The book explains the details of the knowledge discovery process including: * Model creation, validity testing, and interpretation * Effective communication of findings * Available tools, both paid and open-source * Data selection, transformation, and evaluation Data Mining for Dummies takes you step-by-step through a real-world data-mining project using open-source tools that allow you to get immediate hands-on experience working with large amounts of data. You´ll gain the confidence you need to start making data mining practices a routine part of your successful business. If you´re serious about doing everything you can to push your company to the top, Data Mining for Dummies is your ticket to effective data mining.

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
Semantic Modeling and Enrichment of Mobile and ...
107,99 € *
ggf. zzgl. Versand

This book discusses the fusion of mobile and WiFi network data with semantic technologies and diverse context sources for offering semantically enriched context-aware services in the telecommunications domain. It presents the OpenMobileNetwork as a platform for providing estimated and semantically enriched mobile and WiFi network topology data using the principles of Linked Data. This platform is based on the OpenMobileNetwork Ontology consisting of a set of network context ontology facets that describe mobile network cells as well as WiFi access points from a topological perspective and geographically relate their coverage areas to other context sources. The book also introduces Linked Crowdsourced Data and its corresponding Context Data Cloud Ontology, which is a crowdsourced dataset combining static location data with dynamic context information. Linked Crowdsourced Data supports the OpenMobileNetwork by providing the necessary context data richness for more sophisticated semantically enriched context-aware services. Various application scenarios and proof of concept services as well as two separate evaluations are part of the book. As the usability of the provided services closely depends on the quality of the approximated network topologies, it compares the estimated positions for mobile network cells within the OpenMobileNetwork to a small set of real-world cell positions. The results prove that context-aware services based on the OpenMobileNetwork rely on a solid and accurate network topology dataset. The book also evaluates the performance of the exemplary Semantic Tracking as well as Semantic Geocoding services, verifying the applicability and added value of semantically enriched mobile and WiFi network data.

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
Quality Of Protection
180,99 € *
ggf. zzgl. Versand

Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis methodologies have raised the bar for good security solutions from a business perspective. Designed for a professional audience composed of researchers and practitioners in industry, Quality of Protection: Security Measurements and Metrics is also suitable for advanced-level students in computer science. Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common Criteria s, and a number of industry and academic certifications and risk analysis methodologies, have raised the bar on what is considered good security solution, from a business perspective. Yet, the evaluation of security solutions has largely a qualitative flavor. Notions such as Security Metrics, Quality of Protection (QoP) or Protection Level Agreement (PLA) have only surfaced in the literature. Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop at ESORICS 2005, the flagship European Symposium on Research in Computer Security. This book discusses how security research can progress towards a notion of quality of protection in security, comparable to the notion of quality of service in networking and software measurements and metrics, in empirical software engineering. Quality of Protection: Security Measurements and Metrics is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable for graduate-level students in computer science and telecommunications.

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
User Story Mapping - Die Technik für besseres N...
34,90 € *
ggf. zzgl. Versand

Verbessern Sie Ihre Entwicklungsprozesse und Ihre Produkte! User Story Mapping ist eine von Jeff Patton entwickelte Methode, die es Ihnen deutlich erleichtert, im Rahmen agiler Projekte eine stimmige User Experience zu schaffen. Die Idee: Die Produktentwicklung wird am Arbeitsfluss der Nutzer ausgerichtet und in flexibel anpassbaren Story Maps geplant, dokumentiert und visualisiert. Dadurch entsteht im gesamten Team - bei Product Ownern, Designern, Entwicklern und Auftraggebern - ein deutlich verbessertes gemeinsames Verständnis vom Gesamtprozess und vom zu entwickelnden Produkt. Gleichzeitig wird die Gefahr reduziert, sich in unwichtigen Details zu verzetteln oder gar ein Produkt zu entwickeln, dass dem Nutzer nicht hilft. User Story Maps statt Anforderungsdokumente In der agilen Entwicklung werden Anforderungen in User Stories heruntergebrochen. User Story Mapping geht noch weiter und stellt die Stories in einen für alle Teammitglieder nachvollziehbaren Gesamtzusammenhang. Stories als Impulse für Konversationen Eine gute User Story Map fördert Konversationen zwischen allen, die an der Entstehung eines Produkts beteiligt sind, sowie mit denen, die es letztlich anwenden. Bessere Kommunikation = bessere Produkte. User Story Maps sind wie Landkarten Mit den Maps wird die narrative Struktur von User Stories gewahrt, zugleich können einzelne Aspekte jederzeit herausgegriffen, weiterentwickelt und vertieft werden. Optimaler Outcome statt möglichst vieler Features Die Methode hilft dabei, die Features zu identifizieren, die wirklich nützlich und zudem bezahl- und realisierbar sind. Der Schlüssel: Konzentration auf das Ergebnis und die Schritte, die dorthin führen. Fortlaufend dazulernen Konversationen und Maps begleiten alle Projektschritte, z.B. Evaluation der Chancen und Risiken, Tests mit Usern und Kunden, Iterationen sowie sämtliche Schlussfolgerungen aus dem Gelernten.

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot
Computer Architecture
78,99 € *
ggf. zzgl. Versand

Computer Architecture: A Quantitative Approach, Sixth Edition has been considered essential reading by instructors, students and practitioners of computer design for over 20 years. The sixth edition of this classic textbook from Hennessy and Patterson, winners of the 2017 ACM A.M. Turing Award recognizing contributions of lasting and major technical importance to the computing field, is fully revised with the latest developments in processor and system architecture. The text now features examples from the RISC-V (RISC Five) instruction set architecture, a modern RISC instruction set developed and designed to be a free and openly adoptable standard. It also includes a new chapter on domain-specific architectures and an updated chapter on warehouse-scale computing that features the first public information on Google´s newest WSC. True to its original mission of demystifying computer architecture, this edition continues the longstanding tradition of focusing on areas where the most exciting computing innovation is happening, while always keeping an emphasis on good engineering design. Includes a new chapter on domain-specific architectures, explaining how they are the only path forward for improved performance and energy efficiency given the end of Moore´s Law and Dennard scaling Features the first publication of several DSAs from industry Features extensive updates to the chapter on warehouse-scale computing, with the first public information on the newest Google WSC Offers updates to other chapters including new material dealing with the use of stacked DRAM; data on the performance of new NVIDIA Pascal GPU vs. new AVX-512 Intel Skylake CPU; and extensive additions to content covering multicore architecture and organization Includes ´´Putting It All Together´´ sections near the end of every chapter, providing real-world technology examples that demonstrate the principles covered in each chapter Includes review appendices in the printed text and additional reference appendices available online Includes updated and improved case studies and exercises ACM named John L. Hennessy and David A. Patterson, recipients of the 2017 ACM A.M. Turing Award for pioneering a systematic, quantitative approach to the design and evaluation of computer architectures with enduring impact on the microprocessor industry

Anbieter: buecher.de
Stand: 18.07.2018
Zum Angebot