Multi-Agent Machine Learning

Multi-Agent Machine Learning

The book begins with a chapter on traditional methods of supervised learning, covering recursive least squares learning, mean square error...

Cyberspace

Cyberspace

This book covers many aspects of cyberspace, emphasizing not only its possible ‘negative’ challenge as a threat to security, but also...

Dynamic Secularization

Dynamic Secularization

This book discusses secularization, arguing that it may be more complex and significant than is generally recognized. Using a number...

The Emerging WDM EPON

The Emerging WDM EPON

This book proposes dynamic wavelength and bandwidth allocation (DWBA), a hybrid of time-division multiplexing (TDM) and wavelength-division multiplexing (WDM), which...

Search Engine Optimization

Search Engine Optimization

Techniques and best practices for search engine optimization are constantly evolving. This visual guide to SEO is fully updated with...

Unleashing the Power of IT

Unleashing the Power of IT

If you’re in IT, quite a lot is expected of you and your team: be technologically advanced, business-minded, customer-focused, and...

Enchanted Objects

Enchanted Objects

In the tradition of Who Owns the Future? and The Second Machine Age, an MIT Media Lab scientist imagines how...

The Death of the Internet

The Death of the Internet

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the...

Learning Akka

Learning Akka

Software today has to work with more data, more users, more cores, and more servers than ever. Akka is a...