0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (6)
  • R250 - R500 (65)
  • R500+ (5,393)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming > Algorithms & procedures

Logic, Language, Information, and Computation - 23rd International Workshop, WoLLIC 2016, Puebla, Mexico, August 16-19th, 2016.... Logic, Language, Information, and Computation - 23rd International Workshop, WoLLIC 2016, Puebla, Mexico, August 16-19th, 2016. Proceedings (Paperback, 1st ed. 2016)
Jouko Vaananen, Asa Hirvonen, Ruy De Queiroz
R1,652 Discovery Miles 16 520 Ships in 10 - 15 working days

Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the 23rd Workshop on Logic, Language, Information and Communication, WoLLIC 2016, held in Puebla, Mexico, in August 2016.The 23 contributed papers, presented together with 9 invited lectures and tutorials, were carefully reviewed and selected from 33 submissions. The focus of the workshop is to provide a forum on inter-disciplinary research involving formal logic, computing and programming theory, and natural language and reasoning.

Semantic Interaction for Visual Analytics - Inferring Analytical Reasoning for Model Steering (Paperback): Alex Endert Semantic Interaction for Visual Analytics - Inferring Analytical Reasoning for Model Steering (Paperback)
Alex Endert
R1,106 Discovery Miles 11 060 Ships in 10 - 15 working days

This book discusses semantic interaction, a user interaction methodology for visual analytic applications that more closely couples the visual reasoning processes of people with the computation. This methodology affords user interaction on visual data representations that are native to the domain of the data. User interaction in visual analytics systems is critical to enabling visual data exploration. Interaction transforms people from mere viewers to active participants in the process of analyzing and understanding data. This discourse between people and data enables people to understand aspects of their data, such as structure, patterns, trends, outliers, and other properties that ultimately result in insight. Through interacting with visualizations, users engage in sensemaking, a process of developing and understanding relationships within datasets through foraging and synthesis. The book provides a description of the principles of semantic interaction, providing design guidelines for the integration of semantic interaction into visual analytics, examples of existing technologies that leverage semantic interaction, and a discussion of how to evaluate these technologies. Semantic interaction has the potential to increase the effectiveness of visual analytic technologies and opens possibilities for a fundamentally new design space for user interaction in visual analytics systems.

Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed.... Timing Channels in Cryptography - A Micro-Architectural Perspective (Paperback, Softcover reprint of the original 1st ed. 2015)
Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya
R3,485 Discovery Miles 34 850 Ships in 10 - 15 working days

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms are described and analyzed for both block ciphers as well as public-key ciphers. The interplay between the cipher implementation, the system architecture, and the attack's success is analyzed. Further hardware and software countermeasures are discussed with the aim of illustrating methods to build systems that can protect against these attacks.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII - Special Issue on Big Data for Complex Urban Systems... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII - Special Issue on Big Data for Complex Urban Systems (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner, Amin Anjomshoaa, Patrick C K Hung, …
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This, the 27th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of 12 papers presented at the Big Data and Technology for Complex Urban Systems symposium, held in Kauai, HI, USA in January 2016. The papers explore the use of big data in complex urban systems in the areas of politics, society, commerce, tax, and emergency management.

Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15,... Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Francois-Xavier Standaert, Elisabeth Oswald
R2,244 Discovery Miles 22 440 Ships in 10 - 15 working days

This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. The 12 papers presented in this volume were carefully reviewed and selected from 32 submissions. They were organized in topical sections named: security and physical attacks; side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).

Information Verification in the Digital Age - The News Library Perspective (Paperback): Nora Martin Information Verification in the Digital Age - The News Library Perspective (Paperback)
Nora Martin
R705 Discovery Miles 7 050 Ships in 10 - 15 working days

This book will contemplate the nature of our participatory digital media culture, the diversity of actors involved, and how the role of the news librarian has evolved-from information gatekeeper to knowledge networker, collaborating and facilitating content creation with print and broadcast media professionals. It will explore how information professionals assist in the newsroom, drawing on the author's experiential knowledge as an embedded research librarian in the media industry. The past decade has seen significant changes in the media landscape. Large media outlets have traditionally controlled news and information flows, with everyone obtaining news via these dominant channels. In the digital world, the nature of what constitutes news has changed in fundamental ways. Social media and technologies such as crowdsourcing now play a pivotal role in how broadcast media connects and engages with their audiences. The book will focus on news reporting in the age of social media, examining the significance of verification and evaluating social media content from a journalistic and Information Science (IS) perspective. With such an emphasis on using social media for research, it is imperative to have mechanisms in place to make sure that information is authoritative before passing it on to a client as correct and accurate. Technology innovation and the 24/7 news cycle are driving forces compelling information professionals and journalists alike to adapt and learn new skills. The shift to tablets and smartphones for communication, news, and entertainment has dramatically changed the library and media landscape. Finally, we will consider automated journalism and examine future roles for news library professionals in the age of digital social media.

Lipid-mediated Protein Signaling (Paperback, Softcover reprint of the original 1st ed. 2013): Daniel G S Capelluto Lipid-mediated Protein Signaling (Paperback, Softcover reprint of the original 1st ed. 2013)
Daniel G S Capelluto
R5,413 Discovery Miles 54 130 Ships in 10 - 15 working days

This book provides the most updated information of how membrane lipids mediate protein signaling from studies carried out in animal and plant cells. Also, there are some chapters that go beyond and expand these studies of protein-lipid interactions at the structural level. The book begins with a literature review from investigations associated to sphingolipids, followed by studies that describe the role of phosphoinositides in signaling and closing with the function of other key lipids in signaling at the plasma membrane and intracellular organelles.

Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013): Johannes A. Buchmann,... Introduction to Public Key Infrastructures (Paperback, Softcover reprint of the original 1st ed. 2013)
Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier
R2,442 Discovery Miles 24 420 Ships in 10 - 15 working days

The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.

Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st... Physically Unclonable Functions - Constructions, Properties and Applications (Paperback, Softcover reprint of the original 1st ed. 2013)
Roel Maes
R2,183 Discovery Miles 21 830 Ships in 10 - 15 working days

Physically unclonable functions (PUFs) are innovative physical security primitives that produce unclonable and inherent instance-specific measurements of physical objects; in many ways they are the inanimate equivalent of biometrics for human beings. Since they are able to securely generate and store secrets, they allow us to bootstrap the physical implementation of an information security system. In this book the author discusses PUFs in all their facets: the multitude of their physical constructions, the algorithmic and physical properties which describe them, and the techniques required to deploy them in security applications. The author first presents an extensive overview and classification of PUF constructions, with a focus on so-called intrinsic PUFs. He identifies subclasses, implementation properties, and design techniques used to amplify submicroscopic physical distinctions into observable digital response vectors. He lists the useful qualities attributed to PUFs and captures them in descriptive definitions, identifying the truly PUF-defining properties in the process, and he also presents the details of a formal framework for deploying PUFs and similar physical primitives in cryptographic reductions. The author then describes a silicon test platform carrying different intrinsic PUF structures which was used to objectively compare their reliability, uniqueness, and unpredictability based on experimental data. In the final chapters, the author explains techniques for PUF-based entity identification, entity authentication, and secure key generation. He proposes practical schemes that implement these techniques, and derives and calculates measures for assessing different PUF constructions in these applications based on the quality of their response statistics. Finally, he presents a fully functional prototype implementation of a PUF-based cryptographic key generator, demonstrating the full benefit of using PUFs and the efficiency of the processing techniques described. This is a suitable introduction and reference for security researchers and engineers, and graduate students in information security and cryptography.

Support Vector Machines and Perceptrons - Learning, Optimization, Classification, and Application to Social Networks... Support Vector Machines and Perceptrons - Learning, Optimization, Classification, and Application to Social Networks (Paperback, 1st ed. 2016)
M.N. Murty, Rashmi Raghava
R1,881 Discovery Miles 18 810 Ships in 10 - 15 working days

This work reviews the state of the art in SVM and perceptron classifiers. A Support Vector Machine (SVM) is easily the most popular tool for dealing with a variety of machine-learning tasks, including classification. SVMs are associated with maximizing the margin between two classes. The concerned optimization problem is a convex optimization guaranteeing a globally optimal solution. The weight vector associated with SVM is obtained by a linear combination of some of the boundary and noisy vectors. Further, when the data are not linearly separable, tuning the coefficient of the regularization term becomes crucial. Even though SVMs have popularized the kernel trick, in most of the practical applications that are high-dimensional, linear SVMs are popularly used. The text examines applications to social and information networks. The work also discusses another popular linear classifier, the perceptron, and compares its performance with that of the SVM in different application areas.>

Unmanned Rotorcraft Systems (Paperback, Softcover reprint of the original 1st ed. 2011): Guowei Cai, Ben M. Chen, Tong Heng Lee Unmanned Rotorcraft Systems (Paperback, Softcover reprint of the original 1st ed. 2011)
Guowei Cai, Ben M. Chen, Tong Heng Lee
R4,346 Discovery Miles 43 460 Ships in 10 - 15 working days

Unmanned Rotorcraft Systems explores the research and development of fully-functional miniature UAV (unmanned aerial vehicle) rotorcraft, and provides a complete treatment of the design of autonomous miniature rotorcraft UAVs. The unmanned system is an integration of advanced technologies developed in communications, computing, and control areas, and is an excellent testing ground for trialing and implementing modern control techniques. Included are detailed expositions of systematic hardware construction, software systems integration, aerodynamic modeling; and automatic flight control system design. Emphasis is placed on the cooperative control and flight formation of multiple UAVs, vision-based ground target tracking, and landing on moving platforms. Other issues such as the development of GPS-less indoor micro aerial vehicles and vision-based navigation are also discussed in depth: utilizing the vision-based system for accomplishing ground target tracking, attacking and landing, cooperative control and flight formation of multiple unmanned rotorcraft; and future research directions on the related areas.

Static Analysis - 23rd International Symposium, SAS 2016, Edinburgh, UK, September 8-10, 2016, Proceedings (Paperback, 1st ed.... Static Analysis - 23rd International Symposium, SAS 2016, Edinburgh, UK, September 8-10, 2016, Proceedings (Paperback, 1st ed. 2016)
Xavier Rival
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 23rd International Static Analysis Symposium, SAS 2016, held in Edinburgh, UK, in September 2016. The 21 papers presented in this volume were carefully reviewed and selected from 55 submissions. The contributions cover a variety of multi-disciplinary topics in abstract domains; abstract interpretation; abstract testing; bug detection; data flow analysis; model checking; new applications; program transformation; program verification; security analysis; theoretical frameworks; and type checking.

Distributed and Sequential Algorithms for Bioinformatics (Paperback, Softcover reprint of the original 1st ed. 2015): Kayhan... Distributed and Sequential Algorithms for Bioinformatics (Paperback, Softcover reprint of the original 1st ed. 2015)
Kayhan Erciyes
R2,715 Discovery Miles 27 150 Ships in 10 - 15 working days

This unique textbook/reference presents unified coverage of bioinformatics topics relating to both biological sequences and biological networks, providing an in-depth analysis of cutting-edge distributed algorithms, as well as of relevant sequential algorithms. In addition to introducing the latest algorithms in this area, more than fifteen new distributed algorithms are also proposed. Topics and features: reviews a range of open challenges in biological sequences and networks; describes in detail both sequential and parallel/distributed algorithms for each problem; suggests approaches for distributed algorithms as possible extensions to sequential algorithms, when the distributed algorithms for the topic are scarce; proposes a number of new distributed algorithms in each chapter, to serve as potential starting points for further research; concludes each chapter with self-test exercises, a summary of the key points, a comparison of the algorithms described, and a literature review.

Genetic Programming Theory and Practice XI (Paperback, Softcover reprint of the original 1st ed. 2014): Rick Riolo, Jason H.... Genetic Programming Theory and Practice XI (Paperback, Softcover reprint of the original 1st ed. 2014)
Rick Riolo, Jason H. Moore, Mark Kotanchek
R2,280 Discovery Miles 22 800 Ships in 10 - 15 working days

These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: evolutionary constraints, relaxation of selection mechanisms, diversity preservation strategies, flexing fitness evaluation, evolution in dynamic environments, multi-objective and multi-modal selection, foundations of evolvability, evolvable and adaptive evolutionary operators, foundation of injecting expert knowledge in evolutionary search, analysis of problem difficulty and required GP algorithm complexity, foundations in running GP on the cloud - communication, cooperation, flexible implementation, and ensemble methods. Additional focal points for GP symbolic regression are: (1) The need to guarantee convergence to solutions in the function discovery mode; (2) Issues on model validation; (3) The need for model analysis workflows for insight generation based on generated GP solutions - model exploration, visualization, variable selection, dimensionality analysis; (4) Issues in combining different types of data. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.

Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006): John R Vacca Guide to Wireless Network Security (Paperback, Softcover reprint of the original 1st ed. 2006)
John R Vacca
R4,817 Discovery Miles 48 170 Ships in 10 - 15 working days

A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles to deployment, all critical concepts and phases are clearly explained and presented. Includes coverage of wireless security testing techniques and prevention techniques for intrusion (attacks). An essential resource for wireless network administrators and developers.

Economics and Computation - An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division... Economics and Computation - An Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division (Paperback, Softcover reprint of the original 1st ed. 2016)
Joerg Rothe; Illustrated by Irene Rothe
R4,605 Discovery Miles 46 050 Ships in 10 - 15 working days

This textbook connects three vibrant areas at the interface between economics and computer science: algorithmic game theory, computational social choice, and fair division. It thus offers an interdisciplinary treatment of collective decision making from an economic and computational perspective. Part I introduces to algorithmic game theory, focusing on both noncooperative and cooperative game theory. Part II introduces to computational social choice, focusing on both preference aggregation (voting) and judgment aggregation. Part III introduces to fair division, focusing on the division of both a single divisible resource ("cake-cutting") and multiple indivisible and unshareable resources ("multiagent resource allocation"). In all these parts, much weight is given to the algorithmic and complexity-theoretic aspects of problems arising in these areas, and the interconnections between the three parts are of central interest.

Monte Carlo and  Quasi-Monte Carlo Methods 2010 (Paperback, Softcover reprint of the original 1st ed. 2012): Leszek Plaskota,... Monte Carlo and Quasi-Monte Carlo Methods 2010 (Paperback, Softcover reprint of the original 1st ed. 2012)
Leszek Plaskota, Henryk Wozniakowski
R4,790 Discovery Miles 47 900 Ships in 10 - 15 working days

This book represents the refereed proceedings of the Ninth International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing that was held at the University of Warsaw (Poland) in August 2010. These biennial conferences are major events for Monte Carlo and the premiere event for quasi-Monte Carlo research. The proceedings include articles based on invited lectures as well as carefully selected contributed papers on all theoretical aspects and applications of Monte Carlo and quasi-Monte Carlo methods. The reader will be provided with information on latest developments in these very active areas. The book is an excellent reference for theoreticians and practitioners interested in solving high-dimensional computational problems arising, in particular, in finance and statistics.

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016,... Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Joseph K. Liu, Ron Steinfeld
R3,162 Discovery Miles 31 620 Ships in 10 - 15 working days

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.

Descriptive Set Theoretic Methods in Automata Theory - Decidability and Topological Complexity (Paperback, 1st ed. 2016):... Descriptive Set Theoretic Methods in Automata Theory - Decidability and Topological Complexity (Paperback, 1st ed. 2016)
Michal Skrzypczak
R2,231 Discovery Miles 22 310 Ships in 10 - 15 working days

The book is based on the PhD thesis "Descriptive Set Theoretic Methods in Automata Theory," awarded the E.W. Beth Prize in 2015 for outstanding dissertations in the fields of logic, language, and information. The thesis reveals unexpected connections between advanced concepts in logic, descriptive set theory, topology, and automata theory and provides many deep insights into the interplay between these fields. It opens new perspectives on central problems in the theory of automata on infinite words and trees and offers very impressive advances in this theory from the point of view of topology. "...the thesis of Michal Skrzypczak offers certainly what we expect from excellent mathematics: new unexpected connections between a priori distinct concepts, and proofs involving enlightening ideas." Thomas Colcombet.

Physical Unclonable Functions in Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2013): Christoph... Physical Unclonable Functions in Theory and Practice (Paperback, Softcover reprint of the original 1st ed. 2013)
Christoph Boehm, Maximilian Hofer
R3,836 Discovery Miles 38 360 Ships in 10 - 15 working days

In Physical Unclonable Functions in Theory and Practice, the authors present an in-depth overview of various topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits. Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit's perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement results Different error rate reducing pre-selection techniques This monograph gives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic.

Control Modes on Mobile Software Platforms - Empirical Studies on the Importance of Informal Control (Paperback, 1st ed. 2016):... Control Modes on Mobile Software Platforms - Empirical Studies on the Importance of Informal Control (Paperback, 1st ed. 2016)
Tobias Goldbach
R1,877 Discovery Miles 18 770 Ships in 10 - 15 working days

This work highlights the importance of informal control modes on software platforms regarding their positive effects on third-party developers' behaviors and outcomes. The author presents studies in the mobile software industry, demonstrating how self-control and clan control positively affect developers' outcome performance, app quality and intentions to stay on software platforms. Moreover, the studies' findings shed light on the underlying explanatory mechanisms of why informal control modes can be exercised effectively on software platforms and how especially clan control may be facilitated through developers' social capital.

Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.): Jeremy Wittkop Building a Comprehensive IT Security Program - Practical Guidelines and Best Practices (Paperback, 1st ed.)
Jeremy Wittkop
R2,024 R1,816 Discovery Miles 18 160 Save R208 (10%) Ships in 10 - 15 working days

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the current situation as it relates to cybersecurity, the challenges facing private business, and the fundamental changes organizations can make to better protect themselves. The problems we face are difficult, but they are not hopeless. Cybercrime continues to grow at an astounding rate. With constant coverage of cyber-attacks in the media, there is no shortage of awareness of increasing threats. Budgets have increased and executives are implementing stronger defenses. Nonetheless, breaches continue to increase in frequency and scope. Building a Comprehensive IT Security Program shares why organizations continue to fail to secure their critical information assets and explains the internal and external adversaries facing organizations today. This book supplies the necessary knowledge and skills to protect organizations better in the future by implementing a comprehensive approach to security. Jeremy Wittkop's security expertise and critical experience provides insights into topics such as: Who is attempting to steal information and why? What are critical information assets? How are effective programs built? How is stolen information capitalized? How do we shift the paradigm to better protect our organizations? How we can make the cyber world safer for everyone to do business?

Artificial Intelligence for Internet of Things - Design Principle, Modernization, and Techniques (Hardcover): N. Thillaiarasu,... Artificial Intelligence for Internet of Things - Design Principle, Modernization, and Techniques (Hardcover)
N. Thillaiarasu, Suman Lata Tripathi, V. Dhinakaran
R4,127 Discovery Miles 41 270 Ships in 12 - 19 working days

The text comprehensively discusses the essentials of the Internet of Things (IoT), machine learning algorithms, industrial and medical IoT, robotics, data analytics tools, and technologies for smart cities. It further covers fundamental concepts, advanced tools, and techniques, along with the concept of energy-efficient systems. It also highlights software and hardware interfacing into the IoT platforms and systems for better understanding. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. Features: Covers cognitive Internet of Things and emerging network, IoT in robotics, smart cities, and health care Discusses major issues in the field of the IoTsuch as scalable and secure issues, energy-efficient, and actuator devices Highlights the importance of industrial and medical IoT Illustrates applications of the IoT in robotics, smart grid, and smart cities Presents real-time examples for better understanding The text comprehensively discusses design principles, modernization techniques, advanced developments in artificial intelligence.This will be helpful for senior undergraduates, graduate students, and academic researchers in diverse engineering fields including electrical, electronics and communication, and computer science.

Methods in Algorithmic Analysis (Paperback): Vladimir A. Dobrushkin Methods in Algorithmic Analysis (Paperback)
Vladimir A. Dobrushkin; Series edited by Sartaj Sahni
R2,620 Discovery Miles 26 200 Ships in 12 - 19 working days

Explores the Impact of the Analysis of Algorithms on Many Areas within and beyond Computer Science A flexible, interactive teaching format enhanced by a large selection of examples and exercises Developed from the author's own graduate-level course, Methods in Algorithmic Analysis presents numerous theories, techniques, and methods used for analyzing algorithms. It exposes students to mathematical techniques and methods that are practical and relevant to theoretical aspects of computer science. After introducing basic mathematical and combinatorial methods, the text focuses on various aspects of probability, including finite sets, random variables, distributions, Bayes' theorem, and Chebyshev inequality. It explores the role of recurrences in computer science, numerical analysis, engineering, and discrete mathematics applications. The author then describes the powerful tool of generating functions, which is demonstrated in enumeration problems, such as probabilistic algorithms, compositions and partitions of integers, and shuffling. He also discusses the symbolic method, the principle of inclusion and exclusion, and its applications. The book goes on to show how strings can be manipulated and counted, how the finite state machine and Markov chains can help solve probabilistic and combinatorial problems, how to derive asymptotic results, and how convergence and singularities play leading roles in deducing asymptotic information from generating functions. The final chapter presents the definitions and properties of the mathematical infrastructure needed to accommodate generating functions. Accompanied by more than 1,000 examples and exercises, this comprehensive, classroom-tested text develops students' understanding of the mathematical methodology behind the analysis of algorithms. It emphasizes the important relation between continuous (classical) mathematics and discrete mathematics, which is the basis of computer science.

Instant Recovery with Write-Ahead Logging (Paperback, 2nd Revised edition): Goetz Graefe, Wey Guy, Caetano Sauer Instant Recovery with Write-Ahead Logging (Paperback, 2nd Revised edition)
Goetz Graefe, Wey Guy, Caetano Sauer
R1,118 Discovery Miles 11 180 Ships in 10 - 15 working days

Traditional theory and practice of write-ahead logging and of database recovery focus on three failure classes: transaction failures (typically due to deadlocks) resolved by transaction rollback; system failures (typically power or software faults) resolved by restart with log analysis, "redo," and "undo" phases; and media failures (typically hardware faults) resolved by restore operations that combine multiple types of backups and log replay. The recent addition of single-page failures and single-page recovery has opened new opportunities far beyond the original aim of immediate, lossless repair of single-page wear-out in novel or traditional storage hardware. In the contexts of system and media failures, efficient single-page recovery enables on-demand incremental "redo" and "undo" as part of system restart or media restore operations. This can give the illusion of practically instantaneous restart and restore: instant restart permits processing new queries and updates seconds after system reboot and instant restore permits resuming queries and updates on empty replacement media as if those were already fully recovered. In the context of node and network failures, instant restart and instant restore combine to enable practically instant failover from a failing database node to one holding merely an out-of-date backup and a log archive, yet without loss of data, updates, or transactional integrity. In addition to these instant recovery techniques, the discussion introduces self-repairing indexes and much faster offline restore operations, which impose no slowdown in backup operations and hardly any slowdown in log archiving operations. The new restore techniques also render differential and incremental backups obsolete, complete backup commands on a database server practically instantly, and even permit taking full up-to-date backups without imposing any load on the database server. Compared to the first version of this book, this second edition adds sections on applications of single-page repair, instant restart, single-pass restore, and instant restore. Moreover, it adds sections on instant failover among nodes in a cluster, applications of instant failover, recovery for file systems and data files, and the performance of instant restart and instant restore.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Turning Wealth into What Matters - A…
Dana Holt Hardcover R1,236 Discovery Miles 12 360
Broken Child Mended Man
Adam Starks Hardcover R819 R726 Discovery Miles 7 260
Marriage For One
Ella Maise Paperback R245 Discovery Miles 2 450
The Voice of Terror - A Biography of…
Frederic Trautmann Hardcover R2,056 Discovery Miles 20 560
Deep End
Ali Hazelwood Paperback  (1)
R344 R322 Discovery Miles 3 220
Mutual Aid - An Illuminated Factor of…
Peter Kropotkin Hardcover R1,615 Discovery Miles 16 150
CSEC Maths Multiple Choice Practice
Terry David Paperback R364 Discovery Miles 3 640
BBQ For All - Year-Round Outdoor Cooking…
Marcus Bawdon Hardcover R658 R545 Discovery Miles 5 450
Die Antwoord-Reeks Graad 12 wiskunde 2…
Anne Eadie, Gretel Lampe Paperback R212 Discovery Miles 2 120
Weekly Meal Planner And Grocery List…
Midnight Mornings Media Hardcover R559 Discovery Miles 5 590

 

Partners