0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (494)
  • R250 - R500 (4,251)
  • R500+ (32,351)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming

Hardware/Software Co-Design for Data Flow Dominated Embedded Systems (Hardcover, 1998 ed.): Ralf Niemann Hardware/Software Co-Design for Data Flow Dominated Embedded Systems (Hardcover, 1998 ed.)
Ralf Niemann; Foreword by Peter Marwedel
R4,560 Discovery Miles 45 600 Ships in 10 - 15 working days

The design process of embedded systems has changed substantially in recent years. One of the main reasons for this change is the pressure to shorten time-to-market when designing digital systems. To shorten the product cycles, programmable processes are used to implement more and more functionality of the embedded system. Therefore, nowadays, embedded systems are very often implemented by heterogeneous systems consisting of ASICs, processors, memories and peripherals. As a consequence, the research topic of hardware/software co-design, dealing with the problems of designing these heterogeneous systems, has gained great importance. Hardware/Software Co-design for Data Flow Dominated Embedded Systems introduces the different tasks of hardware/software co-design including system specification, hardware/software partitioning, co-synthesis and co-simulation. The book summarizes and classifies state-of-the-art co-design tools and methods for these tasks. In addition, the co-design tool COOL is presented which solves the co-design tasks for the class of data-flow dominated embedded systems. In Hardware/Software Co-design for Data Flow Dominated Embedded Systems the primary emphasis has been put on the hardware/software partitioning and the co-synthesis phase and their coupling. In contrast to many other publications in this area, a mathematical formulation of the hardware/software partitioning problem is given. This problem formulation supports target architectures consisting of multiple processors and multiple ASICs. Several novel approaches are presented and compared for solving the partitioning problem, including an MILP approach, a heuristic solution and an approach based on geneticalgorithms. The co-synthesis phase is based on the idea of controlling the system by means of a static run-time scheduler implemented in hardware. New algorithms are introduced which generate a complete set of hardware and software specifications required to implement heterogeneous systems. All of these techniques are described in detail and exemplified. Hardware/Software Co-design for Data Flow Dominated Embedded Systems is intended to serve students and researchers working on hardware/software co-design. At the same time the variety of presented techniques automating the design tasks of hardware/software systems will be of interest to industrial engineers and designers of digital systems. From the foreword by Peter Marwedel: Niemann's method should be known by all persons working in the field. Hence, I recommend this book for everyone who is interested in hardware/software co-design.

Topology in Process Calculus - Approximate Correctness and Infinite Evolution of Concurrent Programs (Hardcover, 2001 ed.):... Topology in Process Calculus - Approximate Correctness and Infinite Evolution of Concurrent Programs (Hardcover, 2001 ed.)
Mingsheng Ying
R1,650 Discovery Miles 16 500 Ships in 10 - 15 working days

Process calculi are among the most successful models of concurrent systems. Various behavior equivalences between processes are central notions in CCS (calculus of communicating systems) and other process calculi. In the real applications, specification and implementation are described as two processes, and correctness of programs is treated as a certain behavior equivalence between them. The purpose of this book is to establish a theory of approximate correctness and infinite evolution of concurrent programs by employing some notions and tools from point-set topology. This book is restricted to CCS for simplicity, but the main idea also applies to some other process calculi. The concept of bisimulation limits, useful for the understanding and analysis of infinite evolution of processes, is introduced. In addition, the notions of near bisimulations and bisimulation indexes, suitable in describing approximate correctness of concurrent programs, are proposed. The book will be of particular interest to researchers in the fields of theoretical computer science, especially theory of concurrency and hybrid systems, and graduate students in related disciplines. It will also be valuable to practical system designers developing concurrent and/or real-time systems.

Modeling Semantic Web Services - The Web Service Modeling Language (Hardcover, 2008 ed.): Jos De Bruijn, Mick Kerrigan, Uwe... Modeling Semantic Web Services - The Web Service Modeling Language (Hardcover, 2008 ed.)
Jos De Bruijn, Mick Kerrigan, Uwe Keller, Holger Lausen, James Scicluna
R1,527 Discovery Miles 15 270 Ships in 10 - 15 working days

Semantic Web services promise to automate tasks such as discovery, mediation, selection, composition, and invocation of services, enabling fully flexible automated e-business. Their usage, however, still requires a significant amount of human intervention due to the lack of support for a machine-processable description.

In this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description of the various aspects related to Semantic Web services, such as the static background knowledge in the form of ontologies, the functional description of the service, and the behavioral description of the service. They introduce the Web Service Modeling Language (WSML), which provides means for describing the functionality and behavior of Web services, as well as the underlying business knowledge, in the form of ontologies, with a conceptual grounding in the Web Service Modeling Ontology.

Academic and industrial researchers as well as professionals will find a comprehensive overview of the concepts and challenges in the area of Semantic Web services, the Web Services Modeling Language and its relation to the Web Services Modeling Ontology, and an in-depth treatment of both enabling technologies and theoretical foundations.

Modeling and Simulating Bodies and Garments (Hardcover, 2010 Ed.): Nadia Magnenat-Thalmann Modeling and Simulating Bodies and Garments (Hardcover, 2010 Ed.)
Nadia Magnenat-Thalmann
R2,885 Discovery Miles 28 850 Ships in 10 - 15 working days

This book contains the research on modeling bodies, cloth and character based adaptation performed during the last 3 years at MIRALab at the University of Geneva. More than ten researchers have worked together in order to reach a truly 3D Virtual Try On. What we mean by Virtual Try On is the possibility of anyone to give dimensions on her predefined body and obtain her own sized shape body, select a 3D cloth and see oneself animated in Real-Time, walking along a catwalk. Some systems exist today but are unable to adapt to body dimensions, have no real-time animation of body and clothes. A truly system on the web of Virtual Try On does not exist so far. This book is an attempt to explain how to build a 3D Virtual Try On system which is now very much in demand in the clothing industry. To describe this work, the book is divided into five chapters. The first chapter contains a brief historical background of general deformation methods. It ends with a section on the 3D human body scanner systems that are used both for rapid p- totyping and statistical analyses of the human body size variations.

On the Way to the Web - The Secret History of the Internet and Its Founders (Hardcover, 1st ed.): Michael Banks On the Way to the Web - The Secret History of the Internet and Its Founders (Hardcover, 1st ed.)
Michael Banks
R609 R564 Discovery Miles 5 640 Save R45 (7%) Ships in 10 - 15 working days

On the Way to the Web: The Secret History of the Internet and Its Founders is an absorbing chronicle of the inventive, individualistic, and often cantankerous individuals who set the Internet free. Michael A. Banks describes how the online population created a new culture and turned a new frontier into their vision of the future. This book will introduce you to the innovators who laid the foundation for the Internet and the World Wide Web, the man who invented online chat, and the people who invented the products all of us use online every day. Learn where, when, how and why the Internet came into being, and exactly what hundreds of thousands of people were doing online before the Web. See who was behind it all, and what inspired them.

Cyberspace Security and Defense: Research Issues - Proceedings of the NATO Advanced Research Workshop on Cyberspace Security... Cyberspace Security and Defense: Research Issues - Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues, Gdansk, Poland, from 6 to 9 September 2004. (Hardcover, 2005 ed.)
Janusz S. Kowalik, Janusz G orski, Anatoly Sachenko
R3,101 Discovery Miles 31 010 Ships in 10 - 15 working days

Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many opportunities for abuse, fraud and expensive damage. This book is a selection of the best papers presented at the NATO Advanced Research Workshop dealing with the Subject of Cyberspace Security and Defense. The level of the individual contributions in the volume is advanced and suitable for senior and graduate students, researchers and technologists who wish to get some feeling of the state of the art in several sub-disciplines of Cyberspace security.

Several papers provide a broad-brush description of national security issues and brief summaries of technology states. These papers can be read and appreciated by technically enlightened managers and executives who want to understand security issues and approaches to technical solutions. An important question of our times is not "Should we do something for enhancing our digital assets security," the question is "How to do it."

Automatically Ordering Events and Times in Text (Hardcover, 1st ed. 2017): Leon R.A. Derczynski Automatically Ordering Events and Times in Text (Hardcover, 1st ed. 2017)
Leon R.A. Derczynski
R3,531 Discovery Miles 35 310 Ships in 12 - 19 working days

The book offers a detailed guide to temporal ordering, exploring open problems in the field and providing solutions and extensive analysis. It addresses the challenge of automatically ordering events and times in text. Aided by TimeML, it also describes and presents concepts relating to time in easy-to-compute terms. Working out the order that events and times happen has proven difficult for computers, since the language used to discuss time can be vague and complex. Mapping out these concepts for a computational system, which does not have its own inherent idea of time, is, unsurprisingly, tough. Solving this problem enables powerful systems that can plan, reason about events, and construct stories of their own accord, as well as understand the complex narratives that humans express and comprehend so naturally. This book presents a theory and data-driven analysis of temporal ordering, leading to the identification of exactly what is difficult about the task. It then proposes and evaluates machine-learning solutions for the major difficulties. It is a valuable resource for those working in machine learning for natural language processing as well as anyone studying time in language, or involved in annotating the structure of time in documents.

Constraint and Integer Programming - Toward a Unified Methodology (Hardcover, 2004 ed.): Michela Milano Constraint and Integer Programming - Toward a Unified Methodology (Hardcover, 2004 ed.)
Michela Milano
R4,583 Discovery Miles 45 830 Ships in 10 - 15 working days

Despite differing origins, constraint programming and mathematical programming are beginning to merge. Constraint programming has grown out of the logic programming community as part of an effort to embed constraints in a programming language. Mathematical programming, a much older field, is rooted in the mathematics of optimization. Because these two areas have complementary strengths, there are ongoing efforts to integrate the two.Constraint and Integer Programming presents some of the basic ideas of constraint programming and mathematical programming, explores approaches to integration, brings us up to date on heuristic methods, and attempts to discern future directions in this fast-moving field.
Constraint and Integer Programming is organized as follows: Chapter 1 is a high level overview of the main concepts of Constraint Programming (CP) and Integer Programming (IP) used in the book. Chapter 2 informally introduces integration methods describing and classifying the main works in the field. Chapter 3 outlines a unifying framework which involves the main concepts of CP and IP, underlining similarities and differences, and stating the basis for possible integrations. Chapter 4 describes global constraints as a vehicle for integrating IP concepts in CP in a transparent way for the user. Chapter 5 presents various ways to integrate relaxations in Constraint Programming focussing on global constraints. Chapter 6 presents hybrid solvers and Chapter 7 outlines Column Generation and its integration in Constraint Programming. Chapter 8 examines randomization and problem structure as a basis for understanding the intrinsic difficulty of the combinatorial problems. Chapter 9 studies the use of local search and meta-heuristics in CP. Chapter 10 is devoted to open perspectives and future directions.

New Approaches to Circle Packing in a Square - With Program Codes (Hardcover, 2007): Peter Gabor Szabo, Mihaly Csaba Markot,... New Approaches to Circle Packing in a Square - With Program Codes (Hardcover, 2007)
Peter Gabor Szabo, Mihaly Csaba Markot, Tibor Csendes, Eckard Specht, Leocadio G. Casado, …
R3,018 Discovery Miles 30 180 Ships in 10 - 15 working days

New Approaches to Circle Packing into the Square is devoted to the most recent results on the densest packing of equal circles in a square. In the last few decades, many articles have considered this question, which has been an object of interest since it is a hard challenge both in discrete geometry and in mathematical programming. The authors have studied this geometrical optimization problem for a long time, and they developed several new algorithms to solve it. The book completely covers the investigations on this topic.

Coding Ockham's Razor (Hardcover, 1st ed. 2018): Lloyd Allison Coding Ockham's Razor (Hardcover, 1st ed. 2018)
Lloyd Allison
R2,874 Discovery Miles 28 740 Ships in 10 - 15 working days

This book explores inductive inference using the minimum message length (MML) principle, a Bayesian method which is a realisation of Ockham's Razor based on information theory. Accompanied by a library of software, the book can assist an applications programmer, student or researcher in the fields of data analysis and machine learning to write computer programs based upon this principle. MML inference has been around for 50 years and yet only one highly technical book has been written about the subject. The majority of research in the field has been backed by specialised one-off programs but this book includes a library of general MML-based software, in Java. The Java source code is available under the GNU GPL open-source license. The software library is documented using Javadoc which produces extensive cross referenced HTML manual pages. Every probability distribution and statistical model that is described in the book is implemented and documented in the software library. The library may contain a component that directly solves a reader's inference problem, or contain components that can be put together to solve the problem, or provide a standard interface under which a new component can be written to solve the problem. This book will be of interest to application developers in the fields of machine learning and statistics as well as academics, postdocs, programmers and data scientists. It could also be used by third year or fourth year undergraduate or postgraduate students.

Numerical Computations with GPUs (Hardcover, 2014): Volodymyr Kindratenko Numerical Computations with GPUs (Hardcover, 2014)
Volodymyr Kindratenko
R3,913 Discovery Miles 39 130 Ships in 12 - 19 working days

This book brings together research on numerical methods adapted for Graphics Processing Units (GPUs). It explains recent efforts to adapt classic numerical methods, including solution of linear equations and FFT, for massively parallel GPU architectures. This volume consolidates recent research and adaptations, covering widely used methods that are at the core of many scientific and engineering computations. Each chapter is written by authors working on a specific group of methods; these leading experts provide mathematical background, parallel algorithms and implementation details leading to reusable, adaptable and scalable code fragments. This book also serves as a GPU implementation manual for many numerical algorithms, sharing tips on GPUs that can increase application efficiency. The valuable insights into parallelization strategies for GPUs are supplemented by ready-to-use code fragments. Numerical Computations with GPUs targets professionals and researchers working in high performance computing and GPU programming. Advanced-level students focused on computer science and mathematics will also find this book useful as secondary text book or reference.

Invasive Software Composition (Hardcover, 2003 ed.): Uwe Assmann Invasive Software Composition (Hardcover, 2003 ed.)
Uwe Assmann
R1,723 Discovery Miles 17 230 Ships in 10 - 15 working days

Over the past two decades, software engineering has come a long way from object-based to object-oriented to component-based design and development. Invasive software composition is a new technique that unifies and extends recent software engineering concepts like generic programming, aspect-oriented development, architecture systems, or subject-oriented development. To improve reuse, this new method regards software components as grayboxes and integrates them during composition. Building on a minimal set of program transformations, composition operator libraries can be developed that parameterize, extend, connect, mediate, and aspect-weave components. The book is centered around the JAVA language and the freely available demonstrator library COMPOST. It provides a wealth of materials for researchers, students, and professional software architects alike.

Optimization Methods, Theory and Applications (Hardcover, 2015 ed.): Honglei Xu, Song Wang, Soon-Yi Wu Optimization Methods, Theory and Applications (Hardcover, 2015 ed.)
Honglei Xu, Song Wang, Soon-Yi Wu
R1,544 Discovery Miles 15 440 Ships in 10 - 15 working days

This book presents the latest research findings and state-of-the-art solutions on optimization techniques and provides new research direction and developments. Both the theoretical and practical aspects of the book will be much beneficial to experts and students in optimization and operation research community. It selects high quality papers from The International Conference on Optimization: Techniques and Applications (ICOTA2013). The conference is an official conference series of POP (The Pacific Optimization Research Activity Group; there are over 500 active members). These state-of-the-art works in this book authored by recognized experts will make contributions to the development of optimization with its applications.

Automated Theorem Proving in Software Engineering (Hardcover, 2001 ed.): D. Loveland Automated Theorem Proving in Software Engineering (Hardcover, 2001 ed.)
D. Loveland; Johann M. Schumann
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

The growing demand for high quality, safety, and security of software systems can only be met by rigorous application of formal methods during software design. Tools for formal methods in general, however, do not provide a sufficient level of automatic processing. This book methodically investigates the potential of first-order logic automated theorem provers for applications in software engineering.Illustrated by complete case studies on verification of communication and security protocols and logic-based component reuse, the book characterizes proof tasks to allow an assessment of the provers capabilities. Necessary techniques and extensions, e.g., for handling inductive and modal proof tasks, or for controlling the prover, are covered in detail. The book demonstrates that state-of-the-art automated theorem provers are capable of automatically handling important tasks during the development of high-quality software and it provides many helpful techniques for increasing practical usability of the automated theorem prover for successful applications.

Soft City Culture and Technology - The Betaville Project (Hardcover, 2014 ed.): Carl Skelton Soft City Culture and Technology - The Betaville Project (Hardcover, 2014 ed.)
Carl Skelton
R3,789 R3,507 Discovery Miles 35 070 Save R282 (7%) Ships in 12 - 19 working days

Soft City Culture and Technology: The Betaville Project discusses the complete cycle of conception, development, and deployment of the Betaville platform.

Betaville is a massively participatory online environment for distributed 3D design and development of proposals for changes to the built environment an experimental integration of art, design, and software development for the public realm. Through a detailed account of Betaville from a Big Crazy Idea to a working "deep social medium," the author examines the current conditions of performance and accessibility of hardware, software, networks, and skills that can be brought together into a new form of open public design and deliberation space, for and spanning and integrating the disparate spheres of art, architecture, social media, and engineering.

Betaville is an ambitious enterprise, of building compelling and constructive working relationships in situations where roles and disciplinary boundaries must be as agile as the development process of the software itself. Through a considered account and analysis of the interdependencies between Betaville's project design, development methods, and deployment, the reader can gain a deeper understanding of the potential socio-technical forms of New Soft Cities: blended virtual-physical worlds, whose "public works" must ultimately serve and succeed as massively collaborative works of art and infrastructure."

Relational Data Mining (Hardcover, 2001 ed.): Saso Dzeroski, Nada Lavrac Relational Data Mining (Hardcover, 2001 ed.)
Saso Dzeroski, Nada Lavrac
R3,114 Discovery Miles 31 140 Ships in 10 - 15 working days

As the first book devoted to relational data mining, this coherently written multi-author monograph provides a thorough introduction and systematic overview of the area. The first part introduces the reader to the basics and principles of classical knowledge discovery in databases and inductive logic programming; subsequent chapters by leading experts assess the techniques in relational data mining in a principled and comprehensive way; finally, three chapters deal with advanced applications in various fields and refer the reader to resources for relational data mining.This book will become a valuable source of reference for R&D professionals active in relational data mining. Students as well as IT professionals and ambitioned practitioners interested in learning about relational data mining will appreciate the book as a useful text and gentle introduction to this exciting new field.

Evaluating User Experience in Games - Concepts and Methods (Hardcover, 2010): Regina Bernhaupt Evaluating User Experience in Games - Concepts and Methods (Hardcover, 2010)
Regina Bernhaupt
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

It was a pleasure to provide an introduction to a new volume on user experience evaluation in games. The scope, depth, and diversity of the work here is amazing. It attests to the growing popularity of games and the increasing importance developing a range of theories, methods, and scales to evaluate them. This evolution is driven by the cost and complexity of games being developed today. It is also driven by the need to broaden the appeal of games. Many of the approaches described here are enabled by new tools and techniques. This book (along with a few others) represents a watershed in game evaluation and understanding. The eld of game evaluation has truly "come of age." The broader eld of HCI can begin to look toward game evaluation for fresh, critical, and sophisticated thi- ing about design evaluation and product development. They can also look to games for groundbreaking case studies of evaluation of products. I'll brie y summarize each chapter below and provide some commentary. In conclusion, I will mention a few common themes and offer some challenges. Discussion In Chapter 1, User Experience Evaluation in Entertainment, Bernhaupt gives an overview and presents a general framework on methods currently used for user experience evaluation. The methods presented in the following chapters are s- marized and thus allow the reader to quickly assess the right set of methods that will help to evaluate the game under development.

Integer Programming and Network Models (Hardcover, 2000 ed.): H.A. Eiselt Integer Programming and Network Models (Hardcover, 2000 ed.)
H.A. Eiselt; Contributions by K. Spielberg, E Richards; Carl-Louis Sandblom; Contributions by B. T. Smith, …
R4,695 Discovery Miles 46 950 Ships in 12 - 19 working days

The book presents a unified treatment of integer programming and network models with topics ranging from exact and heuristic algorithms to network flows, traveling salesman tours, and traffic assignment problems. While the emphasis of the book is on models and applications, the most important methods and algorithms are described in detail and illustrated by numerical examples. The formulations and the discussion of a large variety of models provides insight into their structures that allows the user to better evaluate the solutions to the problems.

Double Exposure (Hardcover): Jay Hamblin Double Exposure (Hardcover)
Jay Hamblin
R719 Discovery Miles 7 190 Ships in 12 - 19 working days

Another powerful contraction began and the pain jarred her back to the reality of the task at hand. In just a few minutes, the head appeared and the event moments ago were repeated. Again, the Doktor held the baby by its feet and gave this one a good whack. Nothing happened. He tried again. There was still no cry from the baby. He laid the baby down and put his stethoscope to his tiny chest. A frown crossed his face. Nurse Kelm had seen that look before and understood. The Doktor tied and cut the cord just as he had done with the first baby and handed him to Ilse. She quickly wrapped the baby in a receiving blanket, picked it up and rushed out of the room. Freya watched this scene as if seeing it in slow motion. Where is she taking my baby? she screamed. The Doktor took her hand and said softly, I'm sorry Frau Muller, but he is dead. A heart-rending scream shattered the quiet of the room. Freya began to sob uncontrollably. The Doktor whispered to the second nurse and she handed him a syringe with a mild sedative. Freya didn't feel the needle enter her arm. She couldn't feel anything at that moment except a pain in her heart that made her oblivious to any physical pain.

Managing Chaos - Digital Governance by Design (Paperback): Lisa Welchman Managing Chaos - Digital Governance by Design (Paperback)
Lisa Welchman
R975 Discovery Miles 9 750 Ships in 9 - 17 working days
Object-Oriented Discrete-Event Simulation with Java - A Practical Introduction (Hardcover, 2001 ed.): Jose M. Garrido Object-Oriented Discrete-Event Simulation with Java - A Practical Introduction (Hardcover, 2001 ed.)
Jose M. Garrido
R4,505 Discovery Miles 45 050 Ships in 10 - 15 working days

Researches and developers of simulation models state that the Java program ming language presents a unique and significant opportunity for important changes in the way we develop simulation models today. The most important characteristics of the Java language that are advantageous for simulation are its multi-threading capabilities, its facilities for executing programs across the Web, and its graphics facilities. It is feasible to develop compatible and reusable simulation components that will facilitate the construction of newer and more complex models. This is possible with Java development environments. Another important trend that begun very recently is web-based simulation, i.e., and the execution of simulation models using Internet browser software. This book introduces the application of the Java programming language in discrete-event simulation. In addition, the fundamental concepts and prac tical simulation techniques for modeling different types of systems to study their general behavior and their performance are introduced. The approaches applied are the process interaction approach to discrete-event simulation and object-oriented modeling. Java is used as the implementation language and UML as the modeling language. The first offers several advantages compared to C++, the most important being: thread handling, graphical user interfaces (QUI) and Web computing. The second language, UML (Unified Modeling Language) is the standard notation used today for modeling systems as a collection of classes, class relationships, objects, and object behavior."

Basics of Software Engineering Experimentation (Hardcover, 2001 ed.): Natalia Juristo, Ana M. Moreno Basics of Software Engineering Experimentation (Hardcover, 2001 ed.)
Natalia Juristo, Ana M. Moreno
R5,822 Discovery Miles 58 220 Ships in 10 - 15 working days

Basics of Software Engineering Experimentation is a practical guide to experimentation in a field which has long been underpinned by suppositions, assumptions, speculations and beliefs. It demonstrates to software engineers how Experimental Design and Analysis can be used to validate their beliefs and ideas. The book does not assume its readers have an in-depth knowledge of mathematics, specifying the conceptual essence of the techniques to use in the design and analysis of experiments and keeping the mathematical calculations clear and simple. Basics of Software Engineering Experimentation is practically oriented and is specially written for software engineers, all the examples being based on real and fictitious software engineering experiments.

Hybrid Soft Computing Approaches - Research and Applications (Hardcover, 1st ed. 2016): Siddhartha Bhattacharyya, Paramartha... Hybrid Soft Computing Approaches - Research and Applications (Hardcover, 1st ed. 2016)
Siddhartha Bhattacharyya, Paramartha Dutta, Susanta Chakraborty
R4,955 R3,811 Discovery Miles 38 110 Save R1,144 (23%) Ships in 12 - 19 working days

The book provides a platform for dealing with the flaws and failings of the soft computing paradigm through different manifestations. The different chapters highlight the necessity of the hybrid soft computing methodology in general with emphasis on several application perspectives in particular. Typical examples include (a) Study of Economic Load Dispatch by Various Hybrid Optimization Techniques, (b) An Application of Color Magnetic Resonance Brain Image Segmentation by Para Optimus LG Activation Function, (c) Hybrid Rough-PSO Approach in Remote Sensing Imagery Analysis, (d) A Study and Analysis of Hybrid Intelligent Techniques for Breast Cancer Detection using Breast Thermograms, and (e) Hybridization of 2D-3D Images for Human Face Recognition. The elaborate findings of the chapters enhance the exhibition of the hybrid soft computing paradigm in the field of intelligent computing.

Memetic Computation - The Mainspring of Knowledge Transfer in a Data-Driven Optimization Era (Hardcover, 1st ed. 2019):... Memetic Computation - The Mainspring of Knowledge Transfer in a Data-Driven Optimization Era (Hardcover, 1st ed. 2019)
Abhishek Gupta, Yew Soon Ong
R4,233 Discovery Miles 42 330 Ships in 12 - 19 working days

This book bridges the widening gap between two crucial constituents of computational intelligence: the rapidly advancing technologies of machine learning in the digital information age, and the relatively slow-moving field of general-purpose search and optimization algorithms. With this in mind, the book serves to offer a data-driven view of optimization, through the framework of memetic computation (MC). The authors provide a summary of the complete timeline of research activities in MC - beginning with the initiation of memes as local search heuristics hybridized with evolutionary algorithms, to their modern interpretation as computationally encoded building blocks of problem-solving knowledge that can be learned from one task and adaptively transmitted to another. In the light of recent research advances, the authors emphasize the further development of MC as a simultaneous problem learning and optimization paradigm with the potential to showcase human-like problem-solving prowess; that is, by equipping optimization engines to acquire increasing levels of intelligence over time through embedded memes learned independently or via interactions. In other words, the adaptive utilization of available knowledge memes makes it possible for optimization engines to tailor custom search behaviors on the fly - thereby paving the way to general-purpose problem-solving ability (or artificial general intelligence). In this regard, the book explores some of the latest concepts from the optimization literature, including, the sequential transfer of knowledge across problems, multitasking, and large-scale (high dimensional) search, systematically discussing associated algorithmic developments that align with the general theme of memetics. The presented ideas are intended to be accessible to a wide audience of scientific researchers, engineers, students, and optimization practitioners who are familiar with the commonly used terminologies of evolutionary computation. A full appreciation of the mathematical formalizations and algorithmic contributions requires an elementary background in probability, statistics, and the concepts of machine learning. A prior knowledge of surrogate-assisted/Bayesian optimization techniques is useful, but not essential.

Code Generation with Templates (Hardcover, 2012): Jeroen Arnoldus, Mark Van Den Brand, A. Serebrenik, J.J. Brunekreef Code Generation with Templates (Hardcover, 2012)
Jeroen Arnoldus, Mark Van Den Brand, A. Serebrenik, J.J. Brunekreef
R2,881 Discovery Miles 28 810 Ships in 10 - 15 working days

Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background.

This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates.

First, a framework to determine the necessary computational power for the template metalanguage is presented. The template metalanguage does not need to be Turing-complete to be useful. A non-Turing-complete metalanguage enforces separation of concerns between the view and model.

Second, syntactical correctness of all languages of the templates and generated code is ensured. This includes the syntactical correctness of the template metalanguage and the output language. Third, case studies show that the achieved goals are applicable in practice. It is even shown that syntactical correctness helps to prevent cross-site scripting attacks in web applications.

The target audience of this book is twofold. The first group exists of researcher interested in the mathematical background of templates. The second group exists of users of templates. This includes designers of template engines on one side and programmers and web designers using templates on the other side"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
C++ Programming - Program Design…
D. Malik Paperback R1,751 R1,615 Discovery Miles 16 150
On Meaningful Scientific Laws
Jean-Claude Falmagne, Christopher Doble Hardcover R3,268 R1,937 Discovery Miles 19 370
Model Engineering in Mixed-Signal…
Sorin Alexander Huss Hardcover R4,450 Discovery Miles 44 500
Advances in Design and Specification…
Sorin Alexander Huss Hardcover R4,562 Discovery Miles 45 620
Advanced Techniques for Audio…
Rohit M. Thanki Hardcover R1,521 Discovery Miles 15 210
Evolutionary Computing and Mobile…
V. Suma, Noureddine Bouhmala, … Hardcover R5,823 Discovery Miles 58 230
Advances in Inductive Logic Programming
Luc de Raedt Hardcover R2,978 Discovery Miles 29 780
Rule-Based Programming
Thaddeus J. Kowalski, Leon S. Levy Hardcover R4,532 Discovery Miles 45 320
Behavioral Specifications of Businesses…
Haim Kilov, Bernhard Rumpe, … Hardcover R4,391 Discovery Miles 43 910
Problem Solving with C++ - Global…
Walter Savitch Paperback R2,551 Discovery Miles 25 510

 

Partners