0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (5)
  • R100 - R250 (494)
  • R250 - R500 (4,251)
  • R500+ (32,351)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer programming

In-Depth Analysis of Linear Programming (Hardcover, 2001 ed.): F.P. Vasilyev, A.Y. Ivanitskiy In-Depth Analysis of Linear Programming (Hardcover, 2001 ed.)
F.P. Vasilyev, A.Y. Ivanitskiy
R3,059 Discovery Miles 30 590 Ships in 10 - 15 working days

Along with the traditional material concerning linear programming (the simplex method, the theory of duality, the dual simplex method), In-Depth Analysis of Linear Programming contains new results of research carried out by the authors. For the first time, the criteria of stability (in the geometrical and algebraic forms) of the general linear programming problem are formulated and proved. New regularization methods based on the idea of extension of an admissible set are proposed for solving unstable (ill-posed) linear programming problems. In contrast to the well-known regularization methods, in the methods proposed in this book the initial unstable problem is replaced by a new stable auxiliary problem. This is also a linear programming problem, which can be solved by standard finite methods. In addition, the authors indicate the conditions imposed on the parameters of the auxiliary problem which guarantee its stability, and this circumstance advantageously distinguishes the regularization methods proposed in this book from the existing methods. In these existing methods, the stability of the auxiliary problem is usually only presupposed but is not explicitly investigated. In this book, the traditional material contained in the first three chapters is expounded in much simpler terms than in the majority of books on linear programming, which makes it accessible to beginners as well as those more familiar with the area.

Object-Oriented Technology (Hardcover, 1st ed. 2015): Suad Alagi c Object-Oriented Technology (Hardcover, 1st ed. 2015)
Suad Alagi c
R1,982 Discovery Miles 19 820 Ships in 12 - 19 working days

The core idea of this book is that object- oriented technology is a generic technology whose various technical aspects can be presented in a unified and consistent framework. This applies to both practical and formal aspects of object-oriented technology. Course tested in a variety of object-oriented courses, numerous examples, figures and exercises are presented in each chapter. The approach in this book is based on typed technologies, and the core notions fit mainstream object-oriented languages such as Java and C#. The book promotes object-oriented constraints (assertions), their specification and verification. Object-oriented constraints apply to specification and verification of object-oriented programs, specification of the object-oriented platform, more advanced concurrent models, database integrity constraints and object-oriented transactions, their specification and verification.

Mathematical Programming and Financial Objectives for Scheduling Projects (Hardcover, 2001 ed.): Alf Kimms Mathematical Programming and Financial Objectives for Scheduling Projects (Hardcover, 2001 ed.)
Alf Kimms
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

Mathematical Programming and Financial Objectives for Scheduling Projects focuses on decision problems where the performance is measured in terms of money. As the title suggests, special attention is paid to financial objectives and the relationship of financial objectives to project schedules and scheduling. In addition, how schedules relate to other decisions is treated in detail. The book demonstrates that scheduling must be combined with project selection and financing, and that scheduling helps to give an answer to the planning issue of the amount of resources required for a project. The author makes clear the relevance of scheduling to cutting budget costs. The book is divided into six parts. The first part gives a brief introduction to project management. Part two examines scheduling projects in order to maximize their net present value. Part three considers capital rationing. Many decisions on selecting or rejecting a project cannot be made in isolation and multiple projects must be taken fully into account. Since the requests for capital resources depend on the schedules of the projects, scheduling taken on more complexity. Part four studies the resource usage of a project in greater detail. Part five discusses cases where the processing time of an activity is a decision to be made. Part six summarizes the main results that have been accomplished.

Stochastic and Global Optimization (Hardcover, 2002 ed.): G. Dzemyda, V. Saltenis, A. Zilinskas Stochastic and Global Optimization (Hardcover, 2002 ed.)
G. Dzemyda, V. Saltenis, A. Zilinskas
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

In the paper we propose a model of tax incentives optimization for inve- ment projects with a help of the mechanism of accelerated depreciation. Unlike the tax holidays which influence on effective income tax rate, accelerated - preciation affects on taxable income. In modern economic practice the state actively use for an attraction of - vestment into the creation of new enterprises such mechanisms as accelerated depreciation and tax holidays. The problem under our consideration is the following. Assume that the state (region) is interested in realization of a certain investment project, for ex- ple, the creation of a new enterprise. In order to attract a potential investor the state decides to use a mechanism of accelerated tax depreciation. The foll- ing question arise. What is a reasonable principle for choosing depreciation rate? From the state's point of view the future investor's behavior will be rat- nal. It means that while looking at economic environment the investor choose such a moment for investment which maximizes his expected net present value (NPV) from the given project. For this case both criteria and "investment rule" depend on proposed (by the state) depreciation policy. For the simplicity we will suppose that the purpose of the state for a given project is a maximi- tion of a discounted tax payments into the budget from the enterprise after its creation. Of course, these payments depend on the moment of investor's entry and, therefore, on the depreciation policy established by the state.

Euclidean Shortest Paths - Exact or Approximate Algorithms (Hardcover, 2011): Fajie Li, Reinhard Klette Euclidean Shortest Paths - Exact or Approximate Algorithms (Hardcover, 2011)
Fajie Li, Reinhard Klette
R4,654 Discovery Miles 46 540 Ships in 10 - 15 working days

This unique text/reference reviews algorithms for the exact or approximate solution of shortest-path problems, with a specific focus on a class of algorithms called rubberband algorithms. Discussing each concept and algorithm in depth, the book includes mathematical proofs for many of the given statements. Topics and features: provides theoretical and programming exercises at the end of each chapter; presents a thorough introduction to shortest paths in Euclidean geometry, and the class of algorithms called rubberband algorithms; discusses algorithms for calculating exact or approximate ESPs in the plane; examines the shortest paths on 3D surfaces, in simple polyhedrons and in cube-curves; describes the application of rubberband algorithms for solving art gallery problems, including the safari, zookeeper, watchman, and touring polygons route problems; includes lists of symbols and abbreviations, in addition to other appendices.

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,983 Discovery Miles 29 830 Ships in 10 - 15 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Software Process Improvement with CMM (Hardcover): Joseph Raynus Software Process Improvement with CMM (Hardcover)
Joseph Raynus
R2,641 Discovery Miles 26 410 Ships in 10 - 15 working days

A practical step-by-step approach for improving the software development process within a company, using the Software Engineering Institute's Capability Maturity Model (CMM). The text explains common misconceptions associated with Software Business Improvement and CMM, using real-world examples. The book includes a reference table of key software metrics, which: help the reader evaluate measurements in relation to the functioning of his/her organisation; direct the software development to achieve higher levels of CMM in a timely manner; link measurement techniques to specific KPAs in a practical manner; and improve software process definition and improvement techniques with CMM as a guideline.

Quasiconvex Optimization and Location Theory (Hardcover, 1998 ed.): J. a. Dos Santos Gromicho Quasiconvex Optimization and Location Theory (Hardcover, 1998 ed.)
J. a. Dos Santos Gromicho
R3,012 Discovery Miles 30 120 Ships in 10 - 15 working days

grams of which the objective is given by the ratio of a convex by a positive (over a convex domain) concave function. As observed by Sniedovich (Ref. [102, 103]) most of the properties of fractional pro grams could be found in other programs, given that the objective function could be written as a particular composition of functions. He called this new field C programming, standing for composite concave programming. In his seminal book on dynamic programming (Ref. [104]), Sniedovich shows how the study of such com positions can help tackling non-separable dynamic programs that otherwise would defeat solution. Barros and Frenk (Ref. [9]) developed a cutting plane algorithm capable of optimizing C-programs. More recently, this algorithm has been used by Carrizosa and Plastria to solve a global optimization problem in facility location (Ref. [16]). The distinction between global optimization problems (Ref. [54]) and generalized convex problems can sometimes be hard to establish. That is exactly the reason why so much effort has been placed into finding an exhaustive classification of the different weak forms of convexity, establishing a new definition just to satisfy some desirable property in the most general way possible. This book does not aim at all the subtleties of the different generalizations of convexity, but concentrates on the most general of them all, quasiconvex programming. Chapter 5 shows clearly where the real difficulties appear.

Software Engineering in the Era of Cloud Computing (Hardcover, 1st ed. 2020): Muthu Ramachandran, Zaigham Mahmood Software Engineering in the Era of Cloud Computing (Hardcover, 1st ed. 2020)
Muthu Ramachandran, Zaigham Mahmood
R4,254 Discovery Miles 42 540 Ships in 12 - 19 working days

This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.

Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018): Jan H.P. Eloff, Madeleine Bihina Bella Software Failure Investigation - A Near-Miss Analysis Approach (Hardcover, 1st ed. 2018)
Jan H.P. Eloff, Madeleine Bihina Bella
R3,703 R3,421 Discovery Miles 34 210 Save R282 (8%) Ships in 12 - 19 working days

This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techniques focus on the time-window before the software failure actually unfolds, so as to detect the high-risk conditions that can lead to a major failure. They detail how by alerting system users of an upcoming software failure, the detection of near misses provides an opportunity to collect at runtime failure-related data that is complete and relevant. They present a near-miss management systems (NMS) for detecting upcoming software failures, which can contribute significantly to the improvement of the accuracy of the software failure analysis. A prototype of the NMS is implemented and is discussed in the book. The authors give a practical hands-on approach towards doing software failure investigations by means of near-miss analysis that is of use to industry and academia

JAVA Programming for Beginners - The Simple Guide to Learning JAVA Programming fast! (Hardcover): Tim Warren JAVA Programming for Beginners - The Simple Guide to Learning JAVA Programming fast! (Hardcover)
Tim Warren
R599 R543 Discovery Miles 5 430 Save R56 (9%) Ships in 10 - 15 working days
Triadic Game Design - Balancing Reality, Meaning and Play (Hardcover, Edition.): Casper Harteveld Triadic Game Design - Balancing Reality, Meaning and Play (Hardcover, Edition.)
Casper Harteveld
R4,391 Discovery Miles 43 910 Ships in 10 - 15 working days

Many designers, policy makers, teachers, and other practitioners are beginning to understand the usefulness of using digital games beyond entertainment. Games have been developed for teaching, recruiting and to collect data to improve search engines. This book examines the fundamentals of designing any game with a serious purpose and provides a way of thinking on how to design one successfully.

The reader will be introduced to a design philosophy called Triadic Game Design.; a theory that all games involve three worlds: the worlds of Reality, Meaning, and Play. Each world is affiliated with aspects. A balance needs to be found within and between the three worlds. Such a balance is difficult to achieve, during the design many tensions will arise, forcing designers to make trade-offs. To deal with these tensions and to ensure that the right decisions are made to create a harmonic game, a frame of reference is needed. This is what "Triadic Game Design" offers.

A Generative Theory of Relevance (Hardcover, 2009 ed.): Victor Lavrenko A Generative Theory of Relevance (Hardcover, 2009 ed.)
Victor Lavrenko
R2,882 Discovery Miles 28 820 Ships in 10 - 15 working days

A modern information retrieval system must have the capability to find, organize and present very different manifestations of information - such as text, pictures, videos or database records - any of which may be of relevance to the user. However, the concept of relevance, while seemingly intuitive, is actually hard to define, and it's even harder to model in a formal way.

Lavrenko does not attempt to bring forth a new definition of relevance, nor provide arguments as to why any particular definition might be theoretically superior or more complete. Instead, he takes a widely accepted, albeit somewhat conservative definition, makes several assumptions, and from them develops a new probabilistic model that explicitly captures that notion of relevance. With this book, he makes two major contributions to the field of information retrieval: first, a new way to look at topical relevance, complementing the two dominant models, i.e., the classical probabilistic model and the language modeling approach, and which explicitly combines documents, queries, and relevance in a single formalism; second, a new method for modeling exchangeable sequences of discrete random variables which does not make any structural assumptions about the data and which can also handle rare events.

Thus his book is of major interest to researchers and graduate students in information retrieval who specialize in relevance modeling, ranking algorithms, and language modeling.

Implementing Distributed Systems with Java and CORBA (Hardcover, 2005 ed.): Markus Aleksy, Axel Korthaus, Martin Schader Implementing Distributed Systems with Java and CORBA (Hardcover, 2005 ed.)
Markus Aleksy, Axel Korthaus, Martin Schader
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

This book provides graduate students and practitioners with knowledge of the CORBA standard and practical experience of implementing distributed systems with CORBA's Java mapping. With tested code examples that will run immediately!

Advances in Algorithms, Languages, and Complexity (Hardcover, 1997 ed.): Dingzhu Du, Ker-I Ko Advances in Algorithms, Languages, and Complexity (Hardcover, 1997 ed.)
Dingzhu Du, Ker-I Ko
R5,828 Discovery Miles 58 280 Ships in 10 - 15 working days

This book contains a collection of survey papers in the areas of algorithms, lan guages and complexity, the three areas in which Professor Ronald V. Book has made significant contributions. As a fonner student and a co-author who have been influenced by him directly, we would like to dedicate this book to Professor Ronald V. Book to honor and celebrate his sixtieth birthday. Professor Book initiated his brilliant academic career in 1958, graduating from Grinnell College with a Bachelor of Arts degree. He obtained a Master of Arts in Teaching degree in 1960 and a Master of Arts degree in 1964 both from Wesleyan University, and a Doctor of Philosophy degree from Harvard University in 1969, under the guidance of Professor Sheila A. Greibach. Professor Book's research in discrete mathematics and theoretical com puter science is reflected in more than 150 scientific publications. These works have made a strong impact on the development of several areas of theoretical computer science. A more detailed summary of his scientific research appears in this volume separately."

Software Engineering with Reusable Components (Hardcover, 1997 ed.): Johannes Sametinger Software Engineering with Reusable Components (Hardcover, 1997 ed.)
Johannes Sametinger
R1,688 Discovery Miles 16 880 Ships in 10 - 15 working days

The book provides the reader with a clear understanding of what software reuse is, where the problems are, what benefits to expect, the activities, and different forms of software reuse. The reader is also given an overview of what sofware components are, different kinds of components and compositions, a taxonomy thereof, and examples of successful component reuse. An introduction to software engineering and software process models is also provided. Consequences and influences of systematic reuse of software components are depicted, and activities like domain engineering, component engineering and application engineering are described. The importance of documentation is taken into consideration as well.

Foundations of Information Technology in the Era of Network and Mobile Computing - IFIP 17th World Computer Congress - TC1... Foundations of Information Technology in the Era of Network and Mobile Computing - IFIP 17th World Computer Congress - TC1 Stream / 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002) August 25-30, 2002, Montreal, Quebec, Canada (Hardcover, 2002 ed.)
Ricardo Baeza-Yates, Ugo Montanari, Nicola Santoro
R4,717 Discovery Miles 47 170 Ships in 10 - 15 working days

In recent years, IT application scenarios have evolved in very innovative ways. Highly distributed networks have now become a common platform for large-scale distributed programming, high bandwidth communications are inexpensive and widespread, and most of our work tools are equipped with processors enabling us to perform a multitude of tasks. In addition, mobile computing (referring specifically to wireless devices and, more broadly, to dynamically configured systems) has made it possible to exploit interaction in novel ways.
To harness the flexibility and power of these rapidly evolving, interactive systems, there is need of radically new foundational ideas and principles; there is need to develop the theoretical foundations required to design these systems and to cope with the many complex issues involved in their construction; and there is need to develop effective principles for building and analyzing such systems.
Reflecting the diverse and wide spectrum of topics and interests within the theoretical computer science community, Foundations of Information Technology in the Era of Network and Mobile Computing is presented in two distinct but interrelated tracks:

-Algorithms, Complexity and Models of Computation;
-Logic, Semantics, Specification and Verification.This volume contains 45 original and significant contributions addressing these foundational questions, as well as 4 papers by outstanding invited speakers. These papers were presented at the 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002), which was held in conjunction with the 17th World Computer Congress, sponsored by the International Federation for Information Processing (IFIP), and which convened in Montreal, Quebec, Canada in August 2002."

SystemC - Methodologies and Applications (Hardcover, 2003 ed.): Wolfgang Muller, Wolfgang Rosenstiel, Jurgen Ruf SystemC - Methodologies and Applications (Hardcover, 2003 ed.)
Wolfgang Muller, Wolfgang Rosenstiel, Jurgen Ruf
R4,560 Discovery Miles 45 600 Ships in 10 - 15 working days

This comprehensive survey on the state of the art of SystemC in industry and research is organised into 11 self-contained chapters. Selected SystemC experts present their approaches in the domains of modelling, analysis and synthesis, ranging from mixed signal and discrete system to embedded software.

GPS Tracking with Java EE Components - Challenges of Connected Cars (Paperback): Kristof Beiglboeck GPS Tracking with Java EE Components - Challenges of Connected Cars (Paperback)
Kristof Beiglboeck
R2,974 Discovery Miles 29 740 Ships in 12 - 19 working days

GPS Tracking with Java EE Components: Challenges of Connected Cars highlights how the self-driving car is actually changing the automotive industry, from programing embedded software to hosting services and data crunching, in real time, with really big data. The book analyzes how the challenges of the Self Driving Car (SDC) exceed the limits of a classical GPS Tracking System (GTS.) It provides a guidebook on setting up a tracking system by customizing its components. It also provides an overview of the prototyping and modeling process, and how the reader can modify this process for his or her own software. Every component is introduced in detail and includes a number of design decisions for development. The book introduces Java EE (JEE) Modules, and shows how they can be combined to a customizable GTS, and used as seed components to enrich existing systems with live tracking. The book also explores how to merge tracking and mapping to guide SDCs, and focuses on client server programming to provide useful information. It also discusses the challenges involved with the live coordination of moving cars. This book is designed to aid GTS developers and engineers in the automotive industry. It can also help Java Developers, not only interested in GPS Tracking, but in modern software design from many individual modules. Source code and sample applications will be available on the book's website.

Distributed Real-Time Architecture for Mixed-Criticality Systems (Hardcover): Hamidreza Ahmadian, Roman Obermaisser, Jon Perez Distributed Real-Time Architecture for Mixed-Criticality Systems (Hardcover)
Hamidreza Ahmadian, Roman Obermaisser, Jon Perez
R4,950 Discovery Miles 49 500 Ships in 12 - 19 working days

This book describes a cross-domain architecture and design tools for networked complex systems where application subsystems of different criticality coexist and interact on networked multi-core chips. The architecture leverages multi-core platforms for a hierarchical system perspective of mixed-criticality applications. This system perspective is realized by virtualization to establish security, safety and real-time performance. The impact further includes a reduction of time-to-market, decreased development, deployment and maintenance cost, and the exploitation of the economies of scale through cross-domain components and tools. Describes an end-to-end architecture for hypervisor-level, chip-level, and cluster level. Offers a solution for different types of resources including processors, on-chip communication, off-chip communication, and I/O. Provides a cross-domain approach with examples for wind-power, health-care, and avionics. Introduces hierarchical adaptation strategies for mixed-criticality systems Provides modular verification and certification methods for the seamless integration of mixed-criticality systems. Covers platform technologies, along with a methodology for the development process. Presents an experimental evaluation of technological results in cooperation with industrial partners. The information in this book will be extremely useful to industry leaders who design and manufacture products with distributed embedded systems in mixed-criticality use-cases. It will also benefit suppliers of embedded components or development tools used in this area. As an educational tool, this material can be used to teach students and working professionals in areas including embedded systems, computer networks, system architecture, dependability, real-time systems, and avionics, wind-power and health-care systems.

Finite Difference Computing with Exponential Decay Models (Hardcover, 1st ed. 2016): Hans Petter Langtangen Finite Difference Computing with Exponential Decay Models (Hardcover, 1st ed. 2016)
Hans Petter Langtangen
R2,056 Discovery Miles 20 560 Ships in 12 - 19 working days

This text provides a very simple, initial introduction to the complete scientific computing pipeline: models, discretization, algorithms, programming, verification, and visualization. The pedagogical strategy is to use one case study - an ordinary differential equation describing exponential decay processes - to illustrate fundamental concepts in mathematics and computer science. The book is easy to read and only requires a command of one-variable calculus and some very basic knowledge about computer programming. Contrary to similar texts on numerical methods and programming, this text has a much stronger focus on implementation and teaches testing and software engineering in particular.

Advances in Production Management Systems: New Challenges, New Approaches - International IFIP WG 5.7 Conference, APMS 2009,... Advances in Production Management Systems: New Challenges, New Approaches - International IFIP WG 5.7 Conference, APMS 2009, Bordeaux, France, September 21-23, 2009, Revised Selected Papers (Hardcover, 2010 ed.)
Bruno Vallespir, Thecle Alix
R3,019 Discovery Miles 30 190 Ships in 10 - 15 working days

The present economic and social environment has given rise to new situations within which companies must operate. As a first example, the globalization of the economy and the need for performance has led companies to outsource and then to operate inside networks of enterprises such as supply chains or virtual enterprises. A second instance is related to environmental issues. The statement about the impact of ind- trial activities on the environment has led companies to revise processes, to save - ergy, to optimize transportation.... A last example relates to knowledge. Knowledge is considered today to be one of the main assets of a company. How to capitalize, to manage, to reuse it for the benefit of the company is an important current issue. The three examples above have no direct links. However, each of them constitutes a challenge that companies have to face today. This book brings together the opinions of several leading researchers from all around the world. Together they try to develop new approaches and find answers to those challenges. Through the individual ch- ters of this book, the authors present their understanding of the different challenges, the concepts on which they are working, the approaches they are developing and the tools they propose. The book is composed of six parts; each one focuses on a specific theme and is subdivided into subtopics.

Multilevel Optimization: Algorithms and Applications (Hardcover, 1998 ed.): Athanasios Migdalas, Panos M. Pardalos, Peter... Multilevel Optimization: Algorithms and Applications (Hardcover, 1998 ed.)
Athanasios Migdalas, Panos M. Pardalos, Peter Varbrand
R5,636 Discovery Miles 56 360 Ships in 10 - 15 working days

Researchers working with nonlinear programming often claim "the word is non linear" indicating that real applications require nonlinear modeling. The same is true for other areas such as multi-objective programming (there are always several goals in a real application), stochastic programming (all data is uncer tain and therefore stochastic models should be used), and so forth. In this spirit we claim: The word is multilevel. In many decision processes there is a hierarchy of decision makers, and decisions are made at different levels in this hierarchy. One way to handle such hierar chies is to focus on one level and include other levels' behaviors as assumptions. Multilevel programming is the research area that focuses on the whole hierar chy structure. In terms of modeling, the constraint domain associated with a multilevel programming problem is implicitly determined by a series of opti mization problems which must be solved in a predetermined sequence. If only two levels are considered, we have one leader (associated with the upper level) and one follower (associated with the lower level)."

Handbook of Research on Emergent Applications of Optimization Algorithms, VOL 2 (Hardcover): Pandian Vasant, Sirma Zeynep... Handbook of Research on Emergent Applications of Optimization Algorithms, VOL 2 (Hardcover)
Pandian Vasant, Sirma Zeynep Alparslan Gok, Gerhard Wilhelm Weber
R7,323 Discovery Miles 73 230 Ships in 10 - 15 working days
A Practical Approach to Data Structures and Algorithms (Hardcover): Sanjay Pahuja A Practical Approach to Data Structures and Algorithms (Hardcover)
Sanjay Pahuja
R1,474 Discovery Miles 14 740 Ships in 12 - 19 working days

The aim of the book is to serve as a text for students learning programming in 'C' on Data Structures such as array, linked list, stack, queue, trees, graph and sorting and searching methodology. The book illustrates in detail the methods, algorithms, functions and implementation of each and every concept of data structures. Algorithms are written in pseudo syntax i.e., near to 'C' language for easy understanding. It contains worked examples to amplify the material, and enhance the pedagogy. The content is not overburdened with math, and instead pays attention to the key components of the subject, especially link listing. By discussing the practical applications of the subject, the author has lessened the dry theory involved, and made the book more approachable.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel Paperback R900 R750 Discovery Miles 7 500
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,242 Discovery Miles 12 420
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano Paperback R2,421 Discovery Miles 24 210
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad Hardcover R4,186 Discovery Miles 41 860
Problem Solving with C++ - Global…
Walter Savitch Paperback R2,551 Discovery Miles 25 510
Design and Use of Software Architectures…
Jan Bosch Paperback R1,773 Discovery Miles 17 730
Programming Logic & Design
Joyce Farrell Paperback R800 Discovery Miles 8 000
Software Requirements - Styles and…
Soren Lauesen Paperback R2,205 Discovery Miles 22 050
Programming Logic & Design…
Joyce Farrell Paperback R1,336 R1,239 Discovery Miles 12 390
C++ Programming - Program Design…
D. Malik Paperback R1,751 R1,615 Discovery Miles 16 150

 

Partners