![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming
Reference MWAPI shows readers how to develop robust Windows
applications using the innovative M Windowing Applications
Interface (MWAPI). This book uses numerous tables, illustrations,
sample programs, images and discussions to demonstrate how high
quality graphical user interface applications are created using a
technology that insulates the user from the intricacies and
complexities of any particular Windows environment. It shows how
applications created through the host-independent development
environment can be ported to any Windows platform with no change in
source code while maintaining the look and feel of event-processing
methodology. It examines portability and compact code, some of the
traits the MWAPI shares with the Java programming language.
Although the field of mixed reality has grown significantly over the last decade, there have been few published books about augmented reality, particularly the interface design aspects. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" provides a foundation of the main concepts of augmented reality (AR), with a particular emphasis on user interfaces, design, and practical AR techniques, from tracking algorithms to design principles for AR interfaces. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" contains comprehensive information focusing on the following topics: technologies that support AR, development environments, interface design and evaluation of applications, and case studies of AR applications.
The AVR RISC Microcontroller Handbook is a comprehensive guide to
designing with Atmel's new controller family, which is designed to
offer high speed and low power consumption at a lower cost. The
main text is divided into three sections: hardware, which covers
all internal peripherals; software, which covers programming and
the instruction set; and tools, which explains using Atmel's
Assembler and Simulator (available on the Web) as well as IAR's C
compiler.
The BeOS is the exciting new operating system designed natively
for the Internet and digital media. Programmers are drawn to the
BeOS by its many state-of-the-art features, including pervasive
multithreading, a symmetric multiprocessing architecture, and an
integrated multithreaded graphics system. The Be engineering team
also built in many UNIX-like capabilities as part of a POSIX
toolkit. Best of all, the BeOS runs on a variety of Intel
architectures and PowerPC platforms and uses off-the-shelf
hardware. This book explores the BeOS from a POSIX programmer's point of
view, providing a comprehensive and practical guide to porting UNIX
and other POSIX-based software to the BeOS. BeOS: Porting UNIX
Applications will help you move your favorite UNIX software to an
environment designed from the ground up for high-performance
applications.
This is a central topic in any computer science curriculum. To distinguish this textbook from others, the author considers probabilistic methods as being fundamental for the construction of simple and efficient algorithms, and in each chapter at least one problem is solved using a randomized algorithm. Data structures are discussed to the extent needed for the implementation of the algorithms. The specific algorithms examined were chosen because of their wide field of application. This book originates from lectures for undergraduate and graduate students. The text assumes experience in programming algorithms, especially with elementary data structures such as chained lists, queues, and stacks. It also assumes familiarity with mathematical methods, although the author summarizes some basic notations and results from probability theory and related mathematical terminology in the appendices. He includes many examples to explain the individual steps of the algorithms, and he concludes each chapter with numerous exercises.
The junction of software development and engineering combined with the study of intelligence has created a bustling intersection of theory, design, engineering, and conceptual thought. Software and Intelligent Sciences: New Transdisciplinary Findings sits at a crossroads and informs advanced researchers, students, and practitioners on the developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, and intelligence science. The crystallization of accumulated knowledge by the fertilization of these areas, have led to the emergence of a transdisciplinary field known as software and intelligence sciences, to which this book is an important contribution and a resource for both fields alike.
This book contains a selection of papers presented during a special workshop on Complexity Science organized as part of the 9th International Conference on GIScience 2016. Expert researchers in the areas of Agent-Based Modeling, Complexity Theory, Network Theory, Big Data, and emerging methods of Analysis and Visualization for new types of data explore novel complexity science approaches to dynamic geographic phenomena and their applications, addressing challenges and enriching research methodologies in geography in a Big Data Era.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
This book is about describing the meaning of programming languages. The author teaches the skill of writing semantic descriptions as an efficient way to understand the features of a language. While a compiler or an interpreter offers a form of formal description of a language, it is not something that can be used as a basis for reasoning about that language nor can it serve as a definition of a programming language itself since this must allow a range of implementations. By writing a formal semantics of a language a designer can yield a far shorter description and tease out, analyse and record design choices. Early in the book the author introduces a simple notation, a meta-language, used to record descriptions of the semantics of languages. In a practical approach, he considers dozens of issues that arise in current programming languages and the key techniques that must be mastered in order to write the required formal semantic descriptions. The book concludes with a discussion of the eight key challenges: delimiting a language (concrete representation), delimiting the abstract content of a language, recording semantics (deterministic languages), operational semantics (non-determinism), context dependency, modelling sharing, modelling concurrency, and modelling exits. The content is class-tested and suitable for final-year undergraduate and postgraduate courses. It is also suitable for any designer who wants to understand languages at a deep level. Most chapters offer projects, some of these quite advanced exercises that ask for complete descriptions of languages, and the book is supported throughout with pointers to further reading and resources. As a prerequisite the reader should know at least one imperative high-level language and have some knowledge of discrete mathematics notation for logic and set theory.
This book presents the outcomes of the 16th International Conference on Software Engineering, Artificial Intelligence Research, Management and Applications (SERA 2018), which was held in Kunming, China on June 13-15, 2018. The aim of the conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the various fields of computer science, to share their experiences, and to exchange new ideas and information in a meaningful way. The book includes findings on all aspects (theory, applications and tools) of computer and information science, and discusses related practical challenges and the solutions adopted to solve them. The conference organizers selected the best papers from those accepted for presentation. The papers were chosen based on review scores submitted by members of the program committee and underwent a further rigorous round of review. From this second round, 13 of the conference's most promising papers were then published in this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of computer and information science.
Enterprise resource planning plays a strategic role in designing, and managing e-government resources. Governments all over the world face challenges in designing robust enterprise resource planning applications and methodologies to align themselves with the expectations of citizens and stakeholders. The existing standard enterprise resource planning solutions are proprietary, inflexible, and expensive to implement in government enterprises. Strategic Enterprise Resource Planning Models for E-Government: Applications and Methodologies is a collection of research from professionals and researchers working in the field of e-government including policymakers, ICT vendors, consultants, and implementing agencies. This book will aim to suggest enterprise resource planning frameworks for government enterprises along with their applications and methodologies to improve effectiveness of processes and enhance citizen-centric services. The research initiatives presented in this book will ease the process of implementing customized enterprise resource planning solutions in e-government.
This book covers all of the concepts required to tackle second-order cone programs (SOCPs), in order to provide the reader a complete picture of SOC functions and their applications. SOCPs have attracted considerable attention, due to their wide range of applications in engineering, data science, and finance. To deal with this special group of optimization problems involving second-order cones (SOCs), we most often need to employ the following crucial concepts: (i) spectral decomposition associated with SOCs, (ii) analysis of SOC functions, and (iii) SOC-convexity and -monotonicity. Moreover, we can roughly classify the related algorithms into two categories. One category includes traditional algorithms that do not use complementarity functions. Here, SOC-convexity and SOC-monotonicity play a key role. In contrast, complementarity functions are employed for the other category. In this context, complementarity functions are closely related to SOC functions; consequently, the analysis of SOC functions can help with these algorithms.
This is a comprehensive study of various time-dependent scheduling problems in single-, parallel- and dedicated-machine environments. In addition to complexity issues and exact or heuristic algorithms which are typically presented in scheduling books, the author also includes more advanced topics such as matrix methods in time-dependent scheduling, time-dependent scheduling with two criteria and time-dependent two-agent scheduling. The reader should be familiar with the basic notions of calculus, discrete mathematics and combinatorial optimization theory, while the book offers introductory material on theory of algorithms, NP-complete problems, and the basics of scheduling theory. The author includes numerous examples, figures and tables, he presents different classes of algorithms using pseudocode, he completes all chapters with extensive bibliographies, and he closes the book with comprehensive symbol and subject indexes. The previous edition of the book focused on computational complexity of time-dependent scheduling problems. In this edition, the author concentrates on models of time-dependent job processing times and algorithms for solving time-dependent scheduling problems. The book is suitable for researchers working on scheduling, problem complexity, optimization, heuristics and local search algorithms.
This book constitutes the refereed proceedings of the 17th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2021, held virtually in May 2021.The 4 full papers and 3 short papers presented were carefully reviewed and selected from 23 submissions. The papers cover a wide range of topics in the field of free/libre open source software (FLOSS) and discuss theories, practices, experiences, and tools on development and applications of OSS systems, with a specific focus on two aspects:(a) the development of open source systems and the underlying technical, social, and economic issue, (b) the adoption of OSS solutions and the implications of such adoption both in the public and in the private sector.
Your complete guide to the Joomla content management system Whether you use Joomla to power a website, intranet, or blog, you'll need a good how-to reference on this complex, but not always intuitive, content management software. "Joomla Bible, Second Edition" is that book. It not only brings you up to speed on the changes and extensions that are now part of Joomla 3.0, it thoroughly covers functions and tasks, including installation, configuration, management, advanced modules, and extended coverage of two key extensions. You'll learn how to obtain code and deploy it to a server; how to obtain, modify, and delete content; how to choose between the Joomla Platform and the Joomla CMS; and more. By the time you finish the "Joomla Bible, Second Edition," you'll be well prepared to build and maintain a Joomla -based website.Walks you through obtaining the Joomla 3.0 code and how to deploy it to a server, configure the site, create content, and manage content and user hierarchiesHelps you get the most out of core modules that provide advanced functionality, including the Polls Module, the Banner Manager, Content Syndication, Newsfeed Aggregation, and othersIncludes hands-on tutorials and real-world practical applications Whether you're a content manager, website manager, developer, or do-it-yourselfer, make sure you keep "Joomla Bible, Second Edition" on hand.
The computing power and Internet connectivity of handheld devices has increased exponentially, creating a vast realm of potential applications in mobile commerce and personal information management. Internet-Enabled Handheld Devices, Computing, and Programming: Mobile Commerce and Personal Data Applications comprehensively reviews the state of handheld computing technology and application development, with coverage of such cutting-edge topics as Advanced Wireless Markup Language and J2ME programming. Uniquely focused on innovations that can drive mobile commerce and personal information management to new levels of utility and added value, this book provides a much-needed resource for academics and students engaged in mobile-technology research. It will also guide the efforts of developers and managers in industry seeking to maximize the evolving commercial opportunities presented by the current generation of internet-enabled handheld devices.
Blockchain is a technology that transcends cryptocurrencies. There are other services in different sectors of the economy that can benefit from the trust and security that blockchains offer. For example, financial institutions are using blockchains for international money transfer, and in logistics, it has been used for supply chain management and tracking of goods. As more global companies and governments are experimenting and deploying blockchain solutions, it is necessary to compile knowledge on the best practices, strategies, and failures in order to create a better awareness of how blockchain could either support or add value to other services. Cross-Industry Use of Blockchain Technology and Opportunities for the Future provides emerging research highlighting the possibilities inherent in blockchain for different sectors of the economy and the added value blockchain can provide for the future of these different sectors. Featuring coverage on a broad range of topics such as data privacy, information sharing, and digital identity, this book is ideally designed for IT specialists, consultants, design engineers, cryptographers, service designers, researchers, academics, government officials, and industry professionals.
The work presented here is generally intended for engineers, educators at all levels, industrialists, managers, researchers and political representatives. Offering a snapshot of various types of research conducted within the field of TRIZ in France, it represents a unique resource. It has been two decades since the TRIZ theory originating in Russia spread across the world. Every continent adopted it in a different manner - sometimes by glorifying its potential and its perspectives (the American way); sometimes by viewing it with mistrust and suspicion (the European way); and sometimes by adopting it as-is, without questioning it further (the Asian way). However, none of these models of adoption truly succeeded. Today, an assessment of TRIZ practices in education, industry and research is necessary. TRIZ has expanded to many different scientific disciplines and has allowed young researchers to reexamine the state of research in their field. To this end, a call was sent out to all known francophone research laboratories producing regular research about TRIZ. Eleven of them agreed to send one or more of their postdoctoral researchers to present their work during a seminar, regardless of the maturity or completeness of their efforts. It was followed by this book project, presenting one chapter for every current thesis in order to reveal the breadth, the richness and the perspectives that research about the TRIZ theory could offer our society. The topics dealt with e.g. the development of new methods inspired by TRIZ, educational practices, and measuring team impact.
This book provides a pioneering approach to modeling the human diabetic patient using a software agent. It is based on two MASc (Master of Applied Science) theses: one looking at the evolution of the patient agent in time, and another looking the interaction of the patient agent with the healthcare system. It shows that the software agent evolves in a manner analogous to the human patient and exhibits typical attributes of the illness such as reacting to food consumption, medications, and activity. This agent model can be used in a number of different ways, including as a prototype for a specific human patient with the purpose of helping to identify when that patient's condition deviates from normal variations. The software agent can also be used to study the interaction between the human patient and the health care system. This book is of interest to anyone involved in the management of diabetic patients or in societal research into the management of diabetes. The diabetic patient agent was developed using the Ackerman model for diabetes, but this model can be easily adapted for any other model subject with the necessary physiological data to support that model.
M Programming: A Comprehensive Guide is a complete update to ABCs of MUMPS. While ABCs of MUMPS was an introduction for novice and intermediate M programmers, M Programming: A Comprehensive Guide has a new section containing advanced material. This new section addresses features such as transaction processing, networking, structured system variables, and interfaces to other standards. Five new chapters have been added, covering an overview of M for readers familiar with other languages; M and the Windows environment; interaction between M and the underlying system; transaction processing; interfacing M with other standards; and error handling. Sections on interactive programming and futures have been extensively updated. M Programming: A Comprehensive Guide is an invaluable resource for everyone who is learning or using M.
This book takes a foundational approach to the semantics of probabilistic programming. It elaborates a rigorous Markov chain semantics for the probabilistic typed lambda calculus, which is the typed lambda calculus with recursion plus probabilistic choice. The book starts with a recapitulation of the basic mathematical tools needed throughout the book, in particular Markov chains, graph theory and domain theory, and also explores the topic of inductive definitions. It then defines the syntax and establishes the Markov chain semantics of the probabilistic lambda calculus and, furthermore, both a graph and a tree semantics. Based on that, it investigates the termination behavior of probabilistic programs. It introduces the notions of termination degree, bounded termination and path stoppability and investigates their mutual relationships. Lastly, it defines a denotational semantics of the probabilistic lambda calculus, based on continuous functions over probability distributions as domains. The work mostly appeals to researchers in theoretical computer science focusing on probabilistic programming, randomized algorithms, or programming language theory.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
Objects Through Relations: The ADOORE Approach; M. Kopecky, J. Pokorny. Object-Oriented Information Technologies; Y.-W. Chiou. Use of Object-Orientation for Information Systems Development in Software Companies in Finland: A Proposal for Study; P. Paetau. A Feature-Based Approach for Consistent Object-Oriented Requirements Specification; K.S. Cheung, et al. Creativity, Group Support Systems, and Systems Development; M. Nagasundaram. Team Support for Software Development; D. Vogel, et al. Modeling the Dynamics of Cooperative Work Arrangements; B. Krogh. Systems Integration in a Co-operative Society;J. Vorisek, J. Pour. Failure Analysis in Information Systems Design; H. Linger, et al. Problems Associated with Cost/Benefit Analysis for Strategic Information Systems; E. Stickel. Objectives and Reality: User Participation in Information System Development; M. Kirveennummi. Systems Development Methodologies: Time to Advance the Clock; B. Fitzgerald. The Software Evolution Process, its Global Improvement, and the Perceived Efficacy of Process Assessment Schemes as Improvement Drivers; E.M. Gray, W.L. Smith. How Shared is Shared Understanding in Information Requirements Determination?; J. McKay, et al. 31 Additional Articles. Index. |
![]() ![]() You may like...
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
Research Software Engineering with…
Damien Irving, Kate Hertweck, …
Paperback
R1,874
Discovery Miles 18 740
Flash Memory Integration - Performance…
Jalil Boukhobza, Pierre Olivier
Hardcover
R1,942
Discovery Miles 19 420
Modeling Semantic Web Services - The Web…
Jos De Bruijn, Mick Kerrigan, …
Hardcover
R1,527
Discovery Miles 15 270
|