![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Data structures
An invaluable resource for working programmers, as well as a fount of useful algorithmic tools for computer scientists, astronomers, and other calendar enthusiasts, The Ultimate Edition updates and expands the previous edition to achieve more accurate results and present new calendar variants. The book now includes coverage of Unix dates, Italian time, the Akan, Icelandic, Saudi Arabian Umm al-Qura, and Babylonian calendars. There are also expanded treatments of the observational Islamic and Hebrew calendars and brief discussions of the Samaritan and Nepalese calendars. Several of the astronomical functions have been rewritten to produce more accurate results and to include calculations of moonrise and moonset. The authors frame the calendars of the world in a completely algorithmic form, allowing easy conversion among these calendars and the determination of secular and religious holidays. LISP code for all the algorithms is available in machine-readable form.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2017, held in Vienna, Austria, in September 2017. The 9 revised full papers were carefully reviewed and selected from 27 submissions. The aim of the workshop is to present research activities and results on topics related to algorithmic, design, and development aspects of modern cloud-based systems.
The two-volume set LNCS 10671 and 10672 constitutes the thoroughly refereed proceedings of the 16th International Conference on Computer Aided Systems Theory, EUROCAST 2017, held in Las Palmas de Gran Canaria, Spain, in February 2017. The 117 full papers presented were carefully reviewed and selected from 160 submissions. The papers are organized in topical sections on: pioneers and landmarks in the development of information and communication technologies; systems theory, socio-economic systems and applications; theory and applications of metaheuristic algorithms; stochastic models and applications to natural, social and technical systems; model-based system design, verification and simulation; applications of signal processing technology; algebraic and combinatorial methods in signal and pattern analysis; computer vision, deep learning and applications; computer and systems based methods and electronics technologies in medicine; intelligent transportation systems and smart mobility.
Featuring up-to-date coverage of three topics lying at the intersection of combinatorics and commutative algebra, namely Koszul algebras, primary decompositions and subdivision operations in simplicial complexes, this book has its focus on computations. "Computations and Combinatorics in Commutative Algebra" has been written by experts in both theoretical and computational aspects of these three subjects and is aimed at a broad audience, from experienced researchers who want to have an easy but deep review of the topics covered to postgraduate students who need a quick introduction to the techniques. The computational treatment of the material, including plenty of examples and code, will be useful for a wide range of professionals interested in the connections between commutative algebra and combinatorics.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encrpytion Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017. The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
This book constitutes the proceedings of the 5th International Conference on Context-Aware Systems and Applications, ICCASA 2016, held in Thu Dau Mot, Vietnam, in November 2016. The 22 revised full papers presented were carefully selected from 35 submissions and cover a wide spectrum in the area of Context-Aware-Systems (CAS). CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection, where context awareness used to dynamically control computing and networking functions. The overall goal of CAS is to realize nature-inspired autonomic systems that can manage themselves without direct human interventions.
The two-book set LNCS 10205 + 10206 constitutes the proceedings of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.The 48 full papers, 4 tool demonstration papers, and 12 software competition papers presented in these volumes were carefully reviewed and selected from 181 submissions to TACAS and 32 submissions to the software competition. They were organized in topical sections named: verification techniques; learning; synthesis; automata; concurrency and bisimulation; hybrid systems; security; run-time verification and logic; quantitative systems; SAT and SMT; and SV COMP.
The two-book set LNCS 10205 + 10206 constitutes the proceedings of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.The 48 full papers, 4 tool demonstration papers, and 12 software competition papers presented in these volumes were carefully reviewed and selected from 181 submissions to TACAS and 32 submissions to the software competition. They were organized in topical sections named: verification techniques; learning; synthesis; automata; concurrency and bisimulation; hybrid systems; security; run-time verification and logic; quantitative systems; SAT and SMT; and SV COMP.
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships. This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications. All algorithms include an intuitive explanation of operation, essential equations, references to more rigorous theory, and commented C++ source code. Many of these techniques are recent developments, still not in widespread use. Others are standard algorithms given a fresh look. In every case, the focus is on practical applicability, with all code written in such a way that it can easily be included into any program. The Windows-based DATAMINE program lets you experiment with the techniques before incorporating them into your own work. What You'll Learn Use Monte-Carlo permutation tests to provide statistically sound assessments of relationships present in your data Discover how combinatorially symmetric cross validation reveals whether your model has true power or has just learned noise by overfitting the data Work with feature weighting as regularized energy-based learning to rank variables according to their predictive power when there is too little data for traditional methods See how the eigenstructure of a dataset enables clustering of variables into groups that exist only within meaningful subspaces of the data Plot regions of the variable space where there is disagreement between marginal and actual densities, or where contribution to mutual information is high Who This Book Is For Anyone interested in discovering and exploiting relationships among variables. Although all code examples are written in C++, the algorithms are described in sufficient detail that they can easily be programmed in any language.
This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017. The 19 papers presented were carefully reviewed and selected from 32 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
This volume in the SpringerBriefs in Energy series offers a systematic review of unit commitment (UC) problems in electrical power generation. It updates texts written in the late 1990s and early 2000s by including the fundamentals of both UC and state-of-the-art modeling as well as solution algorithms and highlighting stochastic models and mixed-integer programming techniques. The UC problems are mostly formulated as mixed-integer linear programs, although there are many variants. A number of algorithms have been developed for, or applied to, UC problems, including dynamic programming, Lagrangian relaxation, general mixed-integer programming algorithms, and Benders decomposition. In addition the book discusses the recent trends in solving UC problems, especially stochastic programming models, and advanced techniques to handle large numbers of integer- decision variables due to scenario propagation
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 29th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains four revised selected regular papers. Topics covered include optimization and cluster validation processes for entity matching, business intelligence systems, and data profiling in the Semantic Web.
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Web and Internet Economics, WINE 2016, held in Montreal, QC, Canada, in December 2016. The 35 regular papers presented together with 3 invited talks were carefully reviewed and selected from 88 submissions. The Conference on Web and Internet Economics (WINE) is an interdisciplinary forum for the exchange of ideas and results on incentives and computation arising from the following fields: Theoretical Computer Science, Artificial Intelligence, and Microeconomics.
This book constitutes the refereed proceedings of the 12th China Workshop on Machine Translation, CWMT 2016, held in Urumqi, China, in August 2016. The 10 English papers presented in this volume were carefully reviewed and selected from 76 submissions. They deal with statistical machine translation, hybrid machine translation, machine translation evaluation, post editing, alignment, and inducing bilingual knowledge from corpora.
This book provides a perspective on the application of machine learning-based methods in knowledge discovery from natural languages texts. By analysing various data sets, conclusions which are not normally evident, emerge and can be used for various purposes and applications. The book provides explanations of principles of time-proven machine learning algorithms applied in text mining together with step-by-step demonstrations of how to reveal the semantic contents in real-world datasets using the popular R-language with its implemented machine learning algorithms. The book is not only aimed at IT specialists, but is meant for a wider audience that needs to process big sets of text documents and has basic knowledge of the subject, e.g. e-mail service providers, online shoppers, librarians, etc. The book starts with an introduction to text-based natural language data processing and its goals and problems. It focuses on machine learning, presenting various algorithms with their use and possibilities, and reviews the positives and negatives. Beginning with the initial data pre-processing, a reader can follow the steps provided in the R-language including the subsuming of various available plug-ins into the resulting software tool. A big advantage is that R also contains many libraries implementing machine learning algorithms, so a reader can concentrate on the principal target without the need to implement the details of the algorithms her- or himself. To make sense of the results, the book also provides explanations of the algorithms, which supports the final evaluation and interpretation of the results. The examples are demonstrated using realworld data from commonly accessible Internet sources.
Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face. Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom. Teachers and IT administrators at schools will see how to set up the hardware and software swiftly on your own or with the help of your students. Step-by-step instructions and practical examples walk you through building your Raspberry Pi workstations and your network, managing the computers and the network, and troubleshooting any problems that arise. This book offers several points to involve your students through hands-on activities. These activities are designed to benefit your beginner and older or more able students alike. Make Deploying Raspberry Pi in the Classroom a part of you instructional library today. What you will learn Put an easily-manageable computer on each desk for students to learn Internet use and essential office software skills Image, configure, and plan a classroom deployment of Raspberry Pi computers Manage your classroom Raspberry Pi computers and keeping them up and running smoothly and efficiently Who this book is for Primary audience would be teachers and IT administrators at schools or colleges. It will also appeal to administrators at social clubs or organizations that provide less formal tuition or simply provide Internet access.
This comprehensive textbook presents a clean and coherent account of most fundamental tools and techniques in Parameterized Algorithms and is a self-contained guide to the area. The book covers many of the recent developments of the field, including application of important separators, branching based on linear programming, Cut & Count to obtain faster algorithms on tree decompositions, algorithms based on representative families of matroids, and use of the Strong Exponential Time Hypothesis. A number of older results are revisited and explained in a modern and didactic way. The book provides a toolbox of algorithmic techniques. Part I is an overview of basic techniques, each chapter discussing a certain algorithmic paradigm. The material covered in this part can be used for an introductory course on fixed-parameter tractability. Part II discusses more advanced and specialized algorithmic ideas, bringing the reader to the cutting edge of current research. Part III presents complexity results and lower bounds, giving negative evidence by way of W[1]-hardness, the Exponential Time Hypothesis, and kernelization lower bounds. All the results and concepts are introduced at a level accessible to graduate students and advanced undergraduate students. Every chapter is accompanied by exercises, many with hints, while the bibliographic notes point to original publications and related work.
The new multimedia standards (for example, MPEG-21) facilitate the seamless integration of multiple modalities into interoperable multimedia frameworks, transforming the way people work and interact with multimedia data. These key technologies and multimedia solutions interact and collaborate with each other in increasingly effective ways, contributing to the multimedia revolution and having a significant impact across a wide spectrum of consumer, business, healthcare, education and governmental domains. This book aims to provide a complete coverage of the areas outlined and to bring together the researchers from academic and industry as well as practitioners to share ideas, challenges and solutions relating to the multifaceted aspects of this field.
Gain a deeper understanding of how Raspberry Pi works to get the results you want right in the palm of your hand. This book helps you understand the right connections and software to drive your Raspberry Pi into opening the worlds of programming, electronic experiments, system control, digital imaging, and the Internet of Things to you. You'll discover how to expand your Pi's storage for bigger programs, use its onboard connections to interface with cameras and control devices, printers and scanners. You'll also see how to share information with Windows and Apple computers and mobile devices, and use it away from AC power. You'll be able to turn any HDTV into a media player; stream and share files from desktop and mobile devices; use your Pi for image capture via camera or scanner; and more! Expanding Your Raspberry Pi is your guide to doing almost anything a bigger computer can do - if you're ready for the challenge. What You'll Learn Connect, use, and manage mass storage devices for greater versatility Link with desktop, laptop, and mobile devices using the Pi's built-in Wi-Fi and Bluetooth features Share resources from your Pi with desktop and mobile devices Capture video and still photos with your Pi Who This Book Is ForNetwork administrators: Connect Raspberry Pi devices to other devices on a wired or wireless network for media streaming, file serving, or print serving Teachers: Use Raspberry Pi to teach students how to connect different types of computers and operating systems with each other. IT workers: Use Raspberry Pi with your existing printers, scanners, webcams, and home network
This book offers a selection of papers from the 2016 International Conference on Software Process Improvement (CIMPS'16), held between the 12th and 14th of October 2016 in Aguascalientes, Aguascalientes, Mexico. The CIMPS'16 is a global forum for researchers and practitioners to present and discuss the most recent innovations, trends, results, experiences and concerns in the different aspects of software engineering with a focus on, but not limited to, software processes, security in information and communication technology, and big data. The main topics covered include: organizational models, standards and methodologies, knowledge management, software systems, applications and tools, information and communication technologies and processes in non-software domains (mining, automotive, aerospace, business, health care, manufacturing, etc.) with a clear focus on software process challenges.
Learn the fundamental foundations and concepts of the Apache HBase (NoSQL) open source database. It covers the HBase data model, architecture, schema design, API, and administration. Apache HBase is the database for the Apache Hadoop framework. HBase is a column family based NoSQL database that provides a flexible schema model. What You'll Learn Work with the core concepts of HBase Discover the HBase data model, schema design, and architecture Use the HBase API and administration Who This Book Is For Apache HBase (NoSQL) database users, designers, developers, and admins.
The volume is a collection of high-quality peer-reviewed research papers presented in the International Conference on Artificial Intelligence and Evolutionary Computation in Engineering Systems (ICAIECES 2016) held at SRM University, Chennai, Tamilnadu, India. This conference is an international forum for industry professionals and researchers to deliberate and state their research findings, discuss the latest advancements and explore the future directions in the emerging areas of engineering and technology. The book presents original work and novel ideas, information, techniques and applications in the field of communication, computing and power technologies.
This, the 28th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of six papers presented at the 26th International Conference on Database- and Expert-Systems Applications, DEXA 2015, held in Valencia, Spain, in September 2015. Topics covered include efficient graph processing, machine learning on big data, multistore big data integration, ontology matching, and the optimization of histograms for the Semantic Web.
This book constitutes the refereed proceedings of the International Conference on Soft Computing in Data Science, SCDS 2016, held in Putrajaya, Malaysia, in September 2016. The 27 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on artificial neural networks; classification, clustering, visualization; fuzzy logic; information and sentiment analytics. |
![]() ![]() You may like...
Land Reclamation and Restoration…
Gouri Sankar Bhunia, Uday Chatterjee, …
Paperback
R3,209
Discovery Miles 32 090
Practical Oracle Database Appliance
Bobby Curtis, Yury Velikanov, …
Paperback
R2,440
Discovery Miles 24 400
Technological and Modern Irrigation…
El-Sayed E. Omran, Abdelazim M. Negm
Hardcover
R2,929
Discovery Miles 29 290
|