![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Data structures
This book defines the application of Information Technology's systematic and automated knowledge mapping methodology to collect, analyze and report nanotechnology research on a global basis. The result of these analyses is be a systematic presentation of the state of the art of nanotechnology, which will include basic analysis, content analysis, and citation network analysis of comprehensive nanotechnology findings across technology domains, inventors, institutions, and countries.
A Comprehensive Study of SQL - Practice and Implementation is designed as a textbook and provides a comprehensive approach to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. It demonstrates how to leverage the two most vital tools for data query and analysis - SQL and Excel - to perform comprehensive data analysis without the need for a sophisticated and expensive data mining tool or application. Features The book provides a complete collection of modeling techniques, beginning with fundamentals and gradually progressing through increasingly complex real-world case studies It explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications It also gives a solid foundation in best practices and relational theory The book offers self-contained lessons on key SQL concepts or techniques at the end of each chapter using numerous illustrations and annotated examples This book is aimed primarily at advanced undergraduates and graduates with a background in computer science and information technology. Researchers and professionals will also find this book useful.
This book constitutes the refereed proceedings of 5 workshops of the 15th International Conference on Web-Age Information Management, WAIM 2014, held in Macau, China, June 16-18, 2014. The 38 revised full papers are organized in topical sections on the 5 following workshops: Second International Workshop on Emergency Management in Big Data Age, BigEM 2014; Second International Workshop on Big Data Management on Emerging Hardware, HardBD 2014; International Workshop on Data Management for Next-Generation Location-based Services, DaNoS 2014; International Workshop on Human Aspects of Making Recommendations in Social Ubiquitous Networking Environment, HRSUME 2014; International Workshop on Big Data Systems and Services, BIDASYS 2014.
This book constitutes the proceedings of the 12th International Conference on Parallel Computing Technologies, PaCT 2013, held in St. Petersburg, Russia, during September 30-October 4, 2013. The 41 full papers presented together with 2 invited papers were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on all technological aspects of the applications of parallel computer systems High level parallel programming languages and systems, methods and tools for parallel solution of large-scale problems, languages, environments and software tools supporting parallel processing, operating systems, scheduling, mapping, load balancing, general architectural concepts, cellular automata, performance measurement and analysis tools, teaching parallel processing, software for grid and cloud computing, scalable computing, fragmentation and aggregation of algorithms and programs as well as programs assembling and reuse.
This book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization.
This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.
This book is the result of several years of research trying to better characterize parallel genetic algorithms (pGAs) as a powerful tool for optimization, search, and learning. Readers can learn how to solve complex tasks by reducing their high computational times. Dealing with two scientific fields (parallelism and GAs) is always difficult, and the book seeks at gracefully introducing from basic concepts to advanced topics. The presentation is structured in three parts. The first one is targeted to the algorithms themselves, discussing their components, the physical parallelism, and best practices in using and evaluating them. A second part deals with the theory for pGAs, with an eye on theory-to-practice issues. A final third part offers a very wide study of pGAs as practical problem solvers, addressing domains such as natural language processing, circuits design, scheduling, and genomics. This volume will be helpful both for researchers and practitioners. The first part shows pGAs to either beginners and mature researchers looking for a unified view of the two fields: GAs and parallelism. The second part partially solves (and also opens) new investigation lines in theory of pGAs. The third part can be accessed independently for readers interested in applications. The result is an excellent source of information on the state of the art and future developments in parallel GAs.
This volume constitutes the refereed proceedings of the 9th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, EMMCVPR 2013, held in Lund, Sweden, in August 2013. The 26 revised full papers were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on Medical Imaging; Image Editing; 3D Reconstruction; Shape Matching; Scene Understanding; Segmentation; Superpixels; Statistical Methods and Learning.
This volume constitutes the proceedings of the 8th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2013, held in Salamanca, Spain, in September 2013. The 68 papers published in this volume were carefully reviewed and selected from 218 submissions. They are organized in topical sessions on Agents and Multi Agents Systems; HAIS Applications; Classification and Cluster Analysis; Data Mining and Knowledge Discovery; Video and Image Analysis; Bio-inspired Models and Evolutionary Computation; Learning Algorithms; Systems, MAN, and Cybernetics; Hybrid Intelligent Systems for Data Mining and Applications; Metaheuristics for Combinatorial Optimization and Modelling Complex Systems.
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
This book constitutes the refereed conference proceedings of the 13th International Conference on Intelligent Data Analysis, which was held in October/November 2014 in Leuven, Belgium. The 33 revised full papers together with 3 invited papers were carefully reviewed and selected from 70 submissions handling all kinds of modeling and analysis methods, irrespective of discipline. The papers cover all aspects of intelligent data analysis, including papers on intelligent support for modeling and analyzing data from complex, dynamical systems.
The two volumes LNCS 8805 and 8806 constitute the thoroughly refereed post-conference proceedings of 18 workshops held at the 20th International Conference on Parallel Computing, Euro-Par 2014, in Porto, Portugal, in August 2014. The 100 revised full papers presented were carefully reviewed and selected from 173 submissions. The volumes include papers from the following workshops: APCI&E (First Workshop on Applications of Parallel Computation in Industry and Engineering - BigDataCloud (Third Workshop on Big Data Management in Clouds) - DIHC (Second Workshop on Dependability and Interoperability in Heterogeneous Clouds) - FedICI (Second Workshop on Federative and Interoperable Cloud Infrastructures) - Hetero Par (12th International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms) - HiBB (5th Workshop on High Performance Bioinformatics and Biomedicine) - LSDVE (Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P) - MuCoCoS (7th International Workshop on Multi-/Many-core Computing Systems) - OMHI (Third Workshop on On-chip Memory Hierarchies and Interconnects) - PADAPS (Second Workshop on Parallel and Distributed Agent-Based Simulations) - PROPER (7th Workshop on Productivity and Performance) - Resilience (7th Workshop on Resiliency in High Performance Computing with Clusters, Clouds, and Grids) - REPPAR (First International Workshop on Reproducibility in Parallel Computing) - ROME (Second Workshop on Runtime and Operating Systems for the Many Core Era) - SPPEXA (Workshop on Software for Exascale Computing) - TASUS (First Workshop on Techniques and Applications for Sustainable Ultrascale Computing Systems) - UCHPC (7th Workshop on Un Conventional High Performance Computing) and VHPC (9th Workshop on Virtualization in High-Performance Cloud Computing.
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
"Fixed-Point Algorithms for Inverse Problems in Science and Engineering" presents some of the most recent work from top-notch researchers studying projection and other first-order fixed-point algorithms in several areas of mathematics and the applied sciences. The material presented provides a survey of the state-of-the-art theory and practice in fixed-point algorithms, identifying emerging problems driven by applications, and discussing new approaches for solving these problems. This book incorporates diverse perspectives from broad-ranging areas of research including, variational analysis, numerical linear algebra, biotechnology, materials science, computational solid-state physics, and chemistry. Topics presented include: Theory of Fixed-point algorithms: convex analysis, convex optimization, subdifferential calculus, nonsmooth analysis, proximal point methods, projection methods, resolvent and related fixed-point theoretic methods, and monotone operator theory. Numerical analysis of fixed-point algorithms: choice of step lengths, of weights, of blocks for block-iterative and parallel methods, and of relaxation parameters; regularization of ill-posed problems; numerical comparison of various methods. Areas of Applications: engineering (image and signal reconstruction and decompression problems), computer tomography and radiation treatment planning (convex feasibility problems), astronomy (adaptive optics), crystallography (molecular structure reconstruction), computational chemistry (molecular structure simulation) and other areas. Because of the variety of applications presented, this book can easily serve as a basis for new and innovated research and collaboration.
This book constitutes the refereed proceedings of the 20th International Conference on Analytical and Stochastic Modelling and Applications, ASMTA 2013, held in Ghent, Belgium, in July 2013. The 32 papers presented were carefully reviewed and selected from numerous submissions. The focus of the papers is on the following application topics: complex systems; computer and information systems; communication systems and networks; wireless and mobile systems and networks; peer-to-peer application and services; embedded systems and sensor networks; workload modelling and characterization; road traffic and transportation; social networks; measurements and hybrid techniques; modeling of virtualization; energy-aware optimization; stochastic modeling for systems biology; biologically inspired network design.
This book constitutes the refereed conference proceedings of the Third International Conference on Big Data Analytics, BDA 2014, held in New Delhi, India, in December 2014. The 11 revised full papers and 6 short papers were carefully reviewed and selected from 35 submissions and cover topics on media analytics; geospatial big data; semantics and data models; search and retrieval; graphics and visualization; application-specific big data.
This book constitutes the refereed proceedings of the 19th International Conference on Technologies and Applications of Artificial Intelligence, held in Taipei, Taiwan, in November 2014. The 23 revised full papers, 3 short papers, and 8 workshop papers presented at the international track of the conference were carefully reviewed and selected from overall 93 submissions to the international track, domestic track, and international workshops for inclusion in this volume. The papers feature original research results and practical development experiences among researchers and application developers from the many AI related areas including machine learning, data mining, statistics, computer vision, web intelligence, information retrieval, and computer games.
This book and its companion volume, LNCS vol. 8794 and 8795 constitute the proceedings of the 5th International Conference on Swarm Intelligence, ICSI 2014, held in Hefei, China in October 2014. The 107 revised full papers presented were carefully reviewed and selected from 198 submissions. The papers are organized in 18 cohesive sections, 3 special sessions and one competitive session covering all major topics of swarm intelligence research and development such as novel swarm-based search methods; novel optimization algorithm; particle swarm optimization; ant colony optimization for travelling salesman problem; artificial bee colony algorithms; artificial immune system; evolutionary algorithms; neural networks and fuzzy methods; hybrid methods; multi-objective optimization; multi-agent systems; evolutionary clustering algorithms; classification methods; GPU-based methods; scheduling and path planning; wireless sensor networks; power system optimization; swarm intelligence in image and video processing; applications of swarm intelligence to management problems; swarm intelligence for real-world application.
This book constitutes the proceedings of the 11th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2014, held in Ilan, Taiwan, in September 2014. The 42 full papers and 24 poster papers presented were carefully reviewed and selected from 196 submissions. They are organized in topical sections on systems, networks, and architectures, parallel and multi-core technologies, virtualization and cloud computing technologies, applications of parallel and distributed computing, and I/O, file systems, and data management.
Logic Synthesis for Control Automata provides techniques for logic design of very complex control units with hardly any constraints on their size, i.e. the number of inputs, outputs and states. These techniques cover all stages of control unit design, including: description of control unit behavior by using operator schemes of algorithms (binary decision trees) and various transformations of these descriptions -- composition, decomposition, minimization, etc.; synthesis of a control automaton (finite-state machine); synthesis of an automaton logic circuit: with matrix structure as a part of LSI or VLSI circuits; as multilevel circuit with logic gates; with standard LSI and VLSI circuits with and without memory. Each chapter contains many examples, illustrating the use of the models and methods described. Moreover, the special last chapter demonstrates in detail the whole design methodology presented in the previous chapters, through the examples of the logic design for a control unit. The models, methods and algorithms described in the book can be applied to a broad class of digital system design problems including design of complex controllers, robots, control units of computers and for designing CAD systems of VLSI circuits using FPGA, PLD and SIC technologies. Logic Synthesis for Control Automata is a valuable reference for graduate students, researchers and engineers involved in the design of very complex controllers, VLSI circuits and CAD systems. The inclusion of many examples and problems makes it most suitable for a course on the subject.
The volume "Fuzziness in Database Management Systems" is a highly informative, well-organized and up-to-date collection of contributions authored by many of the leading experts in its field. Among the contributors are the editors, Professors Patrick Bose and Janusz Kacprzyk, both of whom are known internationally. The book is like a movie with an all-star cast. The issue of fuzziness in database management systems has a long history. It begins in 1968 and 1971, when I spent my sabbatical leaves at the IBM Research Laboratory in San Jose, California, as a visiting scholar. During these periods I was associated with Dr. E.F. Codd, the father of relational models of database systems, and came in contact with the developers ofiBMs System Rand SQL. These associations and contacts at a time when the methodology of relational models of data was in its formative stages, made me aware of the basic importance of such models and the desirability of extending them to fuzzy database systems and fuzzy query languages. This perception was reflected in my 1973 ffiM report which led to the paper on the concept of a linguistic variable and later to the paper on the meaning representation language PRUF (Possibilistic Relational Universal Fuzzy). More directly related to database issues during that period were the theses of my students V. Tahani, J. Yang, A. Bolour, M. Shen and R. Sheng, and many subsequent reports by both graduate and undergraduate students at Berkeley.
The two-volume set LNCS 7951 and 7952 constitutes the refereed proceedings of the 10th International Symposium on Neural Networks, ISNN 2013, held in Dalian, China, in July 2013. The 157 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in following topics: computational neuroscience, cognitive science, neural network models, learning algorithms, stability and convergence analysis, kernel methods, large margin methods and SVM, optimization algorithms, varational methods, control, robotics, bioinformatics and biomedical engineering, brain-like systems and brain-computer interfaces, data mining and knowledge discovery and other applications of neural networks.
The two-volume set LNAI 8856 and LNAI 8857 constitutes the proceedings of the 13th Mexican International Conference on Artificial Intelligence, MICAI 2014, held in Tuxtla, Mexico, in November 2014. The total of 87 papers plus 1 invited talk presented in these proceedings were carefully reviewed and selected from 348 submissions. The first volume deals with advances in human-inspired computing and its applications. It contains 44 papers structured into seven sections: natural language processing, natural language processing applications, opinion mining, sentiment analysis, and social network applications, computer vision, image processing, logic, reasoning, and multi-agent systems, and intelligent tutoring systems. The second volume deals with advances in nature-inspired computation and machine learning and contains also 44 papers structured into eight sections: genetic and evolutionary algorithms, neural networks, machine learning, machine learning applications to audio and text, data mining, fuzzy logic, robotics, planning, and scheduling, and biomedical applications.
This book introduces the first programming language for which average-case time analysis of its programs is guaranteed to be modular. The main time measure currently used for real-time languages (worst-case time) is well-known not to be modular in general, which makes average-case analysis notoriously difficult. Schellekens includes sample programs as well as derivations of the average-case time of these programs to illustrate this radically different approach.
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards. |
You may like...
Scheduling Problems - New Applications…
Rodrigo Da Rosa Righi
Hardcover
R3,068
Discovery Miles 30 680
Computational and Statistical Methods…
Shen Liu, James McGree, …
Hardcover
R1,802
Discovery Miles 18 020
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi
Paperback
R3,956
Discovery Miles 39 560
Hybrid Algorithms for Service, Computing…
Jairo R Montoya-Torres, Angel A Juan, …
Hardcover
R4,583
Discovery Miles 45 830
|