0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (66)
  • R500+ (5,381)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Control Modes on Mobile Software Platforms - Empirical Studies on the Importance of Informal Control (Paperback, 1st ed. 2016):... Control Modes on Mobile Software Platforms - Empirical Studies on the Importance of Informal Control (Paperback, 1st ed. 2016)
Tobias Goldbach
R1,812 Discovery Miles 18 120 Ships in 10 - 15 working days

This work highlights the importance of informal control modes on software platforms regarding their positive effects on third-party developers' behaviors and outcomes. The author presents studies in the mobile software industry, demonstrating how self-control and clan control positively affect developers' outcome performance, app quality and intentions to stay on software platforms. Moreover, the studies' findings shed light on the underlying explanatory mechanisms of why informal control modes can be exercised effectively on software platforms and how especially clan control may be facilitated through developers' social capital.

Veracity of Data (Paperback): Laure Berti-Equille, Javier Borge-Holthoefer Veracity of Data (Paperback)
Laure Berti-Equille, Javier Borge-Holthoefer
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

On the Web, a massive amount of user-generated content is available through various channels (e.g., texts, tweets, Web tables, databases, multimedia-sharing platforms, etc.). Conflicting information, rumors, erroneous and fake content can be easily spread across multiple sources, making it hard to distinguish between what is true and what is not. This book gives an overview of fundamental issues and recent contributions for ascertaining the veracity of data in the era of Big Data. The text is organized into six chapters, focusing on structured data extracted from texts. Chapter 1 introduces the problem of ascertaining the veracity of data in a multi-source and evolving context. Issues related to information extraction are presented in Chapter 2. Current truth discovery computation algorithms are presented in details in Chapter 3. It is followed by practical techniques for evaluating data source reputation and authoritativeness in Chapter 4. The theoretical foundations and various approaches for modeling diffusion phenomenon of misinformation spreading in networked systems are studied in Chapter 5. Finally, truth discovery computation from extracted data in a dynamic context of misinformation propagation raises interesting challenges that are explored in Chapter 6. This text is intended for a seminar course at the graduate level. It is also to serve as a useful resource for researchers and practitioners who are interested in the study of fact-checking, truth discovery, or rumor spreading.

Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK,... Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK, September 7-8, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Domenico Bianculli, Radu Calinescu, Bernhard Rumpe
R2,535 Discovery Miles 25 350 Ships in 10 - 15 working days

This book constitutes revised selected papers from the workshopscollocated with the SEFM 2015 conference on Software Engineering andFormal Methods, held in York, UK, in September 2015.The 25 papers included in this volume were carefully reviewed and selected from 32 submissions. The satellite workshops provided a highly interactive and collaborative environment for researchers and practitioners from industry and academia to discuss emerging areas of software engineering and formal methods.The four workshops were: ATSE 2015: The 6th Workshop on Automating Test Case Design, Selection and Evaluation; HOFM 2015: The 2nd Human-Oriented Formal Methods Workshop; MoKMaSD 2015: The 4th International Symposium on Modelling and Knowledge Management Applications: Systems and Domains; VERY*SCART 2015: The 1st International Workshop on the Art of Service Composition and Formal Verification for Self-* Systems.

Algorithms and Computation - 26th International Symposium, ISAAC 2015, Nagoya, Japan, December 9-11, 2015, Proceedings... Algorithms and Computation - 26th International Symposium, ISAAC 2015, Nagoya, Japan, December 9-11, 2015, Proceedings (Paperback, 1st ed. 2015)
Khaled Elbassioni, Kazuhisa Makino
R2,831 Discovery Miles 28 310 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th International Symposium on Algorithms and Computation, ISAAC 2015, held in Nagoya, Japan, in December 2015. The 65 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 180 submissions for inclusion in the book. The focus of the volume is on the following topics: computational geometry; data structures; combinatorial optimization and approximation algorithms; randomized algorithms; graph algorithms and FPT; computational complexity; graph drawing and planar graphs; online and streaming algorithms; and string and DNA algorithms.

Datalog and Logic Databases (Paperback): Sergio Greco, Cristian Molinaro Datalog and Logic Databases (Paperback)
Sergio Greco, Cristian Molinaro
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

The use of logic in databases started in the late 1960s. In the early 1970s Codd formalized databases in terms of the relational calculus and the relational algebra. A major influence on the use of logic in databases was the development of the field of logic programming. Logic provides a convenient formalism for studying classical database problems and has the important property of being declarative, that is, it allows one to express what she wants rather than how to get it. For a long time, relational calculus and algebra were considered the relational database languages. However, there are simple operations, such as computing the transitive closure of a graph, which cannot be expressed with these languages. Datalog is a declarative query language for relational databases based on the logic programming paradigm. One of the peculiarities that distinguishes Datalog from query languages like relational algebra and calculus is recursion, which gives Datalog the capability to express queries like computing a graph transitive closure. Recent years have witnessed a revival of interest in Datalog in a variety of emerging application domains such as data integration, information extraction, networking, program analysis, security, cloud computing, ontology reasoning, and many others. The aim of this book is to present the basics of Datalog, some of its extensions, and recent applications to different domains.

Hyper-lattice Algebraic Model for Data Warehousing (Paperback, 1st ed. 2016): Soumya Sen, Agostino Cortesi, Nabendu Chaki Hyper-lattice Algebraic Model for Data Warehousing (Paperback, 1st ed. 2016)
Soumya Sen, Agostino Cortesi, Nabendu Chaki
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

This book presents Hyper-lattice, a new algebraic model for partially ordered sets, and an alternative to lattice. The authors analyze some of the shortcomings of conventional lattice structure and propose a novel algebraic structure in the form of Hyper-lattice to overcome problems with lattice. They establish how Hyper-lattice supports dynamic insertion of elements in a partial order set with a partial hierarchy between the set members. The authors present the characteristics and the different properties, showing how propositions and lemmas formalize Hyper-lattice as a new algebraic structure.

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,757 Discovery Miles 17 570 Ships in 10 - 15 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November... Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Guojun Wang, Albert Zomaya, Gregorio Martinez, Kenli Li
R1,689 Discovery Miles 16 890 Ships in 10 - 15 working days

This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.

Building Embedded Systems - Programmable Hardware (Paperback, 1st ed.): Changyi Gu Building Embedded Systems - Programmable Hardware (Paperback, 1st ed.)
Changyi Gu
R2,212 Discovery Miles 22 120 Ships in 10 - 15 working days

Develop the software and hardware you never think about. We're talking about the nitty-gritty behind the buttons on your microwave, inside your thermostat, inside the keyboard used to type this description, and even running the monitor on which you are reading it now. Such stuff is termed embedded systems, and this book shows how to design and develop embedded systems at a professional level. Because yes, many people quietly make a successful career doing just that. Building embedded systems can be both fun and intimidating. Putting together an embedded system requires skill sets from multiple engineering disciplines, from software and hardware in particular. Building Embedded Systems is a book about helping you do things in the right way from the beginning of your first project: Programmers who know software will learn what they need to know about hardware. Engineers with hardware knowledge likewise will learn about the software side. Whatever your background is, Building Embedded Systems is the perfect book to fill in any knowledge gaps and get you started in a career programming for everyday devices. Author Changyi Gu brings more than fifteen years of experience in working his way up the ladder in the field of embedded systems. He brings knowledge of numerous approaches to embedded systems design, including the System on Programmable Chips (SOPC) approach that is currently growing to dominate the field. His knowledge and experience make Building Embedded Systems an excellent book for anyone wanting to enter the field, or even just to do some embedded programming as a side project. What You Will Learn Program embedded systems at the hardware level Learn current industry practices in firmware development Develop practical knowledge of embedded hardware options Create tight integration between software and hardware Practice a work flow leading to successful outcomes Build from transistor level to the system level Make sound choices between performance and cost Who This Book Is For Embedded-system engineers and intermediate electronics enthusiasts who are seeking tighter integration between software and hardware. Those who favor the System on a Programmable Chip (SOPC) approach will in particular benefit from this book. Students in both Electrical Engineering and Computer Science can also benefit from this book and the real-life industry practice it provides.

Clustering High--Dimensional Data - First International Workshop, CHDD 2012, Naples, Italy, May 15, 2012, Revised Selected... Clustering High--Dimensional Data - First International Workshop, CHDD 2012, Naples, Italy, May 15, 2012, Revised Selected Papers (Paperback, 1st ed. 2015)
Francesco Masulli, Alfredo Petrosino, Stefano Rovetta
R1,705 Discovery Miles 17 050 Ships in 10 - 15 working days

This book constitutes the proceedings of the International Workshop on Clustering High-Dimensional Data, CHDD 2012, held in Naples, Italy, in May 2012. The 9 papers presented in this volume were carefully reviewed and selected from 15 submissions. They deal with the general subject and issues of high-dimensional data clustering; present examples of techniques used to find and investigate clusters in high dimensionality; and the most common approach to tackle dimensionality problems, namely, dimensionality reduction and its application in clustering.

IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT... IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions (Paperback, 1st ed. 2015)
Andre Loske
R1,963 Discovery Miles 19 630 Ships in 10 - 15 working days

This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers' decision makers significantly underestimate their services' IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates that even though the prevalence of IT security risk concerns in Cloud adoption is widely recognized, providers only pay very limited attention to the concerns expressed by customers, which not only causes serious disagreements with the customers but also considerably inhibits the adoption of the services.

Decidability of Parameterized Verification (Paperback): Roderick Bloem, Swen Jacobs, Ayrat Kalimov, Igor Konnov Decidability of Parameterized Verification (Paperback)
Roderick Bloem, Swen Jacobs, Ayrat Kalimov, Igor Konnov
R1,389 Discovery Miles 13 890 Ships in 10 - 15 working days

While the classic model checking problem is to decide whether a finite system satisfies a specification, the goal of parameterized model checking is to decide, given finite systems (n) parameterized by n , whether, for all n , the system (n) satisfies a specification. In this book we consider the important case of (n) being a concurrent system, where the number of replicated processes depends on the parameter n but each process is independent of n. Examples are cache coherence protocols, networks of finite-state agents, and systems that solve mutual exclusion or scheduling problems. Further examples are abstractions of systems, where the processes of the original systems actually depend on the parameter. The literature in this area has studied a wealth of computational models based on a variety of synchronization and communication primitives, including token passing, broadcast, and guarded transitions. Often, different terminology is used in the literature, and results are based on implicit assumptions. In this book, we introduce a computational model that unites the central synchronization and communication primitives of many models, and unveils hidden assumptions from the literature. We survey existing decidability and undecidability results, and give a systematic view of the basic problems in this exciting research area.

Genetic Algorithms in Java Basics (Paperback, 1st ed.): Lee Jacobson, Burak Kanber Genetic Algorithms in Java Basics (Paperback, 1st ed.)
Lee Jacobson, Burak Kanber
R2,119 Discovery Miles 21 190 Ships in 10 - 15 working days

Genetic Algorithms in Java Basics is a brief introduction to solving problems using genetic algorithms, with working projects and solutions written in the Java programming language. This brief book will guide you step-by-step through various implementations of genetic algorithms and some of their common applications, with the aim to give you a practical understanding allowing you to solve your own unique, individual problems. After reading this book you will be comfortable with the language specific issues and concepts involved with genetic algorithms and you'll have everything you need to start building your own. Genetic algorithms are frequently used to solve highly complex real world problems and with this book you too can harness their problem solving capabilities. Understanding how to utilize and implement genetic algorithms is an essential tool in any respected software developers toolkit. So step into this intriguing topic and learn how you too can improve your software with genetic algorithms, and see real Java code at work which you can develop further for your own projects and research. Guides you through the theory behind genetic algorithms Explains how genetic algorithms can be used for software developers trying to solve a range of problems Provides a step-by-step guide to implementing genetic algorithms in Java

Quantum Information Processing with Finite Resources - Mathematical Foundations (Paperback, 1st ed. 2016): Marco Tomamichel Quantum Information Processing with Finite Resources - Mathematical Foundations (Paperback, 1st ed. 2016)
Marco Tomamichel
R2,170 Discovery Miles 21 700 Ships in 10 - 15 working days

This book provides the reader with the mathematical framework required to fully explore the potential of small quantum information processing devices. As decoherence will continue to limit their size, it is essential to master the conceptual tools which make such investigations possible. A strong emphasis is given to information measures that are essential for the study of devices of finite size, including Renyi entropies and smooth entropies. The presentation is self-contained and includes rigorous and concise proofs of the most important properties of these measures. The first chapters will introduce the formalism of quantum mechanics, with particular emphasis on norms and metrics for quantum states. This is necessary to explore quantum generalizations of Renyi divergence and conditional entropy, information measures that lie at the core of information theory. The smooth entropy framework is discussed next and provides a natural means to lift many arguments from information theory to the quantum setting. Finally selected applications of the theory to statistics and cryptography are discussed. The book is aimed at graduate students in Physics and Information Theory. Mathematical fluency is necessary, but no prior knowledge of quantum theory is required.

Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014): Sheng Xiao, Weibo Gong,... Dynamic Secrets in Communication Security (Paperback, Softcover reprint of the original 1st ed. 2014)
Sheng Xiao, Weibo Gong, Don Towsley
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in Communication Security" presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic secret based security scheme guarantees impersonation attacks are detected even if an adversary steals a user's password or their key is lost. Practitioners and researchers working in network security or wireless communications will find this book a must-have reference. "Dynamic Secrets in Communication Security" is also a valuable secondary text for advanced-level students in computer science and electrical engineering.

Machine Learning - Algorithms and Applications (Hardcover): Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed... Machine Learning - Algorithms and Applications (Hardcover)
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier
R2,452 Discovery Miles 24 520 Ships in 12 - 17 working days

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.

Mathematical Foundations of Computer Science 2015 - 40th International Symposium, MFCS 2015, Milan, Italy, August 24-28, 2015,... Mathematical Foundations of Computer Science 2015 - 40th International Symposium, MFCS 2015, Milan, Italy, August 24-28, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Giuseppe F. Italiano, Giovanni Pighizzini, Donald T Sannella
R2,924 Discovery Miles 29 240 Ships in 10 - 15 working days

This two volume set LNCS 9234 and 9235 constitutes the refereed conference proceedings of the 40th International Symposium on Mathematical Foundations of Computer Science, MFCS 2015, held in Milan, Italy, in August 2015. The 82 revised full papers presented together with 5 invited talks were carefully selected from 201 submissions. The papers feature high-quality research in all branches of theoretical computer science. They have been organized in the following topical main sections: logic, semantics, automata, and theory of programming (volume 1) and algorithms, complexity, and games (volume 2).

Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback,... Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback, 1st ed. 2016)
Joong Hoon Kim, Zong Woo Geem
R7,075 Discovery Miles 70 750 Ships in 10 - 15 working days

The Harmony Search Algorithm (HSA) is one of the most well-known techniques in the field of soft computing, an important paradigm in the science and engineering community. This volume, the proceedings of the 2nd International Conference on Harmony Search Algorithm 2015 (ICHSA 2015), brings together contributions describing the latest developments in the field of soft computing with a special focus on HSA techniques. It includes coverage of new methods that have potentially immense application in various fields. Contributed articles cover aspects of the following topics related to the Harmony Search Algorithm: analytical studies; improved, hybrid and multi-objective variants; parameter tuning; and large-scale applications. The book also contains papers discussing recent advances on the following topics: genetic algorithms; evolutionary strategies; the firefly algorithm and cuckoo search; particle swarm optimization and ant colony optimization; simulated annealing; and local search techniques. This book offers a valuable snapshot of the current status of the Harmony Search Algorithm and related techniques, and will be a useful reference for practising researchers and advanced students in computer science and engineering.

Energy Time Series Forecasting - Efficient and Accurate Forecasting of Evolving Time Series from the Energy Domain (Paperback,... Energy Time Series Forecasting - Efficient and Accurate Forecasting of Evolving Time Series from the Energy Domain (Paperback, 1st ed. 2015)
Lars Dannecker
R2,114 Discovery Miles 21 140 Ships in 10 - 15 working days

Lars Dannecker developed a novel online forecasting process that significantly improves how forecasts are calculated. It increases forecasting efficiency and accuracy, as well as allowing the process to adapt to different situations and applications. Improving the forecasting efficiency is a key pre-requisite for ensuring stable electricity grids in the face of an increasing amount of renewable energy sources. It is also important to facilitate the move from static day ahead electricity trading towards more dynamic real-time marketplaces. The online forecasting process is realized by a number of approaches on the logical as well as on the physical layer that we introduce in the course of this book. Nominated for the Georg-Helm-Preis 2015 awarded by the Technische Universitat Dresden.

Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers... Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Gregor Leander
R3,289 Discovery Miles 32 890 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementation issues; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes; proofs; design; lightweight; cryptanalysis of hash functions and stream ciphers; and mass surveillance.

Logics in Computer Science - A Study on Extensions of Temporal and Strategic Logics (Paperback, Softcover reprint of the... Logics in Computer Science - A Study on Extensions of Temporal and Strategic Logics (Paperback, Softcover reprint of the original 1st ed. 2013)
Fabio Mogavero
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software designs with respect to a desired behavior. The work is organized in two parts. In the first part two logics for computations, the graded computation tree logic and the computation tree logic with minimal model quantifiers are discussed. These have proved to be useful in describing correct executions of monolithic closed systems. The second part focuses on logics for strategies, strategy logic and memoryful alternating-time temporal logic, which have been successfully applied to formalize several properties of interactive plays in multi-entities systems modeled as multi-agent games.

Mathematical Modeling of Technological Processes - 8th International Conference, CITech 2015, Almaty, Kazakhstan, September... Mathematical Modeling of Technological Processes - 8th International Conference, CITech 2015, Almaty, Kazakhstan, September 24-27, 2015, Proceedings (Paperback, 1st ed. 2015)
Nargozy Danaev, Yurii Shokin, Akhmed-Zaki Darkhan
R1,518 Discovery Miles 15 180 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Mathematical modeling of technological processes track of the 8th International Conference on Computational and Information Technologies in Science, Engineering and Education, CITech 2015, held in Almaty, Kazakhstan, in September 2015. The 20 papers and one short paper presented were carefully reviewed and selected from 56 submissions to the track. They provide a forum for sharing new aspects of the progresses in the areas of mathematical modeling of technological processes; process automation and control; high performance computing; simulation.

Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Paperback, Softcover reprint... Multi Tenancy for Cloud-Based In-Memory Column Databases - Workload Management and Data Placement (Paperback, Softcover reprint of the original 1st ed. 2014)
Jan Schaffner
R1,910 Discovery Miles 19 100 Ships in 10 - 15 working days

With the proliferation of Software-as-a-Service (SaaS) offerings, it is becoming increasingly important for individual SaaS providers to operate their services at a low cost. This book investigates SaaS from the perspective of the provider and shows how operational costs can be reduced by using "multi tenancy," a technique for consolidating a large number of customers onto a small number of servers. Specifically, the book addresses multi tenancy on the database level, focusing on in-memory column databases, which are the backbone of many important new enterprise applications. For efficiently implementing multi tenancy in a farm of databases, two fundamental challenges must be addressed, (i) workload modeling and (ii) data placement. The first involves estimating the (shared) resource consumption for multi tenancy on a single in-memory database server. The second consists in assigning tenants to servers in a way that minimizes the number of required servers (and thus costs) based on the assumed workload model. This step also entails replicating tenants for performance and high availability. This book presents novel solutions to both problems.

Computational Complexity of Solving Equation Systems (Paperback, 1st ed. 2015): Przemyslaw Broniek Computational Complexity of Solving Equation Systems (Paperback, 1st ed. 2015)
Przemyslaw Broniek
R1,710 Discovery Miles 17 100 Ships in 10 - 15 working days

This volume considers the computational complexity of determining whether a system of equations over a fixed algebra A has a solution. It examines in detail the two problems this leads to: SysTermSat(A) and SysPolSat(A), in which equations are built out of terms or polynomials, respectively. The book characterizes those algebras for which SysPolSat can be solved in a polynomial time. So far, studies and their outcomes have not covered algebras that generate a variety admitting type 1 in the sense of Tame Congruence Theory. Since unary algebras admit only type 1, this book focuses on these algebras to tackle the main problem. It discusses several aspects of unary algebras and proves that the Constraint Satisfaction Problem for relational structures is polynomially equivalent to SysTermSat over unary algebras. The book's final chapters discuss partial characterizations, present conclusions, and describe the problems that are still open.

String Processing and Information Retrieval - 22nd International Symposium, SPIRE 2015, London, UK, September 1-4, 2015,... String Processing and Information Retrieval - 22nd International Symposium, SPIRE 2015, London, UK, September 1-4, 2015, Proceedings (Paperback, 1st ed. 2015)
Costas Iliopoulos, Simon Puglisi, Emine Yilmaz
R2,653 Discovery Miles 26 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Symposium on String Processing and Information Retrieval, SPIRE 2015, held in London, UK, in September 2015. The 28 full and 6 short papers included in this volume were carefully reviewed and selected from 90 submissions. The papers cover research in all aspects of string processing, information retrieval, computational biology, pattern matching, semi-structured data, and related applications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Algorithms for Data and Computation…
Alex X. Liu, Rui Li Hardcover R3,820 Discovery Miles 38 200
Coding for Kids in Python - Python…
Bob Mather Hardcover R919 Discovery Miles 9 190
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,816 Discovery Miles 28 160
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,375 Discovery Miles 33 750
Gamma Solution - An Application of…
James R Warren Hardcover R1,373 R1,138 Discovery Miles 11 380
Augmented Exploitation - Artificial…
Phoebe Moore, Jamie Woodcock Hardcover R2,719 Discovery Miles 27 190
C Programming - C Programming Language…
Adam Dodson Hardcover R614 R521 Discovery Miles 5 210
A Practical Approach to Data Structures…
Sanjay Pahuja Hardcover R1,426 Discovery Miles 14 260
The Physics of Computing
Marilyn Wolf Paperback R1,692 Discovery Miles 16 920
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,789 Discovery Miles 37 890

 

Partners