0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (62)
  • R500+ (5,386)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Genetic Programming Theory and Practice X (Paperback, 2013 ed.): Rick Riolo, Ekaterina Vladislavleva, Marylyn D. Ritchie, Jason... Genetic Programming Theory and Practice X (Paperback, 2013 ed.)
Rick Riolo, Ekaterina Vladislavleva, Marylyn D. Ritchie, Jason H. Moore
R2,239 Discovery Miles 22 390 Ships in 10 - 15 working days

These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: evolutionary constraints, relaxation of selection mechanisms, diversity preservation strategies, flexing fitness evaluation, evolution in dynamic environments, multi-objective and multi-modal selection, foundations of evolvability, evolvable and adaptive evolutionary operators, foundation of injecting expert knowledge in evolutionary search, analysis of problem difficulty and required GP algorithm complexity, foundations in running GP on the cloud - communication, cooperation, flexible implementation, and ensemble methods. Additional focal points for GP symbolic regression are: (1) The need to guarantee convergence to solutions in the function discovery mode; (2) Issues on model validation; (3) The need for model analysis workflows for insight generation based on generated GP solutions - model exploration, visualization, variable selection, dimensionality analysis; (4) Issues in combining different types of data. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.

Theory and Practice of Natural Computing - Third International Conference, TPNC 2014, Granada, Spain, December 9-11, 2014.... Theory and Practice of Natural Computing - Third International Conference, TPNC 2014, Granada, Spain, December 9-11, 2014. Proceedings (Paperback, 2014 ed.)
Adrian Horia Dediu, Manuel Lozano, Carlos Martin-Vide
R2,273 Discovery Miles 22 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Conference, TPNC 2014, held in Granada, Spain, in December 2014. The 22 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on nature-inspired models of computation; synthesizing nature by means of computation; nature-inspired materials; and information processing in nature.

Computer and Computing Technologies in Agriculture III - Third IFIP TC 12 International Conference, CCTA 2009, Beijing, China,... Computer and Computing Technologies in Agriculture III - Third IFIP TC 12 International Conference, CCTA 2009, Beijing, China, October 14-17, 2009, Revised Selected Papers (Paperback, 2010 ed.)
Daoliang Li, Chunjiang Zhao
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.

Nature-Inspired Computation and Machine Learning - 13th Mexican International Conference on Artificial Intelligence, MICAI2014,... Nature-Inspired Computation and Machine Learning - 13th Mexican International Conference on Artificial Intelligence, MICAI2014, Tuxtla Gutierrez, Mexico, November 16-22, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Alexander Gelbukh, Felix Castro Espinoza, Sofia N Galicia-Haro
R3,054 Discovery Miles 30 540 Ships in 10 - 15 working days

The two-volume set LNAI 8856 and LNAI 8857 constitutes the proceedings of the 13th Mexican International Conference on Artificial Intelligence, MICAI 2014, held in Tuxtla, Mexico, in November 2014. The total of 87 papers plus 1 invited talk presented in these proceedings were carefully reviewed and selected from 348 submissions. The first volume deals with advances in human-inspired computing and its applications. It contains 44 papers structured into seven sections: natural language processing, natural language processing applications, opinion mining, sentiment analysis, and social network applications, computer vision, image processing, logic, reasoning, and multi-agent systems, and intelligent tutoring systems. The second volume deals with advances in nature-inspired computation and machine learning and contains also 44 papers structured into eight sections: genetic and evolutionary algorithms, neural networks, machine learning, machine learning applications to audio and text, data mining, fuzzy logic, robotics, planning, and scheduling, and biomedical applications.

Algorithms and Computation - 25th International Symposium, ISAAC 2014, Jeonju, Korea, December 15-17, 2014, Proceedings... Algorithms and Computation - 25th International Symposium, ISAAC 2014, Jeonju, Korea, December 15-17, 2014, Proceedings (Paperback, 2014 ed.)
Hee-Kap Ahn, Chan-Su Shin
R3,022 Discovery Miles 30 220 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 25th International Symposium on Algorithms and Computation, ISAAC 2014, held in Jeonju, Korea, in December 2014. The 60 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 171 submissions for inclusion in the book. The focus of the volume in on the following topics: computational geometry, combinatorial optimization, graph algorithms: enumeration, matching and assignment, data structures and algorithms, fixed-parameter tractable algorithms, scheduling algorithms, computational complexity, computational complexity, approximation algorithms, graph theory and algorithms, online and approximation algorithms, and network and scheduling algorithms.

A Modular Calculus for the Average Cost of Data Structuring (Paperback, 2008 ed.): Michel Schellekens A Modular Calculus for the Average Cost of Data Structuring (Paperback, 2008 ed.)
Michel Schellekens
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book introduces the first programming language for which average-case time analysis of its programs is guaranteed to be modular. The main time measure currently used for real-time languages (worst-case time) is well-known not to be modular in general, which makes average-case analysis notoriously difficult. Schellekens includes sample programs as well as derivations of the average-case time of these programs to illustrate this radically different approach.

Human-Inspired Computing and its Applications - 13th Mexican International Conference on Artificial Intelligence, MICAI2014,... Human-Inspired Computing and its Applications - 13th Mexican International Conference on Artificial Intelligence, MICAI2014, Tuxtla Gutierrez, Mexico, November 16-22, 2014. Proceedings, Part I (Paperback, 2014 ed.)
Alexander Gelbukh, Felix Castro Espinoza, Sofia N Galicia-Haro
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

The two-volume set LNAI 8856 and LNAI 8857 constitutes the proceedings of the 13th Mexican International Conference on Artificial Intelligence, MICAI 2014, held in Tuxtla, Mexico, in November 2014. The total of 87 papers plus 1 invited talk presented in these proceedings were carefully reviewed and selected from 348 submissions. The first volume deals with advances in human-inspired computing and its applications. It contains 44 papers structured into seven sections: natural language processing, natural language processing applications, opinion mining, sentiment analysis, and social network applications, computer vision, image processing, logic, reasoning, and multi-agent systems, and intelligent tutoring systems. The second volume deals with advances in nature-inspired computation and machine learning and contains also 44 papers structured into eight sections: genetic and evolutionary algorithms, neural networks, machine learning, machine learning applications to audio and text, data mining, fuzzy logic, robotics, planning, and scheduling, and biomedical applications.

SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice... SOFSEM 2015: Theory and Practice of Computer Science - 41st International Conference on Current Trends in Theory and Practice of Computer Science, Pec pod Snezkou, Czech Republic, January 24-29, 2015, Proceedings (Paperback, 2015 ed.)
Giuseppe Italiano, Tiziana Margaria-Steffen, Jaroslav Pokorny, Jean-Jacques Quisquater, Roger Wattenhofer
R3,284 Discovery Miles 32 840 Ships in 10 - 15 working days

This book constitutes the proceedings of the 41st International Conference on Current Trends in Theory and Practice of Computer Science held in Pec pod Snezkou, Czech Republic, during January 24-29, 2015. The book features 8 invited talks and 42 regular papers which were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections named: foundations of computer science; software and Web engineering; data, information, and knowledge engineering; and cryptography, security, and verification.

Privacy-Preserving Machine Learning for Speech Processing (Paperback): Manas A. Pathak Privacy-Preserving Machine Learning for Speech Processing (Paperback)
Manas A. Pathak
R3,281 Discovery Miles 32 810 Ships in 10 - 15 working days

This thesis discusses the privacy issues in speech-based applications such as biometric authentication, surveillance, and external speech processing services. Author Manas A. Pathak presents solutions for privacy-preserving speech processing applications such as speaker verification, speaker identification and speech recognition. The author also introduces some of the tools from cryptography and machine learning and current techniques for improving the efficiency and scalability of the presented solutions. Experiments with prototype implementations of the solutions for execution time and accuracy on standardized speech datasets are also included in the text. Using the framework proposed may now make it possible for a surveillance agency to listen for a known terrorist without being able to hear conversation from non-targeted, innocent civilians.

Data-Driven Methods for Adaptive Spoken Dialogue Systems - Computational Learning for Conversational Interfaces (Paperback,... Data-Driven Methods for Adaptive Spoken Dialogue Systems - Computational Learning for Conversational Interfaces (Paperback, 2012 ed.)
Oliver Lemon, Olivier Pietquin
R2,843 Discovery Miles 28 430 Ships in 10 - 15 working days

Data driven methods have long been used in Automatic Speech Recognition (ASR) and Text-To-Speech (TTS) synthesis and have more recently been introduced for dialogue management, spoken language understanding, and Natural Language Generation. Machine learning is now present "end-to-end" in Spoken Dialogue Systems (SDS). However, these techniques require data collection and annotation campaigns, which can be time-consuming and expensive, as well as dataset expansion by simulation. In this book, we provide an overview of the current state of the field and of recent advances, with a specific focus on adaptivity.

Terrorism Informatics - Knowledge Management and Data Mining for Homeland Security (Paperback, 2008 ed.): Hsinchun Chen, Edna... Terrorism Informatics - Knowledge Management and Data Mining for Homeland Security (Paperback, 2008 ed.)
Hsinchun Chen, Edna Reid, Joshua Sinai, Andrew Silke, Boaz Ganor
R3,210 Discovery Miles 32 100 Ships in 10 - 15 working days

This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.

Foundational and Practical Aspects of Resource Analysis - Third International Workshop, FOPARA 2013, Bertinoro, Italy, August... Foundational and Practical Aspects of Resource Analysis - Third International Workshop, FOPARA 2013, Bertinoro, Italy, August 29-31, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Ugo Dal Lago, Ricardo Pena
R1,718 Discovery Miles 17 180 Ships in 10 - 15 working days

This book constitutes the proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis, FOPARA 2013, held in Bertinoro, Italy, in August 2013. The 9 papers presented in this volume were carefully reviewed and selected from 12 submissions. They deal with traditional approaches to complexity analysis, differential privacy, and probabilistic analysis of programs.

Mapping Nanotechnology Innovations and Knowledge - Global and Longitudinal Patent and Literature Analysis (Paperback, 2009... Mapping Nanotechnology Innovations and Knowledge - Global and Longitudinal Patent and Literature Analysis (Paperback, 2009 ed.)
Hsinchun Chen
R3,136 Discovery Miles 31 360 Ships in 10 - 15 working days

This book defines the application of Information Technology's systematic and automated knowledge mapping methodology to collect, analyze and report nanotechnology research on a global basis. The result of these analyses is be a systematic presentation of the state of the art of nanotechnology, which will include basic analysis, content analysis, and citation network analysis of comprehensive nanotechnology findings across technology domains, inventors, institutions, and countries.

Network Science - Complexity in Nature and Technology (Paperback, 2010 ed.): Ernesto Estrada, Maria Fox, Desmond J. Higham,... Network Science - Complexity in Nature and Technology (Paperback, 2010 ed.)
Ernesto Estrada, Maria Fox, Desmond J. Higham, Gian-Luca Oppo
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.

Activity Monitoring by Multiple Distributed Sensing - Second International Workshop, AMMDS 2014, Stockholm, Sweden, August 24,... Activity Monitoring by Multiple Distributed Sensing - Second International Workshop, AMMDS 2014, Stockholm, Sweden, August 24, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Pier Luigi Mazzeo, Paolo Spagnolo, Thomas B. Moeslund
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Activity Monitoring by Multiple Distributed Sensing, AMMDS 2014, held in Stockholm, Sweden, in August 2014, as a satellite event of ICPR 2014, the 22nd International Conference on Pattern Recognition. The 9 revised full papers included in the volume investigate the challenges that arise when distributed sensor networks are used to track, monitor, and understand the activity, intent, and motives of human beings. Application areas include human-computer interaction, user interface design, robot learning, and surveillance.

Euro-Par 2014: Parallel Processing Workshops - Euro-Par 2014 International Workshops, Porto, Portugal, August 25-26, 2014,... Euro-Par 2014: Parallel Processing Workshops - Euro-Par 2014 International Workshops, Porto, Portugal, August 25-26, 2014, Revised Selected Papers, Part I (Paperback, 2014 ed.)
Luis Lopes, Julius Zilinskas, Alexandru Costan, Roberto G Cascella, Gabor Kecskemeti, …
R3,307 Discovery Miles 33 070 Ships in 10 - 15 working days

The two volumes LNCS 8805 and 8806 constitute the thoroughly refereed post-conference proceedings of 18 workshops held at the 20th International Conference on Parallel Computing, Euro-Par 2014, in Porto, Portugal, in August 2014. The 100 revised full papers presented were carefully reviewed and selected from 173 submissions. The volumes include papers from the following workshops: APCI&E (First Workshop on Applications of Parallel Computation in Industry and Engineering - BigDataCloud (Third Workshop on Big Data Management in Clouds) - DIHC (Second Workshop on Dependability and Interoperability in Heterogeneous Clouds) - FedICI (Second Workshop on Federative and Interoperable Cloud Infrastructures) - Hetero Par (12th International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms) - HiBB (5th Workshop on High Performance Bioinformatics and Biomedicine) - LSDVE (Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P) - MuCoCoS (7th International Workshop on Multi-/Many-core Computing Systems) - OMHI (Third Workshop on On-chip Memory Hierarchies and Interconnects) - PADAPS (Second Workshop on Parallel and Distributed Agent-Based Simulations) - PROPER (7th Workshop on Productivity and Performance) - Resilience (7th Workshop on Resiliency in High Performance Computing with Clusters, Clouds, and Grids) - REPPAR (First International Workshop on Reproducibility in Parallel Computing) - ROME (Second Workshop on Runtime and Operating Systems for the Many Core Era) - SPPEXA (Workshop on Software for Exascale Computing) - TASUS (First Workshop on Techniques and Applications for Sustainable Ultrascale Computing Systems) - UCHPC (7th Workshop on Un Conventional High Performance Computing) and VHPC (9th Workshop on Virtualization in High-Performance Cloud Computing.

String Processing and Information Retrieval - 22nd International Symposium, SPIRE 2015, London, UK, September 1-4, 2015,... String Processing and Information Retrieval - 22nd International Symposium, SPIRE 2015, London, UK, September 1-4, 2015, Proceedings (Paperback, 1st ed. 2015)
Costas Iliopoulos, Simon Puglisi, Emine Yilmaz
R2,606 Discovery Miles 26 060 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Symposium on String Processing and Information Retrieval, SPIRE 2015, held in London, UK, in September 2015. The 28 full and 6 short papers included in this volume were carefully reviewed and selected from 90 submissions. The papers cover research in all aspects of string processing, information retrieval, computational biology, pattern matching, semi-structured data, and related applications.

ISPF Programmer's Guide (Paperback, Digital original): Franz Lanz ISPF Programmer's Guide (Paperback, Digital original)
Franz Lanz
R1,638 R1,336 Discovery Miles 13 360 Save R302 (18%) Ships in 10 - 15 working days

This book is intended to support ISPF application programmers to become professional in the smart programming of ISPF applications using the REXX language. The contents are presented in a modular manner to suit reading with heterogeneous ISPF programming knowledge. The following topics are covered: Introduction to the programming language REXX as well as to ISPF programming, data processing in ISPF applications, use of messages, panels, skeletons, tables, ISPF variables and an introduction to creating and applying edit macros. Each theme is vividly illustrated by programming examples. The Smart ISPF Utilities contain some very useful programming aids that are often useful when programming ISPF applications. The book serves as a textbook as well as a manual for daily work. Many cross-references are included as well as an extensive index. Moreover, the author gives many helpful hints and tips on smart ISPF programming practices. The Smart ISPF Utilities contain many useful programming aids.

Implicit Curves and Surfaces: Mathematics, Data Structures and Algorithms (Paperback, 2009 ed.): Abel Gomes, Irina Voiculescu,... Implicit Curves and Surfaces: Mathematics, Data Structures and Algorithms (Paperback, 2009 ed.)
Abel Gomes, Irina Voiculescu, Joaquim Jorge, Brian Wyvill, Callum Galbraith
R2,625 Discovery Miles 26 250 Ships in 10 - 15 working days

Implicit objects have gained increasing importance in geometric modeling, visualisation, animation, and computer graphics, because their geometric properties provide a good alternative to traditional parametric objects. This book presents the mathematics, computational methods and data structures, as well as the algorithms needed to render implicit curves and surfaces, and shows how implicit objects can easily describe smooth, intricate, and articulatable shapes, and hence why they are being increasingly used in graphical applications. Divided into two parts, the first introduces the mathematics of implicit curves and surfaces, as well as the data structures suited to store their sampled or discrete approximations, and the second deals with different computational methods for sampling implicit curves and surfaces, with particular reference to how these are applied to functions in 2D and 3D spaces.

Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers (Paperback,... Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers (Paperback, 2014 ed.)
Bruce Christianson, James Malcolm
R2,273 Discovery Miles 22 730 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security".

Economics of Information Security and Privacy (Paperback, 2010 ed.): Tyler Moore, David Pym, Christos Ioannidis Economics of Information Security and Privacy (Paperback, 2010 ed.)
Tyler Moore, David Pym, Christos Ioannidis
R5,591 Discovery Miles 55 910 Ships in 10 - 15 working days

The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.

The P=NP Question and Goedel's Lost Letter (Paperback, 2010 ed.): Richard J. Lipton The P=NP Question and Goedel's Lost Letter (Paperback, 2010 ed.)
Richard J. Lipton
R2,862 Discovery Miles 28 620 Ships in 10 - 15 working days

? DoesP=NP. In just ?ve symbols Dick Karp -in 1972-captured one of the deepest and most important questions of all time. When he ?rst wrote his famous paper, I think it's fair to say he did not know the depth and importance of his question. Now over three decades later, we know P=NP is central to our understanding of compu- tion, it is a very hard problem, and its resolution will have potentially tremendous consequences. This book is a collection of some of the most popular posts from my blog- Godel Lost Letter andP=NP-which I started in early 2009. The main thrust of the blog, especially when I started, was to explore various aspects of computational complexity around the famousP=NP question. As I published posts I branched out and covered additional material, sometimes a timely event, sometimes a fun idea, sometimes a new result, and sometimes an old result. I have always tried to make the posts readable by a wide audience, and I believe I have succeeded in doing this.

New Software Engineering Paradigm Based on Complexity Science - An Introduction to NSE (Paperback, 2011 ed.): Jay Xiong New Software Engineering Paradigm Based on Complexity Science - An Introduction to NSE (Paperback, 2011 ed.)
Jay Xiong
R5,720 Discovery Miles 57 200 Ships in 10 - 15 working days

This book describes a complete revolution in software engineering based on complexity science through the establishment of NSE - Nonlinear Software Engineering paradigm which complies with the essential principles of complexity science, including the Nonlinearity principle, the Holism principle, the Complexity Arises From Simple Rules principle, the Initial Condition Sensitivity principle, the Sensitivity to Change principle, the Dynamics principle, the Openness principle, the Self-organization principle, and the Self-adaptation principle. The aims of this book are to offer revolutionary solutions to solve the critical problems existing with the old-established software engineering paradigm based on linear thinking and simplistic science complied with the superposition principle, and make it possible tohelp software development organizations double their productivity, halve their cost, and remove 99% to 99.99% of the defects in their software products, and efficiently handle software complexity, conformity, visibility, and changeability. It covers almost all areas in software engineering. The tools NSE_CLICK- an automatic acceptance testing platform for outsourcing (or internally developed) C/C++ products, and NSE_CLICK_J - an automatic acceptance testing platform for outsourcing (or internally developed) Java products are particularly designed for non-technical readers to view/review how the acceptance testing of a software product developed with NSE can be performed automatically, and how the product developed with NSE is truly maintainable at the customer site.

Technologies and Applications of Artificial Intelligence - 19th International Conference, TAAI 2014, Taipei, Taiwan, November... Technologies and Applications of Artificial Intelligence - 19th International Conference, TAAI 2014, Taipei, Taiwan, November 21-23, 2014, Proceedings (Paperback, 2014 ed.)
Shin-Ming Cheng, Min-Yuh Day
R2,652 Discovery Miles 26 520 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Technologies and Applications of Artificial Intelligence, held in Taipei, Taiwan, in November 2014. The 23 revised full papers, 3 short papers, and 8 workshop papers presented at the international track of the conference were carefully reviewed and selected from overall 93 submissions to the international track, domestic track, and international workshops for inclusion in this volume. The papers feature original research results and practical development experiences among researchers and application developers from the many AI related areas including machine learning, data mining, statistics, computer vision, web intelligence, information retrieval, and computer games.

Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18,... Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom (Paperback, 2005 ed.)
David Chadwick, Bart Preneel
R2,876 Discovery Miles 28 760 Ships in 10 - 15 working days

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers. This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Handbook of Research on Fireworks…
Ying Tan Hardcover R8,709 Discovery Miles 87 090
Algorithms Illuminated - Omnibus Edition
Tim Roughgarden Hardcover R1,616 Discovery Miles 16 160
Network Flows - Pearson New…
Ravindra Ahuja, Thomas Magnanti, … Paperback R2,679 Discovery Miles 26 790
C Programming - C Programming Language…
Adam Dodson Hardcover R598 R542 Discovery Miles 5 420
Gamma Solution - An Application of…
James R Warren Hardcover R1,338 R1,131 Discovery Miles 11 310
Coding for Kids in Python - Python…
Bob Mather Hardcover R917 Discovery Miles 9 170
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano Paperback R2,421 Discovery Miles 24 210
Python Programming for Computations…
Computer Language Hardcover R1,216 R1,024 Discovery Miles 10 240
Image Analysis, Classification and…
Morton John Canty Paperback R1,540 Discovery Miles 15 400
Genetic Algorithms with Python
Clinton Sheppard Hardcover R911 R858 Discovery Miles 8 580

 

Partners