0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (59)
  • R250 - R500 (365)
  • R500+ (14,537)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Distributed and Parallel Database Object Management (Hardcover, Reprinted edition): Elisa Bertino, Tamer OEzsu Distributed and Parallel Database Object Management (Hardcover, Reprinted edition)
Elisa Bertino, Tamer OEzsu
R4,076 Discovery Miles 40 760 Ships in 18 - 22 working days

Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science. Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field.

Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019):... Advances in Communication, Cloud, and Big Data - Proceedings of 2nd National Conference on CCB 2016 (Hardcover, 1st ed. 2019)
Hiren Kumar Deva Sarma, Samarjeet Borah, Nitul Dutta
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.

Knowledge Processing with Interval and Soft Computing (Hardcover, 2008 ed.): Chenyi Hu, R.Baker Kearfott, Andre De Korvin,... Knowledge Processing with Interval and Soft Computing (Hardcover, 2008 ed.)
Chenyi Hu, R.Baker Kearfott, Andre De Korvin, Vladik Kreinovich
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

Interval computing combined with fuzzy logic has become an emerging tool in studying artificial intelligence and knowledge processing (AIKP) applications since it models uncertainties frequently raised in the field. This book provides introductions for both interval and fuzzy computing in a very accessible style.

Application algorithms covered in this book include quantitative and qualitative data mining with interval valued datasets, decision making systems with interval valued parameters, interval valued Nash games and interval weighted graphs. Successful applications in studying finance and economics, etc are also included.

This book can serve as a handbook or a text for readers interested in applying interval and soft computing for AIKP.

Data Mining and Knowledge Discovery with Evolutionary Algorithms (Hardcover, 2002 ed.): Alex A. Freitas Data Mining and Knowledge Discovery with Evolutionary Algorithms (Hardcover, 2002 ed.)
Alex A. Freitas
R2,799 Discovery Miles 27 990 Ships in 18 - 22 working days

This book integrates two areas of computer science, namely data mining and evolutionary algorithms. Both these areas have become increasingly popular in the last few years, and their integration is currently an area of active research.In general, data mining consists of extracting knowledge from data. In this book we particularly emphasize the importance of discovering comprehensible, interesting knowledge, which is potentially useful for the reader for intelligent decision making.In a nutshell, the motivation for applying evolutionary algorithms to data mining is that evolutionary algorithms are robust search methods which perform a global search in the space of candidate solutions. In contrast, most rule induction methods perform a local, greedy search in the space of candidate rules. Intuitively, the global search of evolutionary algorithms can discover interesting rules and patterns that would be missed by the greedy search.

Fuzzy Logic, Identification and Predictive Control (Hardcover, 2005 ed.): Jairo Jose Espinosa Oviedo, Joos P.L. Vandewalle,... Fuzzy Logic, Identification and Predictive Control (Hardcover, 2005 ed.)
Jairo Jose Espinosa Oviedo, Joos P.L. Vandewalle, Vincent Wertz
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

The complexity and sensitivity of modern industrial processes and systems increasingly require adaptable advanced control protocols. These controllers have to be able to deal with circumstances demanding "judgement" rather than simple "yes/no," "on/off" responses, circumstances where an imprecise linguistic description is often more relevant than a cut-and-dried numerical one. The ability of fuzzy systems to handle numeric and linguistic information within a single framework renders them efficacious in this form of expert control system.

Divided into two parts, Fuzzy Logic, Identification and Predictive Control first shows you how to construct static and dynamic fuzzy models using the numerical data from a variety of real-world industrial systems and simulations. The second part demonstrates the exploitation of such models to design control systems employing techniques like data mining.

Fuzzy Logic, Identification and Predictive Control is a comprehensive introduction to the use of fuzzy methods in many different control paradigms encompassing robust, model-based, PID-like and predictive control. This combination of fuzzy control theory and industrial serviceability will make a telling contribution to your research whether in the academic or industrial sphere and also serves as a fine roundup of the fuzzy control area for the graduate student.

Advances in Industrial Control aims to report and encourage the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrialcontrol.

Data Mining with Ontologies - Implementations, Findings and Frameworks (Hardcover): Hector Oscar Nigro, Sandra Gonzalez Cisaro,... Data Mining with Ontologies - Implementations, Findings and Frameworks (Hardcover)
Hector Oscar Nigro, Sandra Gonzalez Cisaro, Daniel Xodo
R4,565 Discovery Miles 45 650 Ships in 18 - 22 working days

'Data Mining with Ontologies' examines methodologies and research for the development of ontological foundations for data mining.

Machine Intelligence and Big Data in Industry (Hardcover, 1st ed. 2016): Dominik Ryzko, Piotr Gawrysiak, Marzena Kryszkiewicz,... Machine Intelligence and Big Data in Industry (Hardcover, 1st ed. 2016)
Dominik Ryzko, Piotr Gawrysiak, Marzena Kryszkiewicz, Henryk Rybinski
R3,602 R3,341 Discovery Miles 33 410 Save R261 (7%) Ships in 10 - 15 working days
Loop Tiling for Parallelism (Hardcover, 2000 ed.): Jingling Xue Loop Tiling for Parallelism (Hardcover, 2000 ed.)
Jingling Xue
R4,157 Discovery Miles 41 570 Ships in 18 - 22 working days

Loop tiling, as one of the most important compiler optimizations, is beneficial for both parallel machines and uniprocessors with a memory hierarchy. This book explores the use of loop tiling for reducing communication cost and improving parallelism for distributed memory machines. The author provides mathematical foundations, investigates loop permutability in the framework of nonsingular loop transformations, discusses the necessary machineries required, and presents state-of-the-art results for finding communication- and time-minimal tiling choices. Throughout the book, theorems and algorithms are illustrated with numerous examples and diagrams. The techniques presented in Loop Tiling for Parallelism can be adapted to work for a cluster of workstations, and are also directly applicable to shared-memory machines once the machines are modeled as BSP (Bulk Synchronous Parallel) machines. Features and key topics: Detailed review of the mathematical foundations, including convex polyhedra and cones; Self-contained treatment of nonsingular loop transformations, code generation, and full loop permutability; Tiling loop nests by rectangles and parallelepipeds, including their mathematical definition, dependence analysis, legality test, and code generation; A complete suite of techniques for generating SPMD code for a tiled loop nest; Up-to-date results on tile size and shape selection for reducing communication and improving parallelism; End-of-chapter references for further reading. Researchers and practitioners involved in optimizing compilers and students in advanced computer architecture studies will find this a lucid and well-presented reference work with numerous citations to original sources.

Database Solutions - A step by step guide to building databases (Paperback, 2nd edition): Thomas Connolly, Carolyn Begg Database Solutions - A step by step guide to building databases (Paperback, 2nd edition)
Thomas Connolly, Carolyn Begg
R2,184 Discovery Miles 21 840 Ships in 10 - 15 working days

Database Solutions: A step-by-step guide to building databases 2/eAre you responsible for designing and creating the databases that keep your business running? Or are you studying for a module in database design? If so, Database Solutions is for you This fully revised and updated edition will make the database design and build process smoother, quicker and more reliable.Recipe for database success Take one RDMS - any of the major commercial products will do: Oracle, Informix, SQL Server, Access, Paradox Add one thorough reading of Database Solutions if you are an inexperienced database designer, or one recap of the methodology if you are an old hand Use the design and implementation frameworks to plan your timetable, use a common data model that fits your requirements and adapt as necessaryFeatures Includes hints and tips for success with comprehensive guidance on avoiding pitfalls and traps Shows how to create data models using the UML design notation Includes two full-length coded example databases written on Microsoft Access 2002 and Oracle 9i, plus 15 sample data models to adapt to your needs, chosen from seven common business areasNew for this edition New chapters on SQL (St

Database Modeling with Microsoft (R) Visio for Enterprise Architects (Paperback, New): Terry Halpin, Ken Evans, Pat Hallock,... Database Modeling with Microsoft (R) Visio for Enterprise Architects (Paperback, New)
Terry Halpin, Ken Evans, Pat Hallock, Bill Maclean
R2,456 Discovery Miles 24 560 Ships in 10 - 15 working days

This book is for database designers and database administrators using Visio, which is the database component of Microsoft's Visual Studio .NET for Enterprise Architects suite, also included in MSDN subscriptions. This is the only guide to this product that tells DBAs how to get their job done. Although primarily focused on tool features, the book also provides an introduction to data modeling, and includes practical advice on managing database projects. The principal author was the program manager of VEA's database modeling solutions.
.Explains how to model databases with Microsoft(r) Visio for Enterprise Architects (VEA), focusing on tool features.
.Provides a platform-independent introduction to data modeling using both Object Role Modeling (ORM) and Entity Relationship Modeling (ERM), and includes practical advice on managing database projects.
.Additional ORM models, course notes, and add-ins available online."

Security in the Information Society - Visions and Perspectives (Hardcover, 2002 ed.): M.Adeeb Ghonaimy, Mahmoud T. El-Hadidi,... Security in the Information Society - Visions and Perspectives (Hardcover, 2002 ed.)
M.Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan
R4,335 Discovery Miles 43 350 Ships in 18 - 22 working days

Recent advances in technology and new software applications are steadily transforming human civilization into what is called the Information Society. This is manifested by the new terminology appearing in our daily activities. E-Business, E-Government, E-Learning, E-Contracting, and E-Voting are just a few of the ever-growing list of new terms that are shaping the Information Society. Nonetheless, as "Information" gains more prominence in our society, the task of securing it against all forms of threats becomes a vital and crucial undertaking. Addressing the various security issues confronting our new Information Society, this volume is divided into 13 parts covering the following topics: Information Security Management; Standards of Information Security; Threats and Attacks to Information; Education and Curriculum for Information Security; Social and Ethical Aspects of Information Security; Information Security Services; Multilateral Security; Applications of Information Security; Infrastructure for Information Security Advanced Topics in Security; Legislation for Information Security; Modeling and Analysis for Information Security; Tools for Information Security. Security in the Information Society: Visions and Perspectives comprises the proceedings of the 17th International Conference on Information Security (SEC2002), which was sponsored by the International Federation for Information Processing (IFIP), and jointly organized by IFIP Technical Committee 11 and the Department of Electronics and Electrical Communications of Cairo University. The conference was held in May 2002 in Cairo, Egypt. This volume is essential reading for scholars, researchers, and practitioners interested inkeeping pace with the ever-growing field of Information Security.

Smart Service Management - Design Guidelines and Best Practices (Hardcover, 1st ed. 2020): Maria Maleshkova, Niklas Kuhl,... Smart Service Management - Design Guidelines and Best Practices (Hardcover, 1st ed. 2020)
Maria Maleshkova, Niklas Kuhl, Philipp Jussen
R1,918 Discovery Miles 19 180 Ships in 9 - 17 working days

This book presents the main theoretical foundations behind smart services as well as specific guidelines and practically proven methods on how to design them. Furthermore, it gives an overview of the possible implementation architectures and shows how the designed smart services can be realized with specific technologies. Finally, it provides four specific use cases that show how smart services have been realized in practice and what impact they have within the businesses. The first part of the book defines the basic concepts and aims to establish a shared understanding of terms, such as smart services, service systems, smart service systems or cyber-physical systems. On this basis, it provides an analysis of existing work and includes insights on how an organization incorporating smart services could enhance and adjust their management and business processes. The second part on the design of smart services elaborates on what constitutes a successful smart service and describes experiences in the area of interdisciplinary teams, strategic partnerships, the overall service systems and the common data basis. In the third part, technical reference architectures are presented in detail, encompassing topics on the design of digital twins in cyber physical systems, the communication between entities and sensors in the age of Industry 4.0 as well as data management and integration. The fourth part then highlights a number of analytical possibilities that can be realized and that can constitute or be part of smart services, including machine learning and artificial intelligence methods. Finally, the applicability of the introduced design and development method is demonstrated by considering specific real-world use cases. These include services in the industrial and mobility sector, which were developed in direct cooperation with industry partners. The main target audience of this book is industry-focused readers, especially practitioners from industry, who are involved in supporting and managing digital business. These include professionals working in business development, product management, strategy, and development, ranging from middle management to Chief Digital Officers. It conveys all the basics needed for developing smart services and successfully placing them on the market by explaining technical aspects as well as showcasing practical use cases.

Multilevel Modeling - Methodological Advances, Issues, and Applications (Paperback, New edition): Steven P. Reise, Naihua Duan Multilevel Modeling - Methodological Advances, Issues, and Applications (Paperback, New edition)
Steven P. Reise, Naihua Duan
R1,620 Discovery Miles 16 200 Ships in 10 - 15 working days

This book illustrates the current work of leading multilevel modeling (MLM) researchers from around the world.

The book's goal is to critically examine the real problems that occur when trying to use MLMs in applied research, such as power, experimental design, and model violations. This presentation of cutting-edge work and statistical innovations in multilevel modeling includes topics such as growth modeling, repeated measures analysis, nonlinear modeling, outlier detection, and meta analysis.

This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.

Strategic Information Security (Hardcover): John Wylder Strategic Information Security (Hardcover)
John Wylder
R3,088 Discovery Miles 30 880 Ships in 10 - 15 working days

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.

Strategic Information Security integrates the importance of sound security policy with the strategic goals of an organization. It provides IT professionals and management with insight into the issues surrounding the goals of protecting valuable information assets. This text reiterates that an effective information security program relies on more than policies or hardware and software, instead it hinges on having a mindset that security is a core part of the business and not just an afterthought.

Armed with the content contained in this book, security specialists can redirect the discussion of security towards the terms and concepts that management understands. This increases the likelihood of obtaining the funding and managerial support that is needed to build and maintain airtight security programs.

Heterogeneous Information Network Analysis and Applications (Hardcover, 1st ed. 2017): Chuan Shi, Philip S. Yu Heterogeneous Information Network Analysis and Applications (Hardcover, 1st ed. 2017)
Chuan Shi, Philip S. Yu
R4,305 Discovery Miles 43 050 Ships in 10 - 15 working days

This book offers researchers an understanding of the fundamental issues and a good starting point to work on this rapidly expanding field. It provides a comprehensive survey of current developments of heterogeneous information network. It also presents the newest research in applications of heterogeneous information networks to similarity search, ranking, clustering, recommendation. This information will help researchers to understand how to analyze networked data with heterogeneous information networks. Common data mining tasks are explored, including similarity search, ranking, and recommendation. The book illustrates some prototypes which analyze networked data. Professionals and academics working in data analytics, networks, machine learning, and data mining will find this content valuable. It is also suitable for advanced-level students in computer science who are interested in networking or pattern recognition.

Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017):... Verifiable Composition of Signature and Encryption - A Comprehensive Study of the Design Paradigms (Hardcover, 1st ed. 2017)
Laila El Aimani
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.

The Austin Protocol Compiler (Hardcover, 2005 ed.): Tommy M McGuire, Mohamed G Gouda The Austin Protocol Compiler (Hardcover, 2005 ed.)
Tommy M McGuire, Mohamed G Gouda
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol implementors. The main reason for the lack of effective communication between these two groups is that these groups use languages with quite different semantics to specify network protocols. On one hand, the protocol verifiers use specification languages whose semantics are abstract, coarse-grained, and with large atom- ity. Clearly, protocol specifications that are developed based on such semantics are easier to prove correct. On the other hand, the protocol implementors use specification languages whose semantics are concrete, fine-grained, and with small atomicity. Protocol specifications that are developed based on such - mantics are easier to implement using system programming languages such as C, C++, and Java. To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors, we present in this monograph a protocol specification language called the Timed Abstract Protocol (or TAP, for short) notation. This notation is greatly influenced by the Abstract Protocol Notation in the textbook Elements of Network Protocol Design, written by the second author, Mohamed G. Gouda. The TAP notation has two types of sem- tics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics thatappeals to the protocol implementors group.

Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997): Richard Bentley, Uwe... Groupware and the World Wide Web (Hardcover, Reprinted from COMPUTER SUPPORTED COOPERATIVE WORK, 6, 1997)
Richard Bentley, Uwe Busbach, David Kerr, Klaas Sikkel
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The advent of the World Wide Web has changed the perspectives of groupware systems. The interest and deployment of Internet and intranet groupware solutions is growing rapidly, not just in academic circles but also in the commercial arena. The first generation of Web-based groupware tools has already started to emerge, and leading groupware vendors are urgently adapting their products for compatibility and integration with Web technologies. The focus of Groupware and the World Wide Web is to explore the potential for Web-based groupware. This book includes an analysis of the key characteristics of the Web, presenting reasons for its success, and describes developments of a diverse range of Web-based groupware systems. An emphasis on the technical obstacles and challenges is implemented by more analytical discussions and perspectives, including that of Information Technology managers looking to deploy groupware solutions within their organizations. Written by experts from different backgrounds - academic and commercial, technical and organizational - this book provides a unique overview of and insight into current issues and future possibilities concerning extension of the World Wide Web for group working.

Data Science - What the Best Data Scientists Know About Data Analytics, Data Mining, Statistics, Machine Learning, and Big Data... Data Science - What the Best Data Scientists Know About Data Analytics, Data Mining, Statistics, Machine Learning, and Big Data - That You Don't (Hardcover)
Herbert Jones
R667 R596 Discovery Miles 5 960 Save R71 (11%) Ships in 18 - 22 working days
Indian Mujahideen - Computational Analysis and Public Policy (Hardcover, 2013 ed.): V.S. Subrahmanian, Aaron Mannes, Animesh... Indian Mujahideen - Computational Analysis and Public Policy (Hardcover, 2013 ed.)
V.S. Subrahmanian, Aaron Mannes, Animesh Roul, R.K. Raghavan
R3,285 Discovery Miles 32 850 Ships in 10 - 15 working days

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers. Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in describing the way forward. Naresh Chandra, Indian Ambassador to the USA (1996-2001) and Cabinet Secretary (1990-1992). An objective and clinical account of the origins, aims, extra-territorial links and modus-operandi, of a growingly dangerous terrorist organization that challenges the federal, democratic, secular and pluralistic ethos of India s polity. The authors have meticulously researched and analysed the multi-faceted challenges that the Indian Mujahideen poses and realistically dwelt on the ways in which these challenges could be faced and overcome. G. Parthasarathy, High Commissioner of India to Australia (1995-1998) and Pakistan (1998-2000). This book provides the first in-depth look at how advanced mathematics and modern computing technology can influence insights on analysis and policies directed at the Indian Mujahideen (IM) terrorist group. The book also summarizes how the IM group is committed to the destabilization of India by leveraging links with other terror groups such as Lashkar-e-Taiba, and through support from the Pakistani Government and Pakistan s intelligence service.

Foreword by The Hon. Louis J. Freeh."

Invitations to Tender for Facility Management Services - Process Mapping, Service Specifications and Innovative Scenarios... Invitations to Tender for Facility Management Services - Process Mapping, Service Specifications and Innovative Scenarios (Hardcover, 1st ed. 2019)
Cinzia Talamo, Nazly Atta
R2,675 Discovery Miles 26 750 Ships in 18 - 22 working days

This book deals with Invitations to Tender (ITTs) for the provision of Facility Management (FM) services. It presents a framework to support companies in preparing clear, comprehensive and effective ITTs, focusing on such key aspects as: organizational structures, tools and procedures for managing information, allocation of information responsibilities, procedures for services monitoring and control, quality policies, and risk management. It discusses and analyzes a range of basic terms and concepts, procedures, and international standards concerning the Tendering Process, as well as the contents of ITTs, which should represent the translation of information needs into requirements related to: the client's goals, main categories of information to deal with, expected organization of information, modalities of reporting and control, and level of knowledge to be reached. A further major focus is on potential key innovation scenarios concerning current FM practice, such as Sustainable Procurement, Building Information Modeling (BIM), Big Data and Internet of Things (IoT) technologies, highlighting both the possible benefits and the possible risks and implications that could negatively affect the quality of FM service provision if not properly treated within the ITT. The book will be of interest to real estate owners, demand organizations and facility managers, enhancing their ability to prepare, interpret and/or critically analyze ITTs.

Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making... Empowering Open and Collaborative Governance - Technologies and Methods for Online Citizen Engagement in Public Policy Making (Hardcover, 2012 ed.)
Yannis Charalabidis, Sotirios Koussouris
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

The use of information and communication technologies to support public administrations, governments and decision makers has been recorded for more than 20 years and dubbed e-Government. Moving towards open governance roadmaps worldwide, electronic participation and citizen engagement stand out as a new domain, important both for decision makers and citizens; and over the last decade, there have been a variety of related pilot projects and innovative approaches.

With contributions from leading researchers, Charalabidis and Koussouris provide the latest research findings such as theoretical foundations, principles, methodologies, architectures, technical frameworks, cases and lessons learnt within the domain of open, collaborative governance and online citizen engagement. The book is divided into three sections: Section one, "Public Policy Debate Foundations," lays the foundations regarding processes and methods for scoping, planning, evaluating and transforming citizen engagement. The second section, "Information and Communication Technologies for Citizen Participation," details practical approaches to designing and creating collaborative governance infrastructures and citizen participation for businesses and administrations. Lastly, the third section on "Future Research Directions of Open, Collaborative ICT-enabled Governance" provides a constructive critique of the developments in the past and presents prospects regarding future challenges and research directions.

The book is mainly written for academic researchers and graduate students working in the computer, social, political and management sciences. Its audience includes researchers and practitioners in e-Governance, public administration officials, policy and decision makers at the local, national and international level engaged in the design and creation of policies and services, and ICT professionals engaged in e-Governance and policy modelling projects and solutions.

Languages, Compilers and Run-Time Systems for Scalable Computers (Hardcover, 1996 ed.): Boleslaw K. Szymanski, Balaram Sinharoy Languages, Compilers and Run-Time Systems for Scalable Computers (Hardcover, 1996 ed.)
Boleslaw K. Szymanski, Balaram Sinharoy
R4,199 Discovery Miles 41 990 Ships in 18 - 22 working days

Language, Compilers and Run-time Systems for Scalable Computers contains 20 articles based on presentations given at the third workshop of the same title, and 13 extended abstracts from the poster session. Starting with new developments in classical problems of parallel compiler design, such as dependence analysis and an exploration of loop parallelism, the book goes on to address the issues of compiler strategy for specific architectures and programming environments. Several chapters investigate support for multi-threading, object orientation, irregular computation, locality enhancement, and communication optimization. Issues of the interface between language and operating system support are also discussed. Finally, the load balance issues are discussed in different contexts, including sparse matrix computation and iteratively balanced adaptive solvers for partial differential equations. Some additional topics are also discussed in the extended abstracts. Each chapter provides a bibliography of relevant papers and the book can thus be used as a reference to the most up-to-date research in parallel software engineering.

Multilevel Modeling - Methodological Advances, Issues, and Applications (Hardcover): Steven P. Reise, Naihua Duan Multilevel Modeling - Methodological Advances, Issues, and Applications (Hardcover)
Steven P. Reise, Naihua Duan
R4,511 Discovery Miles 45 110 Ships in 10 - 15 working days

This book illustrates the current work of leading multilevel modeling (MLM) researchers from around the world.

The book's goal is to critically examine the real problems that occur when trying to use MLMs in applied research, such as power, experimental design, and model violations. This presentation of cutting-edge work and statistical innovations in multilevel modeling includes topics such as growth modeling, repeated measures analysis, nonlinear modeling, outlier detection, and meta analysis.

This volume will be beneficial for researchers with advanced statistical training and extensive experience in applying multilevel models, especially in the areas of education; clinical intervention; social, developmental and health psychology, and other behavioral sciences; or as a supplement for an introductory graduate-level course.

Artificial Intelligence in IoT (Hardcover, 1st ed. 2019): Fadi Al-Turjman Artificial Intelligence in IoT (Hardcover, 1st ed. 2019)
Fadi Al-Turjman
R3,344 Discovery Miles 33 440 Ships in 10 - 15 working days

This book provides an insight into IoT intelligence in terms of applications and algorithmic challenges. The book is dedicated to addressing the major challenges in realizing the artificial intelligence in IoT-based applications including challenges that vary from cost and energy efficiency to availability to service quality in multidisciplinary fashion. The aim of this book is hence to focus on both the algorithmic and practical parts of the artificial intelligence approaches in IoT applications that are enabled and supported by wireless sensor networks and cellular networks. Targeted readers are from varying disciplines who are interested in implementing the smart planet/environments vision via intelligent wireless/wired enabling technologies. Includes the most up-to-date research and applications related to IoT artificial intelligence (AI); Provides new and innovative operational ideas regarding the IoT artificial intelligence that help advance the telecommunications industry; Presents AI challenges facing the IoT scientists and provides potential ways to solve them in critical daily life issues.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Blockchain Applications in…
Atour Taghipour Hardcover R6,163 Discovery Miles 61 630
Management Of Information Security
Michael Whitman, Herbert Mattord Paperback R1,321 R1,228 Discovery Miles 12 280
Blockchain and AI Technology in the…
Subhendu Kumar Pani, Sian Lun Lau, … Hardcover R6,170 Discovery Miles 61 700
Machine Learning and Data Mining
I Kononenko, M Kukar Paperback R1,903 Discovery Miles 19 030
Temporal Data Mining via Unsupervised…
Yun Yang Paperback R1,173 Discovery Miles 11 730
Open Source Database Driven Web…
Isaac Dunlap Paperback R1,159 Discovery Miles 11 590
Big Data and Smart Service Systems
Xiwei Liu, Rangachari Anand, … Hardcover R1,961 R1,830 Discovery Miles 18 300
Utilizing Blockchain Technologies in…
S. B. Goyal, Nijalingappa Pradeep, … Hardcover R6,170 Discovery Miles 61 700
CompTIA Data+ DA0-001 Exam Cram
Akhil Behl, Sivasubramanian Digital product license key R1,024 Discovery Miles 10 240
Ontologies, Taxonomies and Thesauri in…
Emilia Curras Paperback R1,320 Discovery Miles 13 200

 

Partners