0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (61)
  • R250 - R500 (361)
  • R500+ (14,521)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Advances in Hardware Design and Verification (Hardcover, 1997 ed.): Hon Li, David Probst Advances in Hardware Design and Verification (Hardcover, 1997 ed.)
Hon Li, David Probst
R4,183 Discovery Miles 41 830 Ships in 18 - 22 working days

CHARM '97 is the ninth in a series of working conferences devoted to the development and use of formal techniques in digital hardware design and verification. This series is held in collaboration with IFIP WG 10.5. Previous meetings were held in Europe every other year.

Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition): Rob Wilson Hands-On Ethical Hacking and Network Defense (Paperback, 4th edition)
Rob Wilson
R1,413 R1,305 Discovery Miles 13 050 Save R108 (8%) Ships in 10 - 15 working days

Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors explore the concept of ethical hacking and its practitioners -- explaining their importance in protecting corporate and government data -- and then deliver an in-depth guide to performing security testing. Thoroughly updated, the text covers new security resources, emerging vulnerabilities and innovative methods to protect networks, mobile security considerations, computer crime laws and penalties for illegal computer hacking. A final project brings concepts together in a penetration testing exercise and report, while virtual machine labs, auto-graded quizzes and interactive activities in the online learning platform help further prepare you for your role as a network security professional.

Error-Control Coding for Data Networks (Hardcover, 1999 ed.): Irving S. Reed, Xuemin Chen Error-Control Coding for Data Networks (Hardcover, 1999 ed.)
Irving S. Reed, Xuemin Chen
R4,318 Discovery Miles 43 180 Ships in 18 - 22 working days

The subject of error-control coding bridges several disciplines, in particular mathematics, electrical engineering and computer science. The theory of error-control codes is often described abstractly in mathematical terms only, for the benefit of other coding specialists. Such a theoretical approach to coding makes it difficult for engineers to understand the underlying concepts of error correction, the design of digital error-control systems, and the quantitative behavior of such systems. In this book only a minimal amount of mathematics is introduced in order to describe the many, sometimes mathematical, aspects of error-control coding. The concepts of error correction and detection are in many cases sufficiently straightforward to avoid highly theoretical algebraic constructions. The reader will find that the primary emphasis of the book is on practical matters, not on theoretical problems. In fact, much of the material covered is summarized by examples of real developments, and almost all of the error-correction and detection codes introduced are attached to related practical applications. Error-Control Coding for Data Networks takes a structured approach to channel-coding, starting with the basic coding concepts and working gradually towards the most sophisticated coding systems. The most popular applications are described throughout the book. These applications include the channel-coding techniques used in mobile communication systems, such as: the global system for mobile communications (GSM) and the code-division multiple-access (CDMA) system, coding schemes for High-Definition TeleVision (HDTV) system, the Compact Disk (CD), and Digital Video Disk (DVD), as well as theerror-control protocols for the data-link layers of networks, and much more. The book is compiled carefully to bring engineers, coding specialists, and students up to date in the important modern coding technologies. Both electrical engineering students and communication engineers will benefit from the information in this largely self-contained text on error-control system engineering.

Causal Models and Intelligent Data Management (Hardcover, 1999 ed.): Alex Gammerman Causal Models and Intelligent Data Management (Hardcover, 1999 ed.)
Alex Gammerman
R1,510 Discovery Miles 15 100 Ships in 18 - 22 working days

The need to electronically store, manipulate and analyze large-scale, high-dimensional data sets requires new computational methods. This book presents new intelligent data management methods and tools, including new results from the field of inference. Leading experts also map out future directions of intelligent data analysis. This book will be a valuable reference for researchers exploring the interdisciplinary area between statistics and computer science as well as for professionals applying advanced data analysis methods in industry.

Handbook of Open Source Tools (Hardcover, 2011 ed.): Sandeep Koranne Handbook of Open Source Tools (Hardcover, 2011 ed.)
Sandeep Koranne
R4,418 Discovery Miles 44 180 Ships in 10 - 15 working days

"Handbook of Open Source Tools" introduces a comprehensive collection of advanced open source tools useful in developing software applications. The book contains information on more than 200 open-source tools which include software construction utilities for compilers, virtual-machines, database, graphics, high-performance computing, OpenGL, geometry, algebra, graph theory, GUIs and more. Special highlights for software construction utilities and application libraries are included. Each tool is covered in the context of a real like application development setting. This unique handbook presents a comprehensive discussion of advanced tools, a valuable asset used by most application developers and programmers; includes a special focus on Mathematical Open Source Software not available in most Open Source Software books, and introduces several tools (eg ACL2, CLIPS, CUDA, and COIN) which are not known outside of select groups, but are very powerful.

"Handbook of Open Source Tools "is designed for application developers and programmers working with Open Source Tools. Advanced-level students concentrating on Engineering, Mathematics and Computer Science will find this reference a valuable asset as well.

The Integrated Architecture Framework Explained - Why, What, How (Hardcover, Edition.): Jack Van't Wout, Maarten Waage,... The Integrated Architecture Framework Explained - Why, What, How (Hardcover, Edition.)
Jack Van't Wout, Maarten Waage, Herman Hartman, Max Stahlecker, Aaldert Hofman
R1,786 Discovery Miles 17 860 Ships in 18 - 22 working days

This book captures and communicates the wealth of architecture experience Capgemini has gathered as a member of The Open Group a " a vendor- and technology-neutral consortium formed by major industry players a " in developing, deploying, and using its a oeIntegrated Architecture Frameworka (IAF) since its origination in 1993. Today, many elements of IAF have been incorporated into the new version 9 of TOGAF, the related Open Group standard. The authors, all working on and with IAF for many years, here provide a full reference to IAF and a guide on how to apply it. In addition, they describe in detail the relations between IAF and the architecture standards TOGAF and Archimate and other development or process frameworks like ITIL, CMMI, and RUP. Their presentation is targeted at architects, project managers, and process analysts who have either considered or are already working with IAF a " they will find many roadmaps, case studies, checklists, and tips and advice for their daily work.

Big-Data Analytics and Cloud Computing - Theory, Algorithms and Applications (Hardcover, 1st ed. 2015): Marcello Trovati,... Big-Data Analytics and Cloud Computing - Theory, Algorithms and Applications (Hardcover, 1st ed. 2015)
Marcello Trovati, Richard Hill, Ashiq Anjum, Shao Ying Zhu, Lu Liu
R3,763 Discovery Miles 37 630 Ships in 18 - 22 working days

This book reviews the theoretical concepts, leading-edge techniques and practical tools involved in the latest multi-disciplinary approaches addressing the challenges of big data. Illuminating perspectives from both academia and industry are presented by an international selection of experts in big data science. Topics and features: describes the innovative advances in theoretical aspects of big data, predictive analytics and cloud-based architectures; examines the applications and implementations that utilize big data in cloud architectures; surveys the state of the art in architectural approaches to the provision of cloud-based big data analytics functions; identifies potential research directions and technologies to facilitate the realization of emerging business models through big data approaches; provides relevant theoretical frameworks, empirical research findings, and numerous case studies; discusses real-world applications of algorithms and techniques to address the challenges of big datasets.

Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.): Konstantinos Markantonakis, Keith Mayes Secure Smart Embedded Devices, Platforms and Applications (Hardcover, 2014 ed.)
Konstantinos Markantonakis, Keith Mayes
R5,927 Discovery Miles 59 270 Ships in 18 - 22 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Optimization of Automated Software Testing Using Meta-Heuristic Techniques (Hardcover, 1st ed. 2022): Manju Khari, Deepti Bala... Optimization of Automated Software Testing Using Meta-Heuristic Techniques (Hardcover, 1st ed. 2022)
Manju Khari, Deepti Bala Mishra, Biswa Ranjan Acharya, Ruben Gonzalez Crespo
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

This book provides awareness of different evolutionary methods used for automatic generation and optimization of test data in the field of software testing. While the book highlights on the foundations of software testing techniques, it also focuses on contemporary topics for research and development. This book covers the automated process of testing in different levels like unit level, integration level, performance level, evaluation of testing strategies, testing in security level, optimizing test cases using various algorithms, and controlling and monitoring the testing process etc. This book aids young researchers in the field of optimization of automated software testing, provides academics with knowledge on the emerging field of AI in software development, and supports universities, research centers, and industries in new projects using AI in software testing. Supports the advancement in the artificial intelligence used in software development; Advances knowledge on artificial intelligence based metaheuristic approach in software testing; Encourages innovation in traditional software testing field using recent artificial intelligence. *

Whatever Shines Should be Observed - [quicquid nitet notandum] (Hardcover, New ed): Susan M.P. McKenna-Lawlor Whatever Shines Should be Observed - [quicquid nitet notandum] (Hardcover, New ed)
Susan M.P. McKenna-Lawlor
R2,655 Discovery Miles 26 550 Ships in 18 - 22 working days

It is good to mark the new Millennium by looking back as well as forward. Whatever Shines Should Be Observed looks to the nineteenth century to celebrate the achievements of five distinguished women, four of whom were born in Ireland while the fifth married into an Irish family, who made pioneering contributions to photography, microscopy, astronomy and astrophysics.

The women featured came from either aristocratic or professional families. Thus, at first sight, they had many material advantages among their peers. In the ranks of the aristocracy there was often a great passion for learning, and the mansions in which these families lived contained libraries, technical equipment (microscopes and telescopes) and collections from the world of nature. More modest professional households of the time were rich in books, while activities such as observing the stars, collecting plants etc. typically formed an integral part of the children's education.

To balance this it was the prevailing philosophy that boys could learn, in addition to basic subjects, mathematics, mechanics, physics, chemistry and classical languages, while girls were channelled into 'polite' subjects like music and needlework. This arrangement allowed boys to progress to University should they so wish, where a range of interesting career choices (including science and engineering) was open to them. Girls, on the other hand, usually received their education at home, often under the tutelage of a governess who would not herself had had any serious contact with scientific or technical subjects. In particular, progress to University was not during most of the nineteenth century an option for women, and access toscientific libraries and institutions was also prohibited.

Although those women with aristocratic and professional backgrounds were in a materially privileged position and had an opportunity to 'see' through the activities of their male friends and relatives how professional scientific life was lived, to progress from their places in society to the professions required very special determination. Firstly, they had to individually acquire scientific and technical knowledge, as well as necessary laboratory methodology, without the advantage of formal training. Then, it was necessary to carve out a niche in a particular field, despite the special difficulties attending the publication of scientific books or articles by a woman. There was no easy road to science, or even any well worn track. To achieve recognition was a pioneering activity without discernible ground rules.

With the hindsight of history, we recognise that the heroic efforts which the women featured in this volume made to overcome the social constraints that held them back from learning about, and participating in, scientific and technical subjects, had a consequence on a much broader canvas. In addition to what they each achieved professionally they contributed within society to a gradual erosion of those barriers raised against the participation of women in academic life, thereby assisting in allowing University places and professional opportunities to gradually become generally available. It is a privilege to salute and thank the wonderful women of the nineteenth century herein described for what they have contributed to the women of today. William Herschel's famous motto quicquid nitet notandum (whatever shinesshould be observed) applies in a particular way to the luminous quality of their individual lives, and those of us who presently observe their shining, as well as those who now wait in the wings of the coming centuries to emerge upon the scene, can each see a little further by their light.

Neural Approaches to Conversational Information Retrieval (Hardcover, 1st ed. 2023): Jianfeng Gao, Chenyan Xiong, Paul Bennett,... Neural Approaches to Conversational Information Retrieval (Hardcover, 1st ed. 2023)
Jianfeng Gao, Chenyan Xiong, Paul Bennett, Nick Craswell
R4,247 Discovery Miles 42 470 Ships in 18 - 22 working days

This book surveys recent advances in Conversational Information Retrieval (CIR), focusing on neural approaches that have been developed in the last few years. Progress in deep learning has brought tremendous improvements in natural language processing (NLP) and conversational AI, leading to a plethora of commercial conversational services that allow naturally spoken and typed interaction, increasing the need for more human-centric interactions in IR. The book contains nine chapters. Chapter 1 motivates the research of CIR by reviewing the studies on how people search and subsequently defines a CIR system and a reference architecture which is described in detail in the rest of the book. Chapter 2 provides a detailed discussion of techniques for evaluating a CIR system – a goal-oriented conversational AI system with a human in the loop. Then Chapters 3 to 7 describe the algorithms and methods for developing the main CIR modules (or sub-systems). In Chapter 3, conversational document search is discussed, which can be viewed as a sub-system of the CIR system. Chapter 4 is about algorithms and methods for query-focused multi-document summarization. Chapter 5 describes various neural models for conversational machine comprehension, which generate a direct answer to a user query based on retrieved query-relevant documents, while Chapter 6 details neural approaches to conversational question answering over knowledge bases, which is fundamental to the knowledge base search module of a CIR system. Chapter 7 elaborates various techniques and models that aim to equip a CIR system with the capability of proactively leading a human-machine conversation. Chapter 8 reviews a variety of commercial systems for CIR and related tasks. It first presents an overview of research platforms and toolkits which enable scientists and practitioners to build conversational experiences, and continues with historical highlights and recent trends in a range of application areas. Chapter 9 eventually concludes the book with a brief discussion of research trends and areas for future work. The primary target audience of the book are the IR and NLP research communities. However, audiences with another background, such as machine learning or human-computer interaction, will also find it an accessible introduction to CIR.

Enterprise Content Management in Information Systems Research - Foundations, Methods and Cases (Hardcover, 2014 ed.): Jan Vom... Enterprise Content Management in Information Systems Research - Foundations, Methods and Cases (Hardcover, 2014 ed.)
Jan Vom Brocke, Alexander Simons
R4,202 R3,402 Discovery Miles 34 020 Save R800 (19%) Ships in 10 - 15 working days

This book collects ECM research from the academic discipline of Information Systems and related fields to support academics and practitioners who are interested in understanding the design, use and impact of ECM systems. It also provides a valuable resource for students and lecturers in the field.

Enterprise content management in Information Systems research Foundations, methods and cases consolidates our current knowledge on how today s organizations can manage their digital information assets. The business challenges related to organizational information management include reducing search times, maintaining information quality, and complying with reporting obligations and standards. Many of these challenges are well-known in information management, but because of the vast quantities of information being generated today, they are more difficult to deal with than ever. Many companies use the term enterprise content management (ECM) to refer to the management of all forms of information, especially unstructured information. While ECM systems promise to increase and maintain information quality, to streamline content-related business processes, and to track the lifecycle of information, their implementation poses several questions and challenges: Which content objects should be put under the control of the ECM system? Which processes are affected by the implementation? How should outdated technology be replaced? Research is challenged to support practitioners in answering these questions."

Data Mining for Business Applications (Hardcover, 2009 ed.): Longbing Cao, Philip S. Yu, Chengqi Zhang, Huaifeng Zhang Data Mining for Business Applications (Hardcover, 2009 ed.)
Longbing Cao, Philip S. Yu, Chengqi Zhang, Huaifeng Zhang
R2,822 Discovery Miles 28 220 Ships in 18 - 22 working days

Data Mining for Business Applications presents the state-of-the-art research and development outcomes on methodologies, techniques, approaches and successful applications in the area. The contributions mark a paradigm shift from data-centered pattern mining to domain driven actionable knowledge discovery for next-generation KDD research and applications. The contents identify how KDD techniques can better contribute to critical domain problems in theory and practice, and strengthen business intelligence in complex enterprise applications. The volume also explores challenges and directions for future research and development in the dialogue between academia and business."

Flexibility Measurement in Production Systems - Handling Uncertainties in Industrial Production (Hardcover, 2011 ed.): Sven... Flexibility Measurement in Production Systems - Handling Uncertainties in Industrial Production (Hardcover, 2011 ed.)
Sven Rogalski
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

The requirements for production systems are constantly changing as a result of changing competitive conditions. This poses a challenge for manufacturers in the various branches of industry and creates an ever-increasing need for flexibility.

With this as a background, this book explores the current developments and trends as well as their impact on today's production systems. It also compares known strategies, concepts and methods used to achieve production flexibility. Similarly, the practical knowledge and current research will be drawn upon and subjected to a sound scientific analysis, through which the technical and organizational flexibility ranges can be measured in their application in a production system. The convenience and usefulness of this concept for manufacturers is substantiated by its implementation in a software tool called ecoFLEX and its practical application, based on extensive examples. This illustrates how flexibility flaws can be quickly identified, classified and properly disposed of using ecoFLEX. This tool helps to close the gap between ERP / PPS systems and digital factory planning tools.

Big Data Analytics for Smart and Connected Cities (Hardcover): Nilanjan Dey, Sharvari Tamane Big Data Analytics for Smart and Connected Cities (Hardcover)
Nilanjan Dey, Sharvari Tamane
R5,579 Discovery Miles 55 790 Ships in 18 - 22 working days

To continue providing people with safe, comfortable, and affordable places to live, cities must incorporate techniques and technologies to bring them into the future. The integration of big data and interconnected technology, along with the increasing population, will lead to the necessary creation of smart cities. Big Data Analytics for Smart and Connected Cities is a pivotal reference source that provides vital research on the application of the integration of interconnected technologies and big data analytics into the creation of smart cities. While highlighting topics such as energy conservation, public transit planning, and performance measurement, this publication explores technology integration in urban environments as well as the methods of planning cities to implement these new technologies. This book is ideally designed for engineers, professionals, researchers, and technology developers seeking current research on technology implementation in urban settings.

Malware Detection (Hardcover, 2007 ed.): Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang Malware Detection (Hardcover, 2007 ed.)
Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang
R7,803 Discovery Miles 78 030 Ships in 18 - 22 working days

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains cutting-edge behavior-based techniques to analyze and detect obfuscated malware. The book analyzes current trends in malware activity online, including botnets and malicious code for profit, and it proposes effective models for detection and prevention of attacks using. Furthermore, the book introduces novel techniques for creating services that protect their own integrity and safety, plus the data they manage.

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.): Peng Ning, Sushil Jajodia,... Intrusion Detection in Distributed Systems - An Abstraction-Based Approach (Hardcover, 2004 ed.)
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
R1,490 Discovery Miles 14 900 Ships in 18 - 22 working days

Intrusion detection systems (IDS) are usually deployed along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection complements the protective mechanisms to improve the system security. Moreover, even if the preventive security mechanisms can protect information systems successfully, it is still desirable to know what intrusions have happened or are happening, so that the users can understand the security threats and risks and thus be better prepared for future attacks. Intrusion detection techniques are traditionally categorized into two classes: anomaly detection and misuse detection. Anomaly detection is based on the normal behavior of a subject (a user or a system); any action that significantly deviates from the normal behaviour is considered intrusive. Misuse detection catches intrusions in terms of characteristics of known attacks or system vulnerabilities; any action that conforms to the pattern of known attack or vulnerability is considered intrusive. and network based IDSs according to the source of the audit information used by each IDS. Host-based IDSs get audit data from host audit trails and usually aim at detecting attacks against a single host; distributed IDSs gather audit data from multiple hosts and possibly the network and connects the hosts, aiming at detecting attacks involving multiple hosts; network-based IDSs use network traffic as the audit data source, relieving the burden on the hosts that usually provide normal computing services. Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribution is an abstraction-based approach to addressing heterogeneity and autonomy of distributed environments. The second contribution is a formal framework for modelling requests among co-operative IDSs and its application to Common Intrusion Detection Framework (CIDF). The third contribution is a novel approach to coordinating different IDSs for distributed event correlation.

Industry 4.0 and the Digital Transformation of International Business (Hardcover, 1st ed. 2023): Gurinder Singh, Richa Goel,... Industry 4.0 and the Digital Transformation of International Business (Hardcover, 1st ed. 2023)
Gurinder Singh, Richa Goel, Vikas Garg
R4,322 Discovery Miles 43 220 Ships in 10 - 15 working days

The book throws light on the ongoing trends in international business, integration of information technology with global businesses, its role in value co-creation, resource integration, and service for service exchange. While discussing the issues of these areas, chapters of this book also delve into prevalent problematic areas which are closely related like employment, ethical aspects, power creation, and so on. Recognizing the role digitization and new technologies play in enabling global managers to communicate with outside world directly via digital channels irrespective of their location (which is especially true in time of COVID-19), the book takes an emerging economy perspective and throws light on new theories, perceptions, employment opportunities, and innovative ideas through its content. The book not only discusses effects of information technology but also the latest emerging technology in global business like use of artificial intelligence, robotics, machine learning, big data, and their integration with the global business 4.0. Since emergence of these new technologies requires proper infrastructural development, the book also throws light on government initiatives and CSR in this respect. It contains takeaways for both undergraduate and graduate students, researchers and academicians, industry watchers, practitioners, start-ups, and entrepreneurs

Match Analysis - How to Use Data in Professional Sport (Paperback): Daniel Memmert Match Analysis - How to Use Data in Professional Sport (Paperback)
Daniel Memmert
R1,254 Discovery Miles 12 540 Ships in 9 - 17 working days

First book to examine game analysis, modern didactic reflections on learning, and big data in a key topic in science and society today. Provides understanding on how to use game analysis when applied to different sports and how to use the approach for video, event and positional data. Presents translational work that has implications for academics, programmers and applied practitioners.

Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on... Information Security Management & Small Systems Security - IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security September 30-October 1, 1999, Amsterdam, The Netherlands (Hardcover, 1999 ed.)
Jan H.P. Eloff, Les Labuschagne, Rossouw von Solms, Jan Verschuren
R4,146 Discovery Miles 41 460 Ships in 18 - 22 working days

The 7th Annual Working Conference of ISMSSS (lnformation Security Management and Small Systems Security), jointly presented by WG 11.1 and WG 11.2 of the International Federation for Information Processing {IFIP), focuses on various state-of-art concepts in the two relevant fields. The conference focuses on technical, functional as well as managerial issues. This working conference brings together researchers and practitioners of different disciplines, organisations, and countries, to discuss the latest developments in (amongst others) secure techniques for smart card technology, information security management issues, risk analysis, intranets, electronic commerce protocols, certification and accreditation and biometrics authentication. W e are fortunate to have attracted at least six highly acclaimed international speakers to present invited lectures, which will set the platform for the reviewed papers. Invited speakers will talk on a broad spectrum of issues, all related to information security management and small system security issues. These talks cover new perspectives on secure smart card systems, the role of BS7799 in certification, electronic commerce and smart cards, iris biometrics and many more. AH papers presented at this conference were reviewed by a minimum of two international reviewers. W e wish to express our gratitude to all authors of papers and the international referee board. W e would also like to express our appreciation to the organising committee, chaired by Leon Strous, for aU their inputs and arrangements.

Doing Social Research and Publishing Results - A Guide to Non-native English Speakers (Hardcover, 1st ed. 2022): Candauda... Doing Social Research and Publishing Results - A Guide to Non-native English Speakers (Hardcover, 1st ed. 2022)
Candauda Arachchige Saliya
R3,368 Discovery Miles 33 680 Ships in 18 - 22 working days

This book provides a guide to such budding social researchers, who are non-native English speakers drawing examples from literature to show how to conduct a research, present research results, integrate with existing literature to draw conclusions through real-world examples. Existing English books teaching research methods and philosophy of academic research are written in 'academic English' and, it is hard for non-native English-speaking budding researchers to study and understand those books. Also, this book uses examples to show how to communicate with journal editors and peer reviewers to get published the research results as journal articles, book chapters or conference papers. This book connects different quantitative techniques, qualitative methodologies (case studies, phenomenology and ethnography and Grounded theory) as well as Mixed methods methodology through a single example. This book attempts to describe a holistic approach introducing a 10Ps model that incorporates the essential elements of the research process. The process focuses on combining philosophical framework and arguments from research results. This book focuses not only on conducting a research project, but also on the approach and procedures to be followed to achieve higher marks for course work assignments and publishing research articles in international journals. This book shows how to create many papers from one research/data set to increase number of publications and citations. This book has fewer words and more illustrations, tables, figures, pictures and YouTube tutorial links. This book outlines how to present test results in APA style for all the statistical test used in this book, using examples.

Mobile Computation with Functions (Hardcover, 2002 ed.): Zeliha Dilsun Kirli Mobile Computation with Functions (Hardcover, 2002 ed.)
Zeliha Dilsun Kirli
R2,730 Discovery Miles 27 300 Ships in 18 - 22 working days

The advanced state of computer networking and telecommunications technology makes it possible to view computers as parts of a global computation platform, sharing their resources in terms of hardware, software and data. The possibility of exploiting the resources on a global scale has given rise to a new paradigm - the mobile computation paradigm - for computation in large scale distributed networks. The key characteristic of this paradigm is to give programmers control over the mobility of code or active computations across the network by providing appropriate language features. The dynamism and flexibility offered by mobile computation however, brings about a set of problems, the most challenging of which are relevant to safety and security. Several recent experiences prove that identifying the causes of these problems usually requires a rigorous investigation using formal methods.

Functional languages are known for their well-understood computational models and their amenability to formal reasoning. They also have strong expressive power due to higher-order features. Functions can flow from one program point to another as other first-class values. These facts suggest that functional languages can provide the core of mobile computation language. Functions that represent mobile agents and formal systems for reasoning about functional programs can be further exploited to reason about the behavior of agents.

Mobile Computation with Functions explores distributed computation with languages which adopt functions as the main programming abstraction and support code mobility through the mobility of functions between remote sites. It aims to highlight the benefits of using languages of this family in dealing with the challenges of mobile computation. The possibility of exploiting existing static analysis techniques suggests that having functions at the core of mobile code language is a particularly apt choice. A range of problems which have impact on the safety, security and performance are discussed. It is shown that types extended with effects and other annotations can capture a significant amount of information about the dynamic behavior of mobile functions, and offer solutions to the problems under investigation. This book includes a survey of the languages Concurrent ML, Facile and PLAN which inherit the strengths of the functional paradigm in the context of concurrent and distributed computation. The languages which are defined in the subsequent chapters have their roots in these languages.

Mobile Computation with Functions is designed to meet the needs of a professional audience composed of researchers and practitioners in industry and graduate level students in Computer Science.

Practical Longitudinal Data Analysis (Hardcover, Softcover Repri): David J. Hand Practical Longitudinal Data Analysis (Hardcover, Softcover Repri)
David J. Hand
R5,486 Discovery Miles 54 860 Ships in 10 - 15 working days

This text describes regression-based approaches to analyzing longitudinal and repeated measures data. It emphasizes statistical models, discusses the relationships between different approaches, and uses real data to illustrate practical applications. It uses commercially available software when it exists and illustrates the program code and output. The data appendix provides many real data sets-beyond those used for the examples-which can serve as the basis for exercises.

A VLSI Architecture for Concurrent Data Structures (Hardcover, 1987 ed.): J W Dally A VLSI Architecture for Concurrent Data Structures (Hardcover, 1987 ed.)
J W Dally
R4,150 Discovery Miles 41 500 Ships in 18 - 22 working days

Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support concurrent data structures. Concurrent Smalltalk (CST), a derivative of Smalltalk-80 with extensions for concurrency, is developed to describe concurrent data structures. CST allows the programmer to specify objects that are distributed over the nodes of a concurrent computer. These distributed objects have many constituent objects and thus can process many messages simultaneously. They are the foundation upon which concurrent data structures are built. The balanced cube is a concurrent data structure for ordered sets. The set is distributed by a balanced recursive partition that maps to the subcubes of a binary 7lrcube using a Gray code. A search algorithm, VW search, based on the distance properties of the Gray code, searches a balanced cube in O(log N) time. Because it does not have the root bottleneck that limits all tree-based data structures to 0(1) concurrency, the balanced cube achieves 0C.: N) con currency. Considering graphs as concurrent data structures, graph algorithms are pre sented for the shortest path problem, the max-flow problem, and graph parti tioning. These algorithms introduce new synchronization techniques to achieve better performance than existing algorithms."

Mathematical Pictures at a Data Science Exhibition (Paperback): Simon Foucart Mathematical Pictures at a Data Science Exhibition (Paperback)
Simon Foucart
R1,215 Discovery Miles 12 150 Ships in 10 - 15 working days

This text provides deep and comprehensive coverage of the mathematical background for data science, including machine learning, optimal recovery, compressed sensing, optimization, and neural networks. In the past few decades, heuristic methods adopted by big tech companies have complemented existing scientific disciplines to form the new field of Data Science. This text embarks the readers on an engaging itinerary through the theory supporting the field. Altogether, twenty-seven lecture-length chapters with exercises provide all the details necessary for a solid understanding of key topics in data science. While the book covers standard material on machine learning and optimization, it also includes distinctive presentations of topics such as reproducing kernel Hilbert spaces, spectral clustering, optimal recovery, compressed sensing, group testing, and applications of semidefinite programming. Students and data scientists with less mathematical background will appreciate the appendices that provide more background on some of the more abstract concepts.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Understanding and Managing Fluency…
Santosh Maruthy, Pallavi Kelkar Paperback R1,162 Discovery Miles 11 620
Language and Schizophrenia…
Valentina Cardella Paperback R1,525 Discovery Miles 15 250
Infant Pathways to Language - Methods…
John Colombo, Peggy McCardle, … Paperback R1,130 Discovery Miles 11 300
The Routledge International Handbook of…
Jackie Guendouzi, Filip Loncke, … Hardcover R6,366 Discovery Miles 63 660
Communication Disorders Following…
Skye McDonald, Chris Code, … Paperback R1,821 Discovery Miles 18 210
Social Communication Development and…
Deborah A Hwa-Froelich Paperback R1,626 Discovery Miles 16 260
Clinical Cases in Dysfluency
Kurt Eggers, Margaret Leahy Paperback R918 Discovery Miles 9 180
Modeling Sensorineural Hearing Loss
Walt Jesteadt Paperback R1,694 Discovery Miles 16 940
Words and Things: Cognitive…
Marlene Behrmann, Karalyn Patterson Paperback R996 R864 Discovery Miles 8 640
Cognition and Acquired Language…
Richard K. Peach, Lewis P. Shapiro Paperback R2,658 Discovery Miles 26 580

 

Partners