0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (70)
  • R250 - R500 (373)
  • R500+ (14,475)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases

Data Analysis for Business Decision Making - A Laboratory Notebook (Paperback, 2nd Revised edition): Andres Fortino Data Analysis for Business Decision Making - A Laboratory Notebook (Paperback, 2nd Revised edition)
Andres Fortino
R1,213 R1,011 Discovery Miles 10 110 Save R202 (17%) Ships in 18 - 22 working days

This laboratory manual is intended for business analysts who wish to increase their skills in the use of statistical analysis to support business decisions. Most of the case studies use Excel,today's most common analysis tool. They range from the most basic descriptive analytical techniques to more advanced techniques such as linear regression and forecasting. Advanced projects cover inferential statistics for continuous variables (t-Test) and categorical variables (chi-square), as well as A/B testing. The manual ends with techniques to deal with the analysis of text data and tools to manage the analysis of large data sets (Big Data) using Excel. Includes companion files with solution spreadsheets, sample files, data sets, etc. from the book. Features: Teaches the statistical analysis skills needed to support business decisions Provides projects ranging from the most basic descriptive analytical techniques to more advanced techniques such as linear regression, forecasting, inferential statistics, and analyzing big data sets Includes companion files with solution spreadsheets, sample files, data sets, etc. used in the book's case studies

Hierarchical Scheduling in Parallel and Cluster Systems (Hardcover, 2003 ed.): Sivarama Dandamudi Hierarchical Scheduling in Parallel and Cluster Systems (Hardcover, 2003 ed.)
Sivarama Dandamudi
R4,157 Discovery Miles 41 570 Ships in 18 - 22 working days

Multiple processor systems are an important class of parallel systems. Over the years, several architectures have been proposed to build such systems to satisfy the requirements of high performance computing. These architectures span a wide variety of system types. At the low end of the spectrum, we can build a small, shared-memory parallel system with tens of processors. These systems typically use a bus to interconnect the processors and memory. Such systems, for example, are becoming commonplace in high-performance graph ics workstations. These systems are called uniform memory access (UMA) multiprocessors because they provide uniform access of memory to all pro cessors. These systems provide a single address space, which is preferred by programmers. This architecture, however, cannot be extended even to medium systems with hundreds of processors due to bus bandwidth limitations. To scale systems to medium range i. e., to hundreds of processors, non-bus interconnection networks have been proposed. These systems, for example, use a multistage dynamic interconnection network. Such systems also provide global, shared memory like the UMA systems. However, they introduce local and remote memories, which lead to non-uniform memory access (NUMA) architecture. Distributed-memory architecture is used for systems with thousands of pro cessors. These systems differ from the shared-memory architectures in that there is no globally accessible shared memory. Instead, they use message pass ing to facilitate communication among the processors. As a result, they do not provide single address space."

Foundations and Advances in Data Mining (Hardcover, 2005 ed.): Wesley Chu, Tsau Young Lin Foundations and Advances in Data Mining (Hardcover, 2005 ed.)
Wesley Chu, Tsau Young Lin
R4,055 Discovery Miles 40 550 Ships in 18 - 22 working days

With the growing use of information technology and the recent advances in web systems, the amount of data available to users has increased exponentially. Thus, there is a critical need to understand the content of the data. As a result, data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. In this carefully edited volume a theoretical foundation as well as important new directions for data-mining research are presented. It brings together a set of well respected data mining theoreticians and researchers with practical data mining experiences. The presented theories will give data mining practitioners a scientific perspective in data mining and thus provide more insight into their problems, and the provided new data mining topics can be expected to stimulate further research in these important directions.

Theoretical Advances in Neural Computation and Learning (Hardcover, 1994 ed.): Vwani Roychowdhury, Kai-Yeung Siu, Alon Orlitsky Theoretical Advances in Neural Computation and Learning (Hardcover, 1994 ed.)
Vwani Roychowdhury, Kai-Yeung Siu, Alon Orlitsky
R4,253 Discovery Miles 42 530 Ships in 18 - 22 working days

Theoretical Advances in Neural Computation and Learning brings together in one volume some of the recent advances in the development of a theoretical framework for studying neural networks. A variety of novel techniques from disciplines such as computer science, electrical engineering, statistics, and mathematics have been integrated and applied to develop ground-breaking analytical tools for such studies. This volume emphasizes the computational issues in artificial neural networks and compiles a set of pioneering research works, which together establish a general framework for studying the complexity of neural networks and their learning capabilities. This book represents one of the first efforts to highlight these fundamental results, and provides a unified platform for a theoretical exploration of neural computation. Each chapter is authored by a leading researcher and/or scholar who has made significant contributions in this area. Part 1 provides a complexity theoretic study of different models of neural computation. Complexity measures for neural models are introduced, and techniques for the efficient design of networks for performing basic computations, as well as analytical tools for understanding the capabilities and limitations of neural computation are discussed. The results describe how the computational cost of a neural network increases with the problem size. Equally important, these results go beyond the study of single neural elements, and establish to computational power of multilayer networks. Part 2 discusses concepts and results concerning learning using models of neural computation. Basic concepts such as VC-dimension and PAC-learning are introduced, and recentresults relating neural networks to learning theory are derived. In addition, a number of the chapters address fundamental issues concerning learning algorithms, such as accuracy and rate of convergence, selection of training data, and efficient algorithms for learning useful classes of mappings.

Data Acquisition Handbook (Hardcover): Conor Suarez Data Acquisition Handbook (Hardcover)
Conor Suarez
R3,135 R2,838 Discovery Miles 28 380 Save R297 (9%) Ships in 18 - 22 working days
Enterprise Information Systems III (Hardcover, 2002 ed.): Joaquim Filipe, B. Sharp, P. Miranda Enterprise Information Systems III (Hardcover, 2002 ed.)
Joaquim Filipe, B. Sharp, P. Miranda
R4,197 Discovery Miles 41 970 Ships in 18 - 22 working days

The purpose of the 3rd International Conference on Enterprise Information Systems (ICEIS) was to bring together researchers, engineers, and practitioners interested in the advances and business applications of information systems. The research papers published here have been carefully selected from those presented at the conference, and focus on real world applications covering four main themes: database and information systems integration; artificial intelligence and decision support systems; information systems analysis and specification; and internet computing and electronic commerce.

Audience: This book will be of interest to information technology professionals, especially those working on systems integration, databases, decision support systems, or electronic commerce. It will also be of use to middle managers who need to work with information systems and require knowledge of current trends in development methods and applications.

Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on... Communications and Multimedia Security Issues of the New Century - IFIP TC6 / TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) May 21-22, 2001, Darmstadt, Germany (Hardcover, 2001 ed.)
Ralf Steinmetz, Jana Dittmann, Martin Steinebach
R5,380 Discovery Miles 53 800 Ships in 18 - 22 working days

The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance."

Aspects of Electronic Health Record Systems (Hardcover, 2nd ed. 2006): H. Pardes Aspects of Electronic Health Record Systems (Hardcover, 2nd ed. 2006)
H. Pardes; Edited by Harold P. Lehmann, Patricia A. Abbott, Nancy K Roderer, Adam Rothschild, …
R2,737 Discovery Miles 27 370 Ships in 18 - 22 working days

As adoption of Electronic Health Record Systems (EHR-Ss) shifts from early adopters to mainstream, an increasingly large group of decision makers must assess what they want from EHR-Ss and how to go about making their choices. The purpose of this book is to inform that decision. This book explains typical needs of a variety of stakeholders, describes current and imminent technologies, and assesses the available evidence regarding issues in implementing and using EHR-Ss.

Divided into four important sections--Needs, Current State, Technology, and Going Forward--the book provides the background and general notions regarding the EHRS and lays out the framework; delves into the historical review; presents a high-level view of EHR systems, focused on the needs of different stakeholders in the health care and the health enterprise; offers practical views of existing systems and current (and short-term future) issues in specifying a EHR system and deciding how to approach the institution of such a system; deals with technology issues, from front- to back-end; and describes where we are and where we should be going with EHR systems.

Designed for use by chief information officers, chief medical informatics officers, medical liaisons to hospital systems, private practitioners, and business managers at academic and non-academic hospitals, care management organizations, and practices. The book could be used in any medical or health informatics course, at any level (undergrad, fellowship, MBA).

Verification of Business Rules Programs (Hardcover, 2014 ed.): Bruno Berstel-Da Silva Verification of Business Rules Programs (Hardcover, 2014 ed.)
Bruno Berstel-Da Silva
R2,939 R1,903 Discovery Miles 19 030 Save R1,036 (35%) Ships in 10 - 15 working days

Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs. This book is on business rules programs, that is, rule programs as handled in business rules management systems. Its conceptual contribution is to present the foundation for treating business rules as a topic of scientific investigation in semantics and program verification, while its technical contribution is to present an approach to the formal verification of business rules programs. The author proposes a method for proving correctness properties for a business rules program in a compositional way, meaning that the proof of a correctness property for a program is built up from correctness properties for the individual rules-thus bridging a gap between the intuitive understanding of rules and the formal semantics of rule programs. With this approach the author enables rule authors and tool developers to understand, express formally, and prove properties of the execution behavior of business rules programs. This work will be of interest to practitioners and researchers in the areas of program verification, enterprise computing, database management, and artificial intelligence.

Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and... Integrity and Internal Control in Information Systems - IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 19-20, 1998 (Hardcover, 1998 ed.)
Sushil Jajodia, William List, Graeme W. McGregor, Leon A. M. Strous
R5,302 Discovery Miles 53 020 Ships in 18 - 22 working days

Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specialists so that both may work more effectively together to assist in creating effective business systems in the future. Building on the issues presented in the preceding volume of this series, this book seeks further answers to the following questions: What precisely do business managers need in order to have confidence in the integrity of their information systems and their data? What is the status quo of research and development in this area? Where are the gaps between business needs on the one hand and research/development on the other; what needs to be done to bridge these gaps? Integrity and Internal Control in Information Systems contains the selected proceedings of the Second Working Conference on Integrity and Internal Control in Information Systems, sponsored by the International Federation for Information Processing (IFIP) and held in Warrenton, Virginia, USA, in November 1998. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and edp-auditing.

Big Data for Remote Sensing: Visualization, Analysis and Interpretation - Digital Earth and Smart Earth (Hardcover, 1st ed.... Big Data for Remote Sensing: Visualization, Analysis and Interpretation - Digital Earth and Smart Earth (Hardcover, 1st ed. 2019)
Nilanjan Dey, Chintan Bhatt, Amira S. Ashour
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book thoroughly covers the remote sensing visualization and analysis techniques based on computational imaging and vision in Earth science. Remote sensing is considered a significant information source for monitoring and mapping natural and man-made land through the development of sensor resolutions that committed different Earth observation platforms. The book includes related topics for the different systems, models, and approaches used in the visualization of remote sensing images. It offers flexible and sophisticated solutions for removing uncertainty from the satellite data. It introduces real time big data analytics to derive intelligence systems in enterprise earth science applications. Furthermore, the book integrates statistical concepts with computer-based geographic information systems (GIS). It focuses on image processing techniques for observing data together with uncertainty information raised by spectral, spatial, and positional accuracy of GPS data. The book addresses several advanced improvement models to guide the engineers in developing different remote sensing visualization and analysis schemes. Highlights on the advanced improvement models of the supervised/unsupervised classification algorithms, support vector machines, artificial neural networks, fuzzy logic, decision-making algorithms, and Time Series Model and Forecasting are addressed. This book guides engineers, designers, and researchers to exploit the intrinsic design remote sensing systems. The book gathers remarkable material from an international experts' panel to guide the readers during the development of earth big data analytics and their challenges.

Data Mining and Knowledge Discovery for Big Data - Methodologies, Challenge and Opportunities (Hardcover, 2014 ed.): Wesley W... Data Mining and Knowledge Discovery for Big Data - Methodologies, Challenge and Opportunities (Hardcover, 2014 ed.)
Wesley W Chu
R4,498 R3,428 Discovery Miles 34 280 Save R1,070 (24%) Ships in 10 - 15 working days

The field of data mining has made significant and far-reaching advances over the past three decades.Because of its potential power for solving complex problems, data mining has been successfully applied to diverse areas such as business, engineering, social media, and biological science. Many of these applications search for patterns in complex structural information. In biomedicine for example, modeling complex biological systems requires linking knowledge across many levels of science, from genes to disease. Further, the data characteristics of the problems have also grown from static to dynamic and spatiotemporal, complete to incomplete, and centralized to distributed, and grow in their scope and size (this is known as "big data"). The effective integration of big data for decision-making also requires privacy preservation.

The contributions to this monograph summarize the advances of data mining in the respective fields. This volume consists of nine chapters that address subjects ranging from mining data from opinion, spatiotemporal databases, discriminative subgraph patterns, path knowledge discovery, social media, and privacy issues to the subject of computation reduction via binary matrix factorization."

Topic Detection and Tracking - Event-based Information Organization (Hardcover, 2002 ed.): James Allan Topic Detection and Tracking - Event-based Information Organization (Hardcover, 2002 ed.)
James Allan
R8,914 Discovery Miles 89 140 Ships in 18 - 22 working days

The purposeofthis book is to providea recordofthe stateofthe art in Topic Detection and Tracking (TDT) in a single place. Research in TDT has been going on for about five years, and publications related to it are scattered all over the place as technical reports, unpublished manuscripts, or in numerous conference proceedings. The third and fourth in a series of on-going TDT evaluations marked a turning point in the research. As such. it provides an excellent time to pause. review the state of the art. gather lessons learned, and describe the open challenges. This book is a collection oftechnical papers. As such, its primary audience is researchers interested in the the current state of TDT research, researchers who hope to leverage that work sothat theirown efforts can avoid pointlessdu plication and false starts. It might also pointthem in the direction ofinteresting unsolved problems within the area. The book is also of interest to practition ers in fields that are related to TDT--e.g., Information Retrieval. Automatic Speech Recognition. Machine Learning, Information Extraction, and so on. In thosecases, TDTmay provide arich application domain for theirown research, or it might address similarenough problems that some lessons learned can be tweaked slightly to answer-perhaps partiallY-"

Quantitative Analysis and IBM (R) SPSS (R) Statistics - A Guide for Business and Finance (Hardcover, 1st ed. 2016): Abdulkader... Quantitative Analysis and IBM (R) SPSS (R) Statistics - A Guide for Business and Finance (Hardcover, 1st ed. 2016)
Abdulkader Aljandali
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This guide is for practicing statisticians and data scientists who use IBM SPSS for statistical analysis of big data in business and finance. This is the first of a two-part guide to SPSS for Windows, introducing data entry into SPSS, along with elementary statistical and graphical methods for summarizing and presenting data. Part I also covers the rudiments of hypothesis testing and business forecasting while Part II will present multivariate statistical methods, more advanced forecasting methods, and multivariate methods. IBM SPSS Statistics offers a powerful set of statistical and information analysis systems that run on a wide variety of personal computers. The software is built around routines that have been developed, tested, and widely used for more than 20 years. As such, IBM SPSS Statistics is extensively used in industry, commerce, banking, local and national governments, and education. Just a small subset of users of the package include the major clearing banks, the BBC, British Gas, British Airways, British Telecom, the Consumer Association, Eurotunnel, GSK, TfL, the NHS, Shell, Unilever, and W.H.S. Although the emphasis in this guide is on applications of IBM SPSS Statistics, there is a need for users to be aware of the statistical assumptions and rationales underpinning correct and meaningful application of the techniques available in the package; therefore, such assumptions are discussed, and methods of assessing their validity are described. Also presented is the logic underlying the computation of the more commonly used test statistics in the area of hypothesis testing. Mathematical background is kept to a minimum.

Research Anthology on Big Data Analytics, Architectures, and Applications, VOL 3 (Hardcover): Information R Management... Research Anthology on Big Data Analytics, Architectures, and Applications, VOL 3 (Hardcover)
Information R Management Association
R15,732 Discovery Miles 157 320 Ships in 18 - 22 working days
Capability Management in Digital Enterprises (Hardcover, 1st ed. 2018): Kurt Sandkuhl, Janis Stirna Capability Management in Digital Enterprises (Hardcover, 1st ed. 2018)
Kurt Sandkuhl, Janis Stirna
R2,257 Discovery Miles 22 570 Ships in 18 - 22 working days

Putting capability management into practice requires both a solid theoretical foundation and realistic approaches. This book introduces a development methodology that integrates business and information system development and run-time adjustment based on the concept of capability by presenting the main findings of the CaaS project - the Capability-Driven Development (CDD) methodology, the architecture and components of the CDD environment, examples of real-world applications of CDD, and aspects of CDD usage for creating business value and new opportunities. Capability thinking characterizes an organizational mindset, putting capabilities at the center of the business model and information systems development. It is expected to help organizations and in particular digital enterprises to increase flexibility and agility in adapting to changes in their economic and regulatory environments. Capability management denotes the principles of how capability thinking should be implemented in an organization and the organizational means. This book is intended for anyone who wants to explore the opportunities for developing and managing context-dependent business capabilities and the supporting business services. It does not require a detailed understanding of specific development methods and tools, although some background knowledge and experience in information system development is advisable. The individual chapters have been written by leading researchers in the field of information systems development, enterprise modeling and capability management, as well as practitioners and industrial experts from these fields.

Video Database Systems - Issues, Products and Applications (Hardcover, 1997 ed.): Ahmed K. Elmagarmid, Haitao Jiang, Abdelsalam... Video Database Systems - Issues, Products and Applications (Hardcover, 1997 ed.)
Ahmed K. Elmagarmid, Haitao Jiang, Abdelsalam A. Helal, Anupam Joshi, Magdy Ahmed
R4,110 Discovery Miles 41 100 Ships in 18 - 22 working days

Great advances have been made in the database field. Relational and object- oriented databases, distributed and client/server databases, and large-scale data warehousing are among the more notable. However, none of these advances promises to have as great and direct an effect on the daily lives of ordinary citizens as video databases. Video databases will provide a quantum jump in our ability to deal with visual data, and in allowing people to access and manipulate visual information in ways hitherto thought impossible. Video Database Systems: Issues, Products and Applications gives practical information on academic research issues, commercial products that have already been developed, and the applications of the future driving this research and development. This book can also be considered a reference text for those entering the field of video or multimedia databases, as well as a reference for practitioners who want to identify the kinds of products needed in order to utilize video databases. Video Database Systems: Issues, Products and Applications covers concepts, products and applications. It is written at a level which is less detailed than that normally found in textbooks but more in-depth than that normally written in trade press or professional reference books. Thus, it seeks to serve both an academic and industrial audience by providing a single source of information about the research issues in the field, and the state-of-the-art of practice.

Structural Differentiation in Social Media - Adhocracy, Entropy, and the "1 % Effect" (Hardcover, 1st ed. 2017): Sorin Adam... Structural Differentiation in Social Media - Adhocracy, Entropy, and the "1 % Effect" (Hardcover, 1st ed. 2017)
Sorin Adam Matei, Brian Britt
R3,619 R3,359 Discovery Miles 33 590 Save R260 (7%) Ships in 10 - 15 working days

This book explores community dynamics within social media. Using Wikipedia as an example, the volume explores communities that rely upon commons-based peer production. Fundamental theoretical principles spanning such domains as organizational configurations, leadership roles, and social evolutionary theory are developed. In the context of Wikipedia, these theories explain how a functional elite of highly productive editors has emerged and why they are responsible for a majority of the content. It explains how the elite shapes the project and how this group tends to become stable and increasingly influential over time. Wikipedia has developed a new and resilient social hierarchy, an adhocracy, which combines features of traditional and new, online, social organizations. The book presents a set of practical approaches for using these theories in real-world practice. This work fundamentally changes the way we think about social media leadership and evolution, emphasizing the crucial contributions of leadership, of elite social roles, and of group global structure to the overall success and stability of large social media projects. Written in an accessible and direct style, the book will be of interest to academics as well as professionals with an interest in social media and commons-based peer production processes.

Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover): Stefan Katzenbeisser, Fabien Peticolas Information Hiding Techniques for Steganography and Digital Watermarking (Hardcover)
Stefan Katzenbeisser, Fabien Peticolas; Fabien Petitcolas, Stefan Katzenbeisser; Edited by F. Petticolas
R2,742 Discovery Miles 27 420 Ships in 18 - 22 working days

Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.

Research Anthology on Big Data Analytics, Architectures, and Applications, VOL 4 (Hardcover): Information R Management... Research Anthology on Big Data Analytics, Architectures, and Applications, VOL 4 (Hardcover)
Information R Management Association
R15,743 Discovery Miles 157 430 Ships in 18 - 22 working days
Data Dissemination in Wireless Computing Environments (Hardcover, 2000 ed.): Kian-Lee Tan, Beng Chin Ooi Data Dissemination in Wireless Computing Environments (Hardcover, 2000 ed.)
Kian-Lee Tan, Beng Chin Ooi
R4,107 Discovery Miles 41 070 Ships in 18 - 22 working days

In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless networks, have made possible the potential for ubiquitous computing. Through the wireless networks, portable equipments will become an integrated part of existing distributed computing environments, and mobile users can have access to data stored at information servers located at the static portion of the network even while they are on the move. Traditionally, information is retrieved following a request-response model. However, this model is no longer adequate in a wireless computing environment. First, the wireless channel is unreliable and the bandwidth is low compared to the wired counterpart. Second, the environment is essentially asymmetric with a large number of mobile users accessing a small number of servers. Third, battery-operated portable devices can typically operate only for a short time because of the short battery lifespan. Thus, clients are expected to be disconnected most of the time. To overcome these limitations, there has been a proliferation of research efforts on designing data delivery mechanisms to support wireless computing more effectively. Data Dissemination in Wireless Computing Environments focuses on such mechanisms. The purpose is to provide a thorough and comprehensive review of recent advances on energy-efficient data delivery protocols, efficient wireless channel bandwidth utilization, reliable broadcasting and cache invalidation strategies for clients with long disconnection time. Besides surveying existing methods, this book also compares and evaluates some of the more promising schemes.

Cyber Physical Computing for IoT-driven Services (Hardcover, 1st ed. 2018): Vladimir Hahanov Cyber Physical Computing for IoT-driven Services (Hardcover, 1st ed. 2018)
Vladimir Hahanov
R2,452 Discovery Miles 24 520 Ships in 18 - 22 working days

This book presents the cyber culture of micro, macro, cosmological, and virtual computing. The book shows how these work to formulate, explain, and predict the current processes and phenomena monitoring and controlling technology in the physical and virtual space.The authors posit a basic proposal to transform description of the function truth table and structure adjacency matrix to a qubit vector that focuses on memory-driven computing based on logic parallel operations performance. The authors offer a metric for the measurement of processes and phenomena in a cyberspace, and also the architecture of logic associative computing for decision-making and big data analysis.The book outlines an innovative theory and practice of design, test, simulation, and diagnosis of digital systems based on the use of a qubit coverage-vector to describe the functional components and structures. Authors provide a description of the technology for SoC HDL-model diagnosis, based on Test Assertion Blocks Activated Graph. Examples of cyber-physical systems for digital monitoring and cloud management of social objects and transport are proposed. A presented automaton model of cosmological computing explains the cyclical and harmonious evolution of matter-energy essence, and also a space-time form of the Universe.

Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms (Hardcover, 1998 ed.): John A. Stankovic, Marco Spuri,... Deadline Scheduling for Real-Time Systems - EDF and Related Algorithms (Hardcover, 1998 ed.)
John A. Stankovic, Marco Spuri, Krithi Ramamritham, Giorgio C Buttazzo
R4,166 Discovery Miles 41 660 Ships in 18 - 22 working days

Many real-time systems rely on static scheduling algorithms. This includes cyclic scheduling, rate monotonic scheduling and fixed schedules created by off-line scheduling techniques such as dynamic programming, heuristic search, and simulated annealing. However, for many real-time systems, static scheduling algorithms are quite restrictive and inflexible. For example, highly automated agile manufacturing, command, control and communications, and distributed real-time multimedia applications all operate over long lifetimes and in highly non-deterministic environments. Dynamic real-time scheduling algorithms are more appropriate for these systems and are used in such systems. Many of these algorithms are based on earliest deadline first (EDF) policies. There exists a wealth of literature on EDF-based scheduling with many extensions to deal with sophisticated issues such as precedence constraints, resource requirements, system overload, multi-processors, and distributed systems. Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms aims at collecting a significant body of knowledge on EDF scheduling for real-time systems, but it does not try to be all-inclusive (the literature is too extensive). The book primarily presents the algorithms and associated analysis, but guidelines, rules, and implementation considerations are also discussed, especially for the more complicated situations where mathematical analysis is difficult. In general, it is very difficult to codify and taxonomize scheduling knowledge because there are many performance metrics, task characteristics, and system configurations. Also, adding to the complexity is the fact that a variety of algorithms have beendesigned for different combinations of these considerations. In spite of the recent advances there are still gaps in the solution space and there is a need to integrate the available solutions. For example, a list of issues to consider includes: preemptive versus non-preemptive tasks, uni-processors versus multi-processors, using EDF at dispatch time versus EDF-based planning, precedence constraints among tasks, resource constraints, periodic versus aperiodic versus sporadic tasks, scheduling during overload, fault tolerance requirements, and providing guarantees and levels of guarantees (meeting quality of service requirements). Deadline Scheduling for Real-Time Systems: EDF and Related Algorithms should be of interest to researchers, real-time system designers, and instructors and students, either as a focussed course on deadline-based scheduling for real-time systems, or, more likely, as part of a more general course on real-time computing. The book serves as an invaluable reference in this fast-moving field.

Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.): Sokratis Katsikas Communications and Multimedia Security - Volume 3 (Hardcover, 1997 ed.)
Sokratis Katsikas
R4,186 Discovery Miles 41 860 Ships in 18 - 22 working days

This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors; managers, researchers and students working on the subject.

Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing -... Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing - IDC 2016, Paris, France, October 10-12 2016 (Hardcover, 1st ed. 2017)
Costin Badica, Amal EL Fallah-Seghrouchni, Aurelie Beynier, David Camacho, Cedric Herpson, …
R4,653 Discovery Miles 46 530 Ships in 10 - 15 working days

This book presents the combined peer-reviewed proceedings of the tenth International Symposium on Intelligent Distributed Computing (IDC'2016), which was held in Paris, France from October 10th to 12th, 2016. The 23 contributions address a range of topics related to theory and application of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Apache HTTP Server Documentation Version…
Apache Software Foundation Hardcover R1,660 Discovery Miles 16 600
True to the Spirit - Film Adaptation and…
Colin MacCabe, Kathleen Murray, … Hardcover R1,910 Discovery Miles 19 100
Lean Startup - How to Apply the Lean…
Greg Caldwell Hardcover R585 R529 Discovery Miles 5 290
May 68 in French Fiction and Film…
Margaret Atack Hardcover R5,098 Discovery Miles 50 980
The End - Surviving the World Through…
Katie Goh Paperback R214 R194 Discovery Miles 1 940
Underground Homosexualities…
Patrick Brennan Hardcover R2,074 Discovery Miles 20 740
Chicago Movie Palaces of Balaban and…
David Balaban Hardcover R719 R638 Discovery Miles 6 380
Programming Games with Java - 11th…
Philip Conrod, Lou Tylee Paperback R2,405 Discovery Miles 24 050
Before The Raid
Tom L West Paperback R288 Discovery Miles 2 880
PHP 7 News & Updates v7.0 - 7.4
Igor Pochyly, Adam Omelak Paperback R272 Discovery Miles 2 720

 

Partners