![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
The Internet generation of interculturally minded, socially networked leaders is redefining the workplace. Management is slow to respond. Asian philosophy - with concepts like ba, Zen, feng shui, and ki - is becoming increasingly important for tomorrow's leader. Blend that with the Scandinavian mindset of egalitarianism, openness, and gender equity, add sophisticated use of network effects and you begin to understand the true logic of Internet in the workplace. Cultural diversity and technological dependence are global trends that demand constant attention. Know: - How to lead without being the leader - How to adapt quickly to change - How to thrive on diversity - How to be a trendsetter in technology - How to be on top but still have a life.
Standardization has the potential to shape, expand, and create markets. Information technology has undergone a rapid transformation in the application of standards in practice, and recent developments have augmented the need for the divulgence of supplementary research. Standardization Research in Information Technology: New Perspectives amasses cutting-edge research on the application of standards in the market, covering topics such as corporate standardization, linguistic qualities of international standards, the role of individuals in standardization, and the development, use, application, and influence of information technology in standardization techniques.
Transactions are a concept related to the logical database as seen from the perspective of database application programmers: a transaction is a sequence of database actions that is to be executed as an atomic unit of work. The processing of transactions on databases is a well- established area with many of its foundations having already been laid in the late 1970s and early 1980s. The unique feature of this textbook is that it bridges the gap between the theory of transactions on the logical database and the implementation of the related actions on the underlying physical database. The authors relate the logical database, which is composed of a dynamically changing set of data items with unique keys, and the underlying physical database with a set of fixed-size data and index pages on disk. Their treatment of transaction processing builds on the "do-redo-undo" recovery paradigm, and all methods and algorithms presented are carefully designed to be compatible with this paradigm as well as with write-ahead logging, steal-and-no-force buffering, and fine-grained concurrency control. Chapters 1 to 6 address the basics needed to fully appreciate transaction processing on a centralized database system within the context of our transaction model, covering topics like ACID properties, database integrity, buffering, rollbacks, isolation, and the interplay of logical locks and physical latches. Chapters 7 and 8 present advanced features including deadlock-free algorithms for reading, inserting and deleting tuples, while the remaining chapters cover additional advanced topics extending on the preceding foundational chapters, including multi-granular locking, bulk actions, versioning, distributed updates, and write-intensive transactions. This book is primarily intended as a text for advanced undergraduate or graduate courses on database management in general or transaction processing in particular.
The second volume in a series which aims to focus on advances in computational biology. This volume discusses such topics as: statistical analysis of protein sequences; progress in large-scale sequence analysis; and the architecture of loops in proteins.
The present work provides a platform for leading Data designers whose vision and creativity help us to anticipate major changes occurring in the Data Design field, and pre-empt the future. Each of them strives to provide new answers to the question, "What challenges await Data Design?" To avoid falling into too narrow a mind-set, each works hard to elucidate the breadth of Data Design today and to demonstrate its widespread application across a variety of business sectors. With end users in mind, designer-contributors bring to light the myriad of purposes for which the field was originally intended, forging the bond even further between Data Design and the aims and intentions of those who contribute to it. The first seven parts of the book outline the scope of Data Design, and presents a line-up of "viewpoints" that highlight this discipline's main topics, and offers an in-depth look into practices boasting both foresight and imagination. The eighth and final part features a series of interviews with Data designers and artists whose methods embody originality and marked singularity. As a result, a number of enlightening concepts and bright ideas unfold within the confines of this book to help dispel the thick fog around this new and still relatively unknown discipline. A plethora of equally eye-opening and edifying new terms, words, and key expressions also unfurl. Informing, influencing, and inspiring are just a few of the buzz words belonging to an initiative that is, first and foremost, a creative one, not to mention the possibility to discern the ever-changing and naturally complex nature of today's datasphere. Providing an invaluable and cutting-edge resource for design researchers, this work is also intended for students, professionals and practitioners involved in Data Design, Interaction Design, Digital & Media Design, Data & Information Visualization, Computer Science and Engineering.
Over the past six years personal computers have carved a deep niche in the music world. This widespread popularity is largely due to the establishment of the MIDI (Musical Instrument Digital Interface) standard in 1983. This communications protocol allows computers to send, receive, and store digital information generated by various electronic musical instruments. In addition to numerous writings exploring the possibilities of present and future technology, this annotated bibliography offers educators many introductory sources, articles on how to evaluate and purchase equipment, and directories of available software. Specifically, it provides a collection of source material, an overview of significant publications in the field, and serves as a point of departure for further inquiry. Part I of the bibliography is divided into seven sections, each devoted to information regarding a specific computer. Articles written about two or more popular computers or models not covered elsewhere are detailed in part II. Music education is the subject of Part III and Part IV lists and annotates significant books. The appendix contains information on associations involved with the musical applications of personal computers and brief descriptions of several popular online services. Author and subject indexes are also included. Music and the Personal Computer covers a variety of topics that will be of interest to practicing musicians, music educators, and computer enthusiasts with interests in music.
This book examines construction safety from the perspective of informatics and econometrics. It demonstrates the potential of employing various information technology approaches to share construction safety knowledge. In addition, it presents the application of econometrics in construction safety studies, such as an analytic hierarchy process used to create a construction safety index. It also discusses structure equation and dynamic panel models for the analysis of construction safety claims. Lastly, it describes the use of mathematical and econometric models to investigate construction practitioners' safety.
In digital enterprise, individuals use a variety of technologies to assist them in communicating, collaborating, and coordinating their activities across distance and time, enhancing workflow expertise and communications. ""Leadership in the Digital Enterprise: Issues and Challenges"" presents a comprehensive collection of the most current research on various aspects, roles, and functions of digital enterprises. A compendium of latest industry findings and advancements, this Premier Reference Source provides researchers, academicians, and practitioners with useful theories and references in topics such as e-business, knowledge management, and enterprise planning.
This book discusses recent developments in semigroup theory and its applications in areas such as operator algebras, operator approximations and category theory. All contributing authors are eminent researchers in their respective fields, from across the world. Their papers, presented at the 2014 International Conference on Semigroups, Algebras and Operator Theory in Cochin, India, focus on recent developments in semigroup theory and operator algebras. They highlight current research activities on the structure theory of semigroups as well as the role of semigroup theoretic approaches to other areas such as rings and algebras. The deliberations and discussions at the conference point to future research directions in these areas. This book presents 16 unpublished, high-quality and peer-reviewed research papers on areas such as structure theory of semigroups, decidability vs. undecidability of word problems, regular von Neumann algebras, operator theory and operator approximations. Interested researchers will find several avenues for exploring the connections between semigroup theory and the theory of operator algebras.
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either. Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.
This book provides developers, engineers, researchers and students with detailed knowledge about the High Efficiency Video Coding (HEVC) standard. HEVC is the successor to the widely successful H.264/AVC video compression standard, and it provides around twice as much compression as H.264/AVC for the same level of quality. The applications for HEVC will not only cover the space of the well-known current uses and capabilities of digital video they will also include the deployment of new services and the delivery of enhanced video quality, such as ultra-high-definition television (UHDTV) and video with higher dynamic range, wider range of representable color, and greater representation precision than what is typically found today. HEVC is the next major generation of video coding design a flexible, reliable and robust solution that will support the next decade of video applications and ease the burden of video on world-wide network traffic. This book provides a detailed explanation of the various parts of the standard, insight into how it was developed, and in-depth discussion of algorithms and architectures for its implementation."
Television, since its invention, has been considered to be a social link between people. Continually enhanced by innovation, the next frontier for this technological phenomenon will focus on the actual natural capabilities of the medium. Social Interactive Television: Immersive Shared Experiences and Perspectives combines academic and industry research to provide the first publication of its kind to discuss the future emergence of experiences and services through interactive television. Concentrating on system and interaction design, as well as evaluation methods that focus on social experiences around interactive television, this book provides practitioners, academicians, researchers, and developers with the most relevant, current, and interesting findings on the topic.
Highlights key research currently being undertaken within the field of telepresence, providing the most detailed account of the field to date, advancing our understanding of a fundamental property of all media - the illusion of presence; the sense of "being there" inside a virtual environment, with actual or virtual others. This collection has been put together by leading international scholars from America, Europe, and Asia. Together, they describe the state-of-the-art in presence theory, research and technology design for an advanced academic audience. Immersed in Media provides research that can help designers optimize presence for users of advanced media technologies such as virtual and augmented reality, collaborative social media, robotics, and artificial intelligence and lead us to better understand human cognition, emotion and behaviour.
"Hacking Europe" traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam. Focusing on several European countries at the end of the Cold War, the book shows the digital development was not an exclusively American affair. Local hacker communities appropriated the computer and forged new cultures around it like the hackers in Yugoslavia, Poland and Finland, who showed off their tricks and creating distinct demoscenes. Together the essays reflect a diverse palette of cultural practices by which European users domesticated computer technologies. Each chapter explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe. More generally, the ludological element--the role of mischief, humor, and play--discussed here as crucial for analysis of hacker culture, opens new vistas for the study of the history of technology."
In the very near future, "smart" technologies and "big data" will
allow us to make large-scale and sophisticated interventions in
politics, culture, and everyday life. Technology will allow us to
solve problems in highly original ways and create new incentives to
get more people to do the right thing. But how will such
"solutionism" affect our society, once deeply political, moral, and
irresolvable dilemmas are recast as uncontroversial and easily
manageable matters of technological efficiency? What if some such
problems are simply vices in disguise? What if some friction in
communication is productive and some hypocrisy in politics
necessary? The temptation of the digital age is to fix
everything--from crime to corruption to pollution to obesity--by
digitally quantifying, tracking, or gamifying behavior. But when we
change the motivations for our moral, ethical, and civic behavior
we may also change the very nature of that behavior. Technology,
Evgeny Morozov proposes, can be a force for improvement--but only
if we keep solutionism in check and learn to appreciate the
imperfections of liberal democracy. Some of those imperfections are
not accidental but by design.
We are working with Cambridge Assessment International Education to gain endorsement for this title. Develop theoretical and practical IT skills with this comprehensive Student's Book written by experienced authors and examiners specially for the updated Cambridge International Education A Level Information Technology syllabus (9626). - Improve understanding of concepts and terminology with clear explanations, labelled illustrations, photographs, diagrams, plus a glossary of key terms - Develop theoretical and practical skills with a range of exercises (multi choice through to discussion type questions), exam-style questions, step-by-step instructions and example answers that all ensure skills are developed alongside knowledge - Follow a structured route through the course with in-depth coverage of the full syllabus Also available in the series: Cambridge International AS Level Information Technology Student's Book 9781510483057 Cambridge International AS Level Information Technology Student eTextbook 9781510484429 Cambridge International AS Level Information Technology Whiteboard eTextbook 9781510484436 Cambridge International AS Level Information Technology Skills Workbook 9781510483064 Cambridge International A Level Information Technology Student eTextbook 9781398307018 Cambridge International A Level Information Technology Whiteboard eTextbook 9781398307025 Cambridge International A Level Information Technology Skills Workbook 9781398309029 Cambridge International AS & A Level Information Technology Online Teacher's guide - coming soon
This research monograph focuses on the design of arithmetic circuits in Quantum Dot Cellular Automata (QCA). Using the fact that the 3-input majority gate is a primitive in QCA, the book sets out to discover hitherto unknown properties of majority logic in the context of arithmetic circuit designs. The pursuit for efficient adders in QCA takes two forms. One involves application of the new results in majority logic to existing adders. The second involves development of a custom adder for QCA technology. A QCA adder named as hybrid adder is proposed and it is shown that it outperforms existing multi-bit adders with respect to area and delay. The work is extended to the design of a low-complexity multiplier for signed numbers in QCA. Furthermore the book explores two aspects unique to QCA technology, namely thermal robustness and the role of interconnects. In addition, the book introduces the reader to QCA layout design and simulation using QCADesigner. Features & Benefits: This research-based book: *Introduces the reader to Quantum Dot Cellular Automata, an emerging nanotechnology. *Explores properties of majority logic. *Demonstrates application of the properties to design efficient arithmetic circuits. *Guides the reader towards layout design and simulation in QCADesigner.
This Handbook provides a complete compendium of methods for
evaluation of IT-based systems and solutions within healthcare.
Emphasis is entirely on assessment of the IT-system within its
organizational environment. The author provides a coherent and
complete assessment of methods addressing interactions with and
effects of technology at the organizational, psychological, and
social levels. |
You may like...
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
(1)
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,451
Discovery Miles 14 510
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|