![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing
"Hacking Europe" traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam. Focusing on several European countries at the end of the Cold War, the book shows the digital development was not an exclusively American affair. Local hacker communities appropriated the computer and forged new cultures around it like the hackers in Yugoslavia, Poland and Finland, who showed off their tricks and creating distinct demoscenes. Together the essays reflect a diverse palette of cultural practices by which European users domesticated computer technologies. Each chapter explores the mediating actors instrumental in introducing and spreading the cultures of computing around Europe. More generally, the ludological element--the role of mischief, humor, and play--discussed here as crucial for analysis of hacker culture, opens new vistas for the study of the history of technology."
This thesis devotes three introductory chapters to outlining basic recipes for constructing the quantum Hamiltonian of an arbitrary superconducting circuit, starting from classical circuit design. Since a superconducting circuit is one of the most promising platforms for realizing a practical quantum computer, anyone who is starting out in the field will benefit greatly from this introduction. The second focus of the introduction is the ultrastrong light-matter interaction (USC), where the latest developments are described. This is followed by three main research works comprising quantum memory in USC; scaling up the 1D circuit to a 2D lattice configuration; creation of Noisy Intermediate-Scale Quantum era quantum error correction codes and polariton-mediated qubit-qubit interaction. The research work detailed in this thesis will make a major contribution to the development of quantum random access memory, a prerequisite for various quantum machine learning algorithms and applications.
We are working with Cambridge Assessment International Education to gain endorsement for this title. Develop theoretical and practical IT skills with this comprehensive Student's Book written by experienced authors and examiners specially for the updated Cambridge International Education A Level Information Technology syllabus (9626). - Improve understanding of concepts and terminology with clear explanations, labelled illustrations, photographs, diagrams, plus a glossary of key terms - Develop theoretical and practical skills with a range of exercises (multi choice through to discussion type questions), exam-style questions, step-by-step instructions and example answers that all ensure skills are developed alongside knowledge - Follow a structured route through the course with in-depth coverage of the full syllabus Also available in the series: Cambridge International AS Level Information Technology Student's Book 9781510483057 Cambridge International AS Level Information Technology Student eTextbook 9781510484429 Cambridge International AS Level Information Technology Whiteboard eTextbook 9781510484436 Cambridge International AS Level Information Technology Skills Workbook 9781510483064 Cambridge International A Level Information Technology Student eTextbook 9781398307018 Cambridge International A Level Information Technology Whiteboard eTextbook 9781398307025 Cambridge International A Level Information Technology Skills Workbook 9781398309029 Cambridge International AS & A Level Information Technology Online Teacher's guide - coming soon
This Handbook provides a complete compendium of methods for
evaluation of IT-based systems and solutions within healthcare.
Emphasis is entirely on assessment of the IT-system within its
organizational environment. The author provides a coherent and
complete assessment of methods addressing interactions with and
effects of technology at the organizational, psychological, and
social levels.
Enterprise information systems touch every process of an organization as new functionalities in previously existing and upcoming solutions are created every day. ""Social, Managerial, and Organizational Dimensions of Enterprise Information Systems"" discusses the technological developments, main issues, challenges, opportunities, and trends impacting every part of small to medium sized enterprises. A leading resource for academicians, managers, and researchers, this advanced publication provides an integrated and progressive view into the benefits and applications of enterprise information systems.
In the very near future, "smart" technologies and "big data" will
allow us to make large-scale and sophisticated interventions in
politics, culture, and everyday life. Technology will allow us to
solve problems in highly original ways and create new incentives to
get more people to do the right thing. But how will such
"solutionism" affect our society, once deeply political, moral, and
irresolvable dilemmas are recast as uncontroversial and easily
manageable matters of technological efficiency? What if some such
problems are simply vices in disguise? What if some friction in
communication is productive and some hypocrisy in politics
necessary? The temptation of the digital age is to fix
everything--from crime to corruption to pollution to obesity--by
digitally quantifying, tracking, or gamifying behavior. But when we
change the motivations for our moral, ethical, and civic behavior
we may also change the very nature of that behavior. Technology,
Evgeny Morozov proposes, can be a force for improvement--but only
if we keep solutionism in check and learn to appreciate the
imperfections of liberal democracy. Some of those imperfections are
not accidental but by design.
This book provides developers, engineers, researchers and students with detailed knowledge about the High Efficiency Video Coding (HEVC) standard. HEVC is the successor to the widely successful H.264/AVC video compression standard, and it provides around twice as much compression as H.264/AVC for the same level of quality. The applications for HEVC will not only cover the space of the well-known current uses and capabilities of digital video they will also include the deployment of new services and the delivery of enhanced video quality, such as ultra-high-definition television (UHDTV) and video with higher dynamic range, wider range of representable color, and greater representation precision than what is typically found today. HEVC is the next major generation of video coding design a flexible, reliable and robust solution that will support the next decade of video applications and ease the burden of video on world-wide network traffic. This book provides a detailed explanation of the various parts of the standard, insight into how it was developed, and in-depth discussion of algorithms and architectures for its implementation."
Internal migration serves as one of the key contributing factors to population change involving not only change in the numbers of people, but also a change in composition and structure of local populations. Technologies for Migration and Population Analysis: Spatial Interaction Data Applications addresses the technical and data-related side of studying population flows and provides a selection of substantive case studies and applications to exemplify research currently being carried out. With expert international contributors currently working in the field, this authoritative book allows readers to better understand interaction data and ways knowledge of population flows can be put to use.
Tools of data comparison and analysis are critical in the field of archaeology, and the integration of technological advancements such as geographic information systems, intelligent systems, and virtual reality reconstructions with the teaching of archaeology is crucial to the effective utilization of resources in the field. ""E-Learning Methodologies and Computer Applications in Archaeology"" presents innovative instructional approaches for archaeological e-learning based on networked technologies, providing researchers, scholars, and professionals a comprehensive global perspective on the resources, development, application, and implications of information communication technology in multimedia-based educational products and services in archaeology.
Virtual teams are a relatively new phenomenon and by definition work across time, distance, and organizations through the use of information and communications technology. Virtual Teams: Projects, Protocols and Processes gathers the best of academic research on real work-based virtual teams into one book. It offers a series of chapters featuring practical research, insight and recommendations on how virtual team projects can be better managed, as well as in depth discussion on issues critical to virtual team success, including the place of virtual teams in organizations, leadership, trust and relationship building, best use of technology, and knowledge sharing.
Gain the knowledge and tools to deliver compelling mobile phone applications. Mobile and wireless application design is complex and challenging. Selecting an application technology and designing a mobile application require an understanding of the benefits, costs, context, and restrictions of the development company, end user, target device, and industry structure. "Designing the Mobile User Experience" provides the experienced product development professional with an understanding of the users, technologies, devices, design principles, techniques and industry players unique to the mobile and wireless space. Barbara Ballard describes the different components affecting the user experience and principles applicable to the mobile environment, enabling the reader to choose effective technologies, platforms, and devices, plan appropriate application features, apply pervasive design patterns, and choose and apply appropriate research techniques. "Designing the Mobile User Experience: " Provides a comprehensive guide to the mobile user experience, offering guidance to help make appropriate product development and design decisions. Gives product development professionals the tools necessary to understand development in the mobile environment. Clarifies the components affecting the user experience and principles uniquely applicable to the mobile application field. Explores industry structure and power dynamics, providing insight into how mobile technologies and platforms become available on current and future phones. Provides user interface design patterns, design resources, and user research methods for mobile user interface design. Illustrates concepts with example photographs, explanatory tables and charts, and an example application. "Designing the Mobile User Experience" is an invaluable resource for information architects, user experience planners and designers, interaction designers, human factors specialists, ergonomists, product marketing specialists, and brand managers. Managers and directors within organizations entering the mobile space, advanced students, partnership managers, software architects, solution architects, development managers, graphic designers, visual designers, and interface designers will also find this to be an excellent guide to the topic.
This book is primarily intended as a research monograph that could also be used in graduate courses for the design of parallel algorithms in matrix computations. It assumes general but not extensive knowledge of numerical linear algebra, parallel architectures, and parallel programming paradigms. The book consists of four parts: (I) Basics; (II) Dense and Special Matrix Computations; (III) Sparse Matrix Computations; and (IV) Matrix functions and characteristics. Part I deals with parallel programming paradigms and fundamental kernels, including reordering schemes for sparse matrices. Part II is devoted to dense matrix computations such as parallel algorithms for solving linear systems, linear least squares, the symmetric algebraic eigenvalue problem, and the singular-value decomposition. It also deals with the development of parallel algorithms for special linear systems such as banded ,Vandermonde ,Toeplitz ,and block Toeplitz systems. Part III addresses sparse matrix computations: (a) the development of parallel iterative linear system solvers with emphasis on scalable preconditioners, (b) parallel schemes for obtaining a few of the extreme eigenpairs or those contained in a given interval in the spectrum of a standard or generalized symmetric eigenvalue problem, and (c) parallel methods for computing a few of the extreme singular triplets. Part IV focuses on the development of parallel algorithms for matrix functions and special characteristics such as the matrix pseudospectrum and the determinant. The book also reviews the theoretical and practical background necessary when designing these algorithms and includes an extensive bibliography that will be useful to researchers and students alike. The book brings together many existing algorithms for the fundamental matrix computations that have a proven track record of efficient implementation in terms of data locality and data transfer on state-of-the-art systems, as well as several algorithms that are presented for the first time, focusing on the opportunities for parallelism and algorithm robustness.
This book discusses recent developments in semigroup theory and its applications in areas such as operator algebras, operator approximations and category theory. All contributing authors are eminent researchers in their respective fields, from across the world. Their papers, presented at the 2014 International Conference on Semigroups, Algebras and Operator Theory in Cochin, India, focus on recent developments in semigroup theory and operator algebras. They highlight current research activities on the structure theory of semigroups as well as the role of semigroup theoretic approaches to other areas such as rings and algebras. The deliberations and discussions at the conference point to future research directions in these areas. This book presents 16 unpublished, high-quality and peer-reviewed research papers on areas such as structure theory of semigroups, decidability vs. undecidability of word problems, regular von Neumann algebras, operator theory and operator approximations. Interested researchers will find several avenues for exploring the connections between semigroup theory and the theory of operator algebras.
This book develops a common understanding between the client and the provider in each of the four stages of strategic outsourcing. These stages range from discovery, where the parties envision their future collaboration; planning, where they lay the ground work for the contract and the project; building, where they effectively carry out the work; and lastly to running, where they orchestrate the relationship on a daily basis to ensure that the new, enlarged company achieves the results sought. In a simple yet direct style, it highlights the dos and don'ts the parties should bear in mind at each stage of the process and combines both the client's and the provider's perspectives by comparing their respective involvement at each stage of the process and considering, equally, their obligations in establishing a balanced relationship. The book is primarily intended for those in the private sector with experience of dealing with complex outsourcing situations and who are looking for the small or bigger differentiators that will support their decisions and actions. The target audiences include, on the client side: CCOs, CIOs, lawyers, procurement managers, outsourcing consultants and IT Service managers and, on the provider side: account managers, bid managers, outsourcing project managers, operation managers and service managers. However, it is also useful for anybody involved in outsourcing who is seeking to develop a global understanding of the main processes and roles upstream and downstream in the chain.
Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. Exploring Critical Approaches of Evolutionary Computation is a vital scholarly publication that explores the latest developments, methods, approaches, and applications of evolutionary models in a variety of fields. It also emphasizes evolutionary models of computation such as genetic algorithms, evolutionary strategies, classifier systems, evolutionary programming, genetic programming, and related fields such as swarm intelligence and other evolutionary computation techniques. Highlighting a range of pertinent topics such as neural networks, data mining, and data analytics, this book is designed for IT developers, IT theorists, computer engineers, researchers, practitioners, and upper-level students seeking current research on enhanced information exchange methods and practical aspects of computational systems.
This book reports on the latest advances and applications of chaotic systems. It consists of 25 contributed chapters by experts who are specialized in the various topics addressed in this book. The chapters cover a broad range of topics of chaotic systems such as chaos, hyperchaos, jerk systems, hyperjerk systems, conservative and dissipative systems, circulant chaotic systems, multi-scroll chaotic systems, finance chaotic system, highly chaotic systems, chaos control, chaos synchronization, circuit realization and applications of chaos theory in secure communications, mobile robot, memristors, cellular neural networks, etc. Special importance was given to chapters offering practical solutions, modeling and novel control methods for the recent research problems in chaos theory. This book will serve as a reference book for graduate students and researchers with a basic knowledge of chaos theory and control systems. The resulting design procedures on the chaotic systems are emphasized using MATLAB software.
This book is aimed at presenting concepts, methods and algorithms ableto cope with undersampled and limited data. One such trend that recently gained popularity and to some extent revolutionised signal processing is compressed sensing. Compressed sensing builds upon the observation that many signals in nature are nearly sparse (or compressible, as they are normally referred to) in some domain, and consequently they can be reconstructed to within high accuracy from far fewer observations than traditionally held to be necessary. Apart from compressed sensing this book contains other related approaches. Each methodology has its own formalities for dealing with such problems. As an example, in the Bayesian approach, sparseness promoting priors such as Laplace and Cauchy are normally used for penalising improbable model variables, thus promoting low complexity solutions. Compressed sensing techniques and homotopy-type solutions, such as the LASSO, utilise l1-norm penalties for obtaining sparse solutions using fewer observations than conventionally needed. The book emphasizes on the role of sparsity as a machinery for promoting low complexity representations and likewise its connections to variable selection and dimensionality reduction in various engineering problems. This book is intended for researchers, academics and practitioners with interest in various aspects and applications of sparse signal processing.
We are now entering an era where the human world assumes recognition of itself as data. Much of humanity's basis for existence is becoming subordinate to software processes that tabulate, index, and sort the relations that comprise what we perceive as reality. The acceleration of data collection threatens to relinquish ephemeral modes of representation to ceaseless processes of computation. This situation compels the human world to form relations with non-human agencies, to establish exchanges with software processes in order to allow a profound upgrade of our own ontological understanding. By mediating with a higher intelligence, we may be able to rediscover the inner logic of the age of intelligent machines. In The End of the Future, Stephanie Polsky conceives an understanding of the digital through its dynamic intersection with the advent and development of the nation-state, race, colonization, navigational warfare, mercantilism, and capitalism, and the mathematical sciences over the past five centuries, the era during which the world became "modern." The book animates the twenty-first century as an era in which the screen has split off from itself and proliferated onto multiple surfaces, allowing an inverted image of totalitarianism to flash up and be altered to support our present condition of binary apperception. It progresses through a recognition of atomized political power, whose authority lies in the control not of the means of production, but of information, and in which digital media now serves to legitimize and promote a customized micropolitics of identity management. On this new apostolate plane, humanity may be able to shape a new world in which each human soul is captured and reproduced as an autonomous individual bearing affects and identities. The digital infrastructure of the twenty-first century makes it possible for power to operate through an esoteric mathematical means, and for factual material to be manipulated in the interest of advancing the means of control. This volume travels a course from Elizabethan England, to North American slavery, through cybernetic Social Engineering, Cold War counterinsurgency, and the (neo)libertarianism of Silicon Valley in order to arrive at a place where an organizing intelligence that started from an ambition to resourcefully manipulate physical bodies has ended with their profound neutralization.
Television, since its invention, has been considered to be a social link between people. Continually enhanced by innovation, the next frontier for this technological phenomenon will focus on the actual natural capabilities of the medium. Social Interactive Television: Immersive Shared Experiences and Perspectives combines academic and industry research to provide the first publication of its kind to discuss the future emergence of experiences and services through interactive television. Concentrating on system and interaction design, as well as evaluation methods that focus on social experiences around interactive television, this book provides practitioners, academicians, researchers, and developers with the most relevant, current, and interesting findings on the topic.
This book provides formal and informal definitions and taxonomies for self-aware computing systems, and explains how self-aware computing relates to many existing subfields of computer science, especially software engineering. It describes architectures and algorithms for self-aware systems as well as the benefits and pitfalls of self-awareness, and reviews much of the latest relevant research across a wide array of disciplines, including open research challenges. The chapters of this book are organized into five parts: Introduction, System Architectures, Methods and Algorithms, Applications and Case Studies, and Outlook. Part I offers an introduction that defines self-aware computing systems from multiple perspectives, and establishes a formal definition, a taxonomy and a set of reference scenarios that help to unify the remaining chapters. Next, Part II explores architectures for self-aware computing systems, such as generic concepts and notations that allow a wide range of self-aware system architectures to be described and compared with both isolated and interacting systems. It also reviews the current state of reference architectures, architectural frameworks, and languages for self-aware systems. Part III focuses on methods and algorithms for self-aware computing systems by addressing issues pertaining to system design, like modeling, synthesis and verification. It also examines topics such as adaptation, benchmarks and metrics. Part IV then presents applications and case studies in various domains including cloud computing, data centers, cyber-physical systems, and the degree to which self-aware computing approaches have been adopted within those domains. Lastly, Part V surveys open challenges and future research directions for self-aware computing systems. It can be used as a handbook for professionals and researchers working in areas related to self-aware computing, and can also serve as an advanced textbook for lecturers and postgraduate students studying subjects like advanced software engineering, autonomic computing, self-adaptive systems, and data-center resource management. Each chapter is largely self-contained, and offers plenty of references for anyone wishing to pursue the topic more deeply. |
You may like...
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter
Paperback
The Accidental Mayor - Herman Mashaba…
Michael Beaumont
Paperback
(5)
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet
Paperback
R542
Discovery Miles 5 420
|