0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (6)
  • R100 - R250 (518)
  • R250 - R500 (2,033)
  • R500+ (30,050)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing

Conquering Complexity (Hardcover, 2012): Mike Hinchey, Lorcan Coyle Conquering Complexity (Hardcover, 2012)
Mike Hinchey, Lorcan Coyle
R4,092 Discovery Miles 40 920 Ships in 18 - 22 working days

Software has long been perceived as complex, at least within Software Engineering circles. We have been living in a recognised state of crisis since the first NATO Software Engineering conference in 1968. Time and again we have been proven unable to engineer reliable software as easily/cheaply as we imagined. Cost overruns and expensive failures are the norm.
The problem is fundamentally one of complexity: software is fundamentally complex because it must be precise. Problems that appear to be specified quite easily in plain language become far more complex when written in a more formal notation, such as computer code. Comparisons with other engineering disciplines are deceptive. One cannot easily increase the factor of safety of software in the same way that one could in building a steel structure, for example. Software is typically built assuming perfection, often without adequate safety nets in case the unthinkable happens. In such circumstances it should not be surprising to find out that (seemingly) minor errors have the potential to cause entire software systems to collapse.
The goal of this book is to uncover techniques that will aid in overcoming complexity and enable us to produce reliable, dependable computer systems that will operate as intended, and yet are produced on-time, in budget, and are evolvable, both over time and at run time. We hope that the contributions in this book will aid in understanding the nature of software complexity and provide guidance for the control or avoidance of complexity in the engineering of complex software systems.

Computer Supported Qualitative Research (Hardcover, 1st ed. 2017): Antonio Pedro Costa, Luis Paulo Reis, Francisle Neri De... Computer Supported Qualitative Research (Hardcover, 1st ed. 2017)
Antonio Pedro Costa, Luis Paulo Reis, Francisle Neri De Sousa, Antonio Moreira, David Lamas
R3,193 Discovery Miles 31 930 Ships in 18 - 22 working days

This book contains an edited selection of the papers accepted for presentation and discussion at the first International Symposium on Qualitative Research (ISQR2016), held in Porto, Portugal, July 12th-14th, 2016. The book and the symposium features the four main application fields Education, Health, Social Sciences and Engineering and Technology and seven main subjects: Rationale and Paradigms of Qualitative Research (theoretical studies, critical reflection about epistemological dimensions, ontological and axiological); Systematization of approaches with Qualitative Studies (literature review, integrating results, aggregation studies, meta -analysis, meta- analysis of qualitative meta- synthesis, meta- ethnography); Qualitative and Mixed Methods Research (emphasis in research processes that build on mixed methodologies but with priority to qualitative approaches); Data Analysis Types (content analysis , discourse analysis , thematic analysis , narrative analysis , etc.); Innovative processes of Qualitative Data Analysis (design analysis, articulation and triangulation of different sources of data - images, audio, video); Qualitative Research in Web Context (eResearch, virtual ethnography, interaction analysis , latent corpus on the internet, etc.); Qualitative Analysis with Support of Specific Software (usability studies, user experience, the impact of software on the quality of research.

Managing Data in Motion - Data Integration Best Practice Techniques and Technologies (Paperback): April Reeve Managing Data in Motion - Data Integration Best Practice Techniques and Technologies (Paperback)
April Reeve
R1,021 Discovery Miles 10 210 Ships in 10 - 15 working days

"Managing Data in Motion" describes techniques that have been developed for significantly reducing the complexity of managing system interfaces and enabling scalable architectures. Author April Reeve brings over two decades of experience to present a vendor-neutral approach to moving data between computing environments and systems. Readers will learn the techniques, technologies, and best practices for managing the passage of data between computer systems and integrating disparate data together in an enterprise environment.

The average enterprise's computing environment is comprised of hundreds to thousands computer systems that have been built, purchased, and acquired over time. The data from these various systems needs to be integrated for reporting and analysis, shared for business transaction processing, and converted from one format to another when old systems are replaced and new systems are acquired.

The management of the "data in motion" in organizations is rapidly becoming one of the biggest concerns for business and IT management. Data warehousing and conversion, real-time data integration, and cloud and "big data" applications are just a few of the challenges facing organizations and businesses today. "Managing Data in Motion" tackles these and other topics in a style easily understood by business and IT managers as well as programmers and architects.
Presents a vendor-neutral overview of the different technologies and techniques for moving data between computer systems including the emerging solutions for unstructured as well as structured data typesExplains, in non-technical terms, the architecture and components required to perform data integration Describes how to reduce the complexity of managing system interfaces and enable a scalable data architecture that can handle the dimensions of "Big Data"

Calculus for Cognitive Scientists - Derivatives, Integrals and Models (Hardcover, 1st ed. 2016): James K. Peterson Calculus for Cognitive Scientists - Derivatives, Integrals and Models (Hardcover, 1st ed. 2016)
James K. Peterson
R4,149 Discovery Miles 41 490 Ships in 18 - 22 working days

This book provides a self-study program on how mathematics, computer science and science can be usefully and seamlessly intertwined. Learning to use ideas from mathematics and computation is essential for understanding approaches to cognitive and biological science. As such the book covers calculus on one variable and two variables and works through a number of interesting first-order ODE models. It clearly uses MatLab in computational exercises where the models cannot be solved by hand, and also helps readers to understand that approximations cause errors - a fact that must always be kept in mind.

Computer and Information Sciences III - 27th International Symposium on Computer and Information Sciences (Hardcover, 2013... Computer and Information Sciences III - 27th International Symposium on Computer and Information Sciences (Hardcover, 2013 ed.)
Erol Gelenbe, Ricardo Lent
R7,416 R6,546 Discovery Miles 65 460 Save R870 (12%) Ships in 10 - 15 working days

A collection of papers from ISCIS 27th Annual Symposium.
Based on a rigorous selection of worldwide submissions of advanced research papers, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks.
This book provides the reader with a timely access to the work of vibrant research groups in many different areas of the world where the new frontiers of computing and communications are being created.

Computer and Information Science (Hardcover, 1st ed. 2016): Roger Lee Computer and Information Science (Hardcover, 1st ed. 2016)
Roger Lee
R3,290 Discovery Miles 32 900 Ships in 10 - 15 working days

This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26- 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.

Analyzing the Role of Risk Mitigation and Monitoring in Software Development (Hardcover): Rohit Kumar, Anjali Tayal, Sargam... Analyzing the Role of Risk Mitigation and Monitoring in Software Development (Hardcover)
Rohit Kumar, Anjali Tayal, Sargam Kapil
R5,566 Discovery Miles 55 660 Ships in 18 - 22 working days

The biggest challenges faced by the software industry are cost control and schedule control. As such, effective strategies for process improvement must be researched and implemented. Analyzing the Role of Risk Mitigation and Monitoring in Software Development is a critical scholarly resource that explores software risk and development as organizations continue to implement more applications across multiple technologies and a multi-tiered environment. Featuring coverage on a broad range of topics such as quantitative risk assessment, threat analysis, and software vulnerability management, this book is a vital resource for engineers, academicians, professionals, and researchers seeking current research on the importance of risk management in software development.

Disconnected - How to Deliver Realness, Meaning, and Belonging at Work (Hardcover): Colleen McFarland Disconnected - How to Deliver Realness, Meaning, and Belonging at Work (Hardcover)
Colleen McFarland
R664 R598 Discovery Miles 5 980 Save R66 (10%) Ships in 18 - 22 working days
Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover): Gulshan Shrivastava, Deepak... Cyber Crime and Forensic Computing - Modern Principles, Practices, and Algorithms (Hardcover)
Gulshan Shrivastava, Deepak Gupta, Kavita Sharma
R4,522 Discovery Miles 45 220 Ships in 10 - 15 working days

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.

Mathesis Universalis, Computability and Proof (Hardcover, 1st ed. 2019): Stefania Centrone, Sara Negri, Deniz Sarikaya, Peter... Mathesis Universalis, Computability and Proof (Hardcover, 1st ed. 2019)
Stefania Centrone, Sara Negri, Deniz Sarikaya, Peter M. Schuster
R3,158 Discovery Miles 31 580 Ships in 18 - 22 working days

In a fragment entitled Elementa Nova Matheseos Universalis (1683?) Leibniz writes "the mathesis [...] shall deliver the method through which things that are conceivable can be exactly determined"; in another fragment he takes the mathesis to be "the science of all things that are conceivable." Leibniz considers all mathematical disciplines as branches of the mathesis and conceives the mathesis as a general science of forms applicable not only to magnitudes but to every object that exists in our imagination, i.e. that is possible at least in principle. As a general science of forms the mathesis investigates possible relations between "arbitrary objects" ("objets quelconques"). It is an abstract theory of combinations and relations among objects whatsoever. In 1810 the mathematician and philosopher Bernard Bolzano published a booklet entitled Contributions to a Better-Grounded Presentation of Mathematics. There is, according to him, a certain objective connection among the truths that are germane to a certain homogeneous field of objects: some truths are the "reasons" ("Grunde") of others, and the latter are "consequences" ("Folgen") of the former. The reason-consequence relation seems to be the counterpart of causality at the level of a relation between true propositions. Arigorous proof is characterized in this context as a proof that shows the reason of the proposition that is to be proven. Requirements imposed on rigorous proofs seem to anticipate normalization results in current proof theory. The contributors of Mathesis Universalis, Computability and Proof, leading experts in the fields of computer science, mathematics, logic and philosophy, show the evolution of these and related ideas exploring topics in proof theory, computability theory, intuitionistic logic, constructivism and reverse mathematics, delving deeply into a contextual examination of the relationship between mathematical rigor and demands for simplification.

Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016): Jiuwen Cao, Kezhi Mao,... Proceedings of ELM-2015 Volume 2 - Theory, Algorithms and Applications (II) (Hardcover, 1st ed. 2016)
Jiuwen Cao, Kezhi Mao, Jonathan Wu, Amaury Lendasse
R6,550 Discovery Miles 65 500 Ships in 10 - 15 working days

This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.

ISE Software Engineering: A Practitioner's Approach (Paperback, 9th edition): Roger Pressman, Bruce Maxim ISE Software Engineering: A Practitioner's Approach (Paperback, 9th edition)
Roger Pressman, Bruce Maxim
R1,729 Discovery Miles 17 290 Ships in 10 - 15 working days

For almost four decades, Software Engineering: A Practitioner's Approach (SEPA) has been the world's leading textbook in software engineering. The ninth edition represents a major restructuring and update of previous editions, solidifying the book's position as the most comprehensive guide to this important subject.

Recent Advances in Applications of Computational and Fuzzy Mathematics (Hardcover, 1st ed. 2018): Snehashish Chakraverty,... Recent Advances in Applications of Computational and Fuzzy Mathematics (Hardcover, 1st ed. 2018)
Snehashish Chakraverty, Sanjeewa Perera
R2,654 Discovery Miles 26 540 Ships in 18 - 22 working days

This book addresses the basics of interval/fuzzy set theory, artificial neural networks (ANN) and computational methods. It presents step-by-step modeling for application problems along with simulation and numerical solutions. In general, every science and engineering problem is inherently biased by uncertainty, and there is often a need to model, solve and interpret problems in the world of uncertainty. At the same time, exact information about models and parameters of practical applications is usually not known and precise values do not exist. This book discusses uncertainty in both data and models. It consists of seven chapters covering various aspects of fuzzy uncertainty in application problems, such as shallow water wave equations, static structural problems, robotics, radon diffusion in soil, risk of invasive alien species and air quality quantification. These problems are handled by means of advanced computational and fuzzy theory along with machine intelligence when the uncertainties involved are fuzzy. The proposed computational methods offer new fuzzy computing methods that help other areas of knowledge construction where inexact information is present.

Social Networking and Community Behavior Modeling - Qualitative and Quantitative Measures (Hardcover): Maytham Safar, Khaled A.... Social Networking and Community Behavior Modeling - Qualitative and Quantitative Measures (Hardcover)
Maytham Safar, Khaled A. Mahdi
R4,483 Discovery Miles 44 830 Ships in 18 - 22 working days

Social networks have emerged as a major trend in computing and social paradigms in the past few years. The social network model helps to inform the study of community behavior, allowing qualitative and quantitative assessments of how people communicate and the rules that govern communication. Social Networking and Community Behavior Modeling: Qualitative and Quantitative Measures provides a clear and consolidated view of current social network models. This work explores new methods for modeling, characterizing, and constructing social networks. Chapters contained in this book study critical security issues confronting social networking, the emergence of new mobile social networking devices and applications, network robustness, and how social networks impact the business aspects of organizations.

Ontology Engineering in a Networked World (Hardcover, 2012 ed.): Mari Carmen Suarez-Figueroa, Asuncion Gomez-Perez, Enrico... Ontology Engineering in a Networked World (Hardcover, 2012 ed.)
Mari Carmen Suarez-Figueroa, Asuncion Gomez-Perez, Enrico Motta, Aldo Gangemi
R1,479 Discovery Miles 14 790 Ships in 18 - 22 working days

The Semantic Web is characterized by the existence of a very large number of distributed semantic resources, which together define a network of ontologies. These ontologies in turn are interlinked through a variety of different meta-relationships such as versioning, inclusion, and many more. This scenario is radically different from the relatively narrow contexts in which ontologies have been traditionally developed and applied, and thus calls for new methods and tools to effectively support the development of novel network-oriented semantic applications.

This book by Suarez-Figueroa et al. provides the necessary methodological and technological support for the development and use of ontology networks, which ontology developers need in this distributed environment. After an introduction, in its second part the authors describe the NeOn Methodology framework. The book's third part details the key activities relevant to the ontology engineering life cycle. For each activity, a general introduction, methodological guidelines, and practical examples are provided. The fourth part then presents a detailed overview of the NeOn Toolkit and its plug-ins. Lastly, case studies from the pharmaceutical and the fishery domain round out the work.

The book primarily addresses two main audiences: students (and their lecturers) who need a textbook for advanced undergraduate or graduate courses on ontology engineering, and practitioners who need to develop ontologies in particular or Semantic Web-based applications in general. Its educational value is maximized by its structured approach to explaining guidelines and combining them with case studies and numerous examples. The description of the open source NeOn Toolkit provides an additional asset, as it allows readers to easily evaluate and apply the ideas presented."

Data Analytics in Medicine - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Information Reso Management... Data Analytics in Medicine - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Information Reso Management Association
R11,370 Discovery Miles 113 700 Ships in 18 - 22 working days
Mobile Commerce - Technology, Theory and Applications (Hardcover): Mobile Commerce - Technology, Theory and Applications (Hardcover)
R2,264 Discovery Miles 22 640 Ships in 18 - 22 working days

M-commerce (mobile-commerce) refers to e-commerce activities carried out via a mobile terminal such as a phone or PDA. M-commerce applications for both individuals and organizations are expected to grow considerably over the next few years. Mobile Commerce: Technology, Theory and Applications addresses issues pertaining to the development, deployment, and use of these applications. The objective of this book is to provide a single source of up-to-date information about mobile commerce including the technology (hardware and software) involved, research on the expected impact of this technology on businesses and consumers, and case studies describing state-of-the-art m-commerce applications and lessons learned.

Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems (Hardcover): Paulo Carreira, Vasco Amaral, Hans Vangheluwe Foundations of Multi-Paradigm Modelling for Cyber-Physical Systems (Hardcover)
Paulo Carreira, Vasco Amaral, Hans Vangheluwe
R1,444 Discovery Miles 14 440 Ships in 18 - 22 working days
Computer-supported Collaborative Learning - Best Practices and Principles for Instructors (Hardcover): Kara L. Orvis, Andrea L.... Computer-supported Collaborative Learning - Best Practices and Principles for Instructors (Hardcover)
Kara L. Orvis, Andrea L. R. Lassiter
R2,619 Discovery Miles 26 190 Ships in 18 - 22 working days

Decades of research have shown that student collaboration in groups doesn't just happen; rather it needs to be a deliberate process facilitated by the instructor. Promoting collaboration in virtual learning environments presents a variety of challenges. Computer-Supported Collaborative Learning: Best Practices & Principles for Instructors answers the demand for a thorough resource on techniques to facilitate effective collaborative learning in virtual environments. This book provides must-have information on the role of the instructor in computer-supported collaborative learning, real-world perspectives on virtual learning group collaboration, and supporting learning group motivation.

Mathematical Insights into Advanced Computer Graphics Techniques (Hardcover, 1st ed. 2019): Yoshinori Dobashi, Shizuo Kaji, Kei... Mathematical Insights into Advanced Computer Graphics Techniques (Hardcover, 1st ed. 2019)
Yoshinori Dobashi, Shizuo Kaji, Kei Iwasaki
R3,785 Discovery Miles 37 850 Ships in 18 - 22 working days

This book presents cutting-edge developments in the advanced mathematical theories utilized in computer graphics research - fluid simulation, realistic image synthesis, and texture, visualization and digital fabrication. A spin-off book from the International Symposium on Mathematical Progress in Expressive Image Synthesis in 2016 and 2017 (MEIS2016/2017) held in Fukuoka, Japan, it includes lecture notes and an expert introduction to the latest research presented at the symposium. The book offers an overview of the emerging interdisciplinary themes between computer graphics and driven mathematic theories, such as discrete differential geometry. Further, it highlights open problems in those themes, making it a valuable resource not only for researchers, but also for graduate students interested in computer graphics and mathematics.

Graphically Speaking: Enhanced Edition (Hardcover): Mark Pelczarski Graphically Speaking: Enhanced Edition (Hardcover)
Mark Pelczarski
R959 Discovery Miles 9 590 Ships in 18 - 22 working days

This book is a compilation of Mark Pelczarski's "Graphically Speaking" tutorial columns that appeared in Softalk magazine. Using the included programs, you will be able to create art, do animation for games, and have a bunch of fun on your Apple II computer. Once you learn the fundamentals of creating hi-res, 3-D, and animation, you will be limited only by your imagination. Originally published in 1983, this Enhanced Edition features a new preface from the author and a refreshed design with a lot of art from Penguin Software. Mark taught computer science, programming, and mathematics at the high school and university levels. He founded Penguin Software and created such classic software as Graphics Magician, Complete Graphics System, and Special Effects. Penguin published over 45 popular titles such as: The Coveted Mirror, Expedition Amazon, Oo-Topos, The Quest, The Spy's Adventures Around the World, Spy's Demise, Sword of Kadash, Transylvania, and Xyphus.

Data Science for Business - Predictive Modeling, Data Mining, Data Analytics, Data Warehousing, Data Visualization, Regression... Data Science for Business - Predictive Modeling, Data Mining, Data Analytics, Data Warehousing, Data Visualization, Regression Analysis, Database Querying, and Machine Learning for Beginners (Hardcover)
Herbert Jones
R660 R589 Discovery Miles 5 890 Save R71 (11%) Ships in 18 - 22 working days
Information and Technology Literacy - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Information and Technology Literacy - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R8,960 Discovery Miles 89 600 Ships in 18 - 22 working days
The Zen of Exotic Computing (Paperback): Peter M. Kogge The Zen of Exotic Computing (Paperback)
Peter M. Kogge
R2,191 Discovery Miles 21 910 Out of stock

The Turing/von Neumann model of computing is dominant today but is by no means the only one. This textbook explores an important subset of alternatives, including those such as quantum and neuromorphic, which receive daily news attention. The models are organized into distinct groups. After a review of the Turing/von Neumann model to set the stage, the author discusses those that have their roots in the Turing/von Neumann model but perform potentially large numbers of computations in parallel; models that do away with the preplanned nature of the classical model and compute from just a statement of the problem; others that are simply mathematically different, such as probabilistic and reversible computation; models based on physical phenomena such as neurons; and finally those that leverage unique physical phenomena directly, such as quantum, optical, and DNA-based computing. Suggested readings provide a jumping-off point for deeper learning. A supplemental website contains chapters that did not make it into the book, as well as exercises, projects, and additional resources that will be useful for more in-depth investigations. The Zen of Exotic Computing is intended for computer science students interested in understanding alternative models of computing. It will also be of interest to researchers and practitioners interested in emerging technology such as quantum computing, machine learning, and AI.

Artificial Intelligence of Things in Smart Environments - Applications in Transportation and Logistics (Hardcover): Mariyam... Artificial Intelligence of Things in Smart Environments - Applications in Transportation and Logistics (Hardcover)
Mariyam Ouaissa, Zakaria Boulouard, Mariya Ouaissa, Yassine Maleh
R4,110 Discovery Miles 41 100 Ships in 10 - 15 working days

This book focuses on the use of AI/ML-based techniques to solve issues related to IoT-based environments, as well as their applications. It addresses, among others, signal detection, channel modeling, resource optimization, routing protocol design, transport layer optimization, user/application behavior prediction, software-defi ned networking, congestion control, communication network optimization, security, and anomaly detection.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Scientific Computing and Algorithms in…
Michael Griebel, Anton Schuller, … Hardcover R4,137 Discovery Miles 41 370
Basic Elements of Computational…
Wolfgang Karl Hardle, Ostap Okhrin, … Hardcover R3,109 Discovery Miles 31 090
Geometry, Mechanics, and Dynamics - The…
Dong Eui Chang, Darryl D Holm, … Hardcover R3,703 Discovery Miles 37 030
Programming Logic & Design
Joyce Farrell Paperback R780 Discovery Miles 7 800
Elliptic Integrals, Elliptic Functions…
Johannes Blumlein, Carsten Schneider, … Hardcover R5,911 Discovery Miles 59 110
Properties and Dynamics of Neutron Stars…
Veronica Dexheimer, Rodrigo Negreiros Hardcover R1,903 R1,629 Discovery Miles 16 290
A Popular Account of Discoveries at…
Austen Henry Layard Paperback R573 Discovery Miles 5 730
Crossbar-Based Interconnection Networks…
Mohsen Jahanshahi, Fathollah Bistouni Hardcover R1,408 Discovery Miles 14 080
Mathematics in Computing - An Accessible…
Gerard O'Regan Hardcover R2,282 Discovery Miles 22 820
Fault Diagnosis Inverse Problems…
Lidice Camps Echevarria, Orestes Llanes Santiago, … Hardcover R2,879 Discovery Miles 28 790

 

Partners