![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
This book contains the full papers presented at ICCEBS 2013 - the 1st International Conference on Computational and Experimental Biomedical Sciences, which was organized in Azores, in October 2013. The included papers present and discuss new trends in those fields, using several methods and techniques, including active shape models, constitutive models, isogeometric elements, genetic algorithms, level sets, material models, neural networks, optimization and the finite element method, in order to address more efficiently different and timely applications involving biofluids, computer simulation, computational biomechanics, image based diagnosis, image processing and analysis, image segmentation, image registration, scaffolds, simulation and surgical planning. The main audience for this book consists of researchers, Ph.D students and graduate students with multidisciplinary interests related to the areas of artificial intelligence, bioengineering, biology, biomechanics, computational fluid dynamics, computational mechanics, computational vision, histology, human motion, imagiology, applied mathematics, medical image, medicine, orthopaedics, rehabilitation, speech production and tissue engineering.
Information Systems Development: Reflections, Challenges and New Directions, is the collected proceedings of the 20th International Conference on Information Systems Development held in Edinburgh, Scotland, August 24 - 26, 2011. It follows in the tradition of previous conferences in the series in exploring the connections between industry, research and education. These proceedings represent ongoing reflections within the academic community on established information systems topics and emerging concepts, approaches and ideas. It is hoped that the papers herein contribute towards disseminating research and improving practice
Knowledge and Technology Management in Virtual Organizations: Issues, Trends, Opportunities and Solutions presents a collection of the most recent contributions in the areas of organization, knowledge, and technology management in the context of virtual enterprises. This book contains important and in-depth information on four dimensions: semantic, managerial, technological, and social. The semantic dimensions covered in this book are ontological and organizational approaches, concepts, organizational models, and knowledge management models. In respect to managerial dimensions, this book covers process management, integration management, relationship management, process integration, knowledge management, technology integration management, and information integration. ""Knowledge and Technology Management in Virtual Organizations: Issues, Trends, Opportunities and Solutions"" presents the technological dimension by explaining the infrastructures and technologies to support technology and information integration standards and protocols. Lastly, this title highlights the social dimension, including human resources management, human resources integration, social issues, social impact, social requirements, and communities of knowledge.
For courses in engineering and technical management System architecture is the study of early decision making in complex systems. This text teaches how to capture experience and analysis about early system decisions, and how to choose architectures that meet stakeholder needs, integrate easily, and evolve flexibly. With case studies written by leading practitioners, from hybrid cars to communications networks to aircraft, this text showcases the science and art of system architecture.
This is a volume of chapters on the historical study of information, computing, and society written by seven of the most senior, distinguished members of the History of Computing field. These are edited, expanded versions of papers presented in a distinguished lecture series in 2018 at the University of Colorado Boulder - in the shadow of the Flatirons, the front range of the Rocky Mountains. Topics range widely across the history of computing. They include the digitalization of computer and communication technologies, gender history of computing, the history of data science, incentives for innovation in the computing field, labor history of computing, and the process of standardization. Authors were given wide latitude to write on a topic of their own choice, so long as the result is an exemplary article that represents the highest level of scholarship in the field, producing articles that scholars in the field will still look to read twenty years from now. The intention is to publish articles of general interest, well situated in the research literature, well grounded in source material, and well-polished pieces of writing. The volume is primarily of interest to historians of computing, but individual articles will be of interest to scholars in media studies, communication, computer science, cognitive science, general and technology history, and business.
Software history has a deep impact on current software designers, computer scientists, and technologists. System constraints imposed in the past and the designs that responded to them are often unknown or poorly understood by students and practitioners, yet modern software systems often include "old" software and "historical" programming techniques. This work looks at software history through specific software areas to develop student-consumable practices, design principles, lessons learned, and trends useful in current and future software design. It also exposes key areas that are widely used in modern software, yet infrequently taught in computing programs. Written as a textbook, this book uses specific cases from the past and present to explore the impact of software trends and techniques. Building on concepts from the history of science and technology, software history examines such areas as fundamentals, operating systems, programming languages, programming environments, networking, and databases. These topics are covered from their earliest beginnings to their modern variants. There are focused case studies on UNIX, APL, SAGE, GNU Emacs, Autoflow, internet protocols, System R, and others. Extensive problems and suggested projects enable readers to deeply delve into the history of software in areas that interest them most.
Python Programming In A Day 2nd Edition: Beginners Power Guide To Learning Python Programming From Scratch What exactly is python programming and is it really that complex? How is Python made so easy so the jargon is gone and you can have success programming within a day? Want to know all about interactive mode with mathematical operations? Variables? Strings? Mr. Key is going above and beyond with data types, programming modes and conditional statements Always wanted a step by step guide to begin a program building from start to finish? Look no further! Its time for you to take advantage of this easy programming guide so you can have immediate success in Python Programming! But Now!
Chapters "Turing and Free Will: A New Take on an Old Debate" and "Turing and the History of Computer Music" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
In this work we plan to revise the main techniques for enumeration algorithms and to show four examples of enumeration algorithms that can be applied to efficiently deal with some biological problems modelled by using biological networks: enumerating central and peripheral nodes of a network, enumerating stories, enumerating paths or cycles, and enumerating bubbles. Notice that the corresponding computational problems we define are of more general interest and our results hold in the case of arbitrary graphs. Enumerating all the most and less central vertices in a network according to their eccentricity is an example of an enumeration problem whose solutions are polynomial and can be listed in polynomial time, very often in linear or almost linear time in practice. Enumerating stories, i.e. all maximal directed acyclic subgraphs of a graph G whose sources and targets belong to a predefined subset of the vertices, is on the other hand an example of an enumeration problem with an exponential number of solutions, that can be solved by using a non trivial brute-force approach. Given a metabolic network, each individual story should explain how some interesting metabolites are derived from some others through a chain of reactions, by keeping all alternative pathways between sources and targets. Enumerating cycles or paths in an undirected graph, such as a protein-protein interaction undirected network, is an example of an enumeration problem in which all the solutions can be listed through an optimal algorithm, i.e. the time required to list all the solutions is dominated by the time to read the graph plus the time required to print all of them. By extending this result to directed graphs, it would be possible to deal more efficiently with feedback loops and signed paths analysis in signed or interaction directed graphs, such as gene regulatory networks. Finally, enumerating mouths or bubbles with a source s in a directed graph, that is enumerating all the two vertex-disjoint directed paths between the source s and all the possible targets, is an example of an enumeration problem in which all the solutions can be listed through a linear delay algorithm, meaning that the delay between any two consecutive solutions is linear, by turning the problem into a constrained cycle enumeration problem. Such patterns, in a de Bruijn graph representation of the reads obtained by sequencing, are related to polymorphisms in DNA- or RNA-seq data.
This book presents the outcomes of the trans- and interdisciplinary research project NEMo (Nachhaltige Erfullung von Mobilitatsbedurfnissen im landlichen Raum - Sustainable Fulfilment of Mobility Needs in Rural Areas). Due to demographic change, it is becoming increasingly difficult for rural districts and communities to maintain a basic set of public transport services such as bus and train transit without encountering issues regarding necessary social participation, sensible regional value creation and, last but not least, achievable environmental protection goals. At the same time, the demand for mobility in rural areas will continue to rise in the future, e.g. due to the concentration of medical care facilities and shopping centres close to cities. Focusing on the development of sustainable and innovative mobility services and business models, this book explains how new mobility offers can be created in which citizens themselves become mobility providers. To do so, it combines the findings of the individual research groups with external contributions from science and practice.
This book discusses the semantic foundations of concurrent systems with nondeterministic and probabilistic behaviour. Particular attention is given to clarifying the relationship between testing and simulation semantics and characterising bisimulations from metric, logical, and algorithmic perspectives. Besides presenting recent research outcomes in probabilistic concurrency theory, the book exemplifies the use of many mathematical techniques to solve problems in computer science, which is intended to be accessible to postgraduate students in Computer Science and Mathematics. It can also be used by researchers and practitioners either for advanced study or for technical reference.
The book presents the life and works of one of Germany's most famous computer scientists, Carl Adam Petri. It is written in a vivid and entertaining manner, providing an in-depth discussion of the background behind Petri's best-known contribution to computer science, the Petri net. In this way the book can be read as a first introduction to nets, but it also covers the theoretical, physical and philosophical foundations behind nets, thus facilitating a comprehensive understanding of the wider range of Petri's works. The book is intended for readers with a previous knowledge in computer science, as well as for "interested non-professionals", who want to get to know a remarkable personality of contemporary science.
This text presents an algebraic approach to the construction of several important families of quantum codes derived from classical codes by applying the well-known Calderbank-Shor-Steane (CSS), Hermitian, and Steane enlargement constructions to certain classes of classical codes. In addition, the book presents families of asymmetric quantum codes with good parameters and provides a detailed description of the procedures adopted to construct families of asymmetric quantum convolutional codes.Featuring accessible language and clear explanations, the book is suitable for use in advanced undergraduate and graduate courses as well as for self-guided study and reference. It provides an expert introduction to algebraic techniques of code construction and, because all of the constructions are performed algebraically, it enables the reader to construct families of codes, rather than only codes with specific parameters. The text offers an abundance of worked examples, exercises, and open-ended problems to motivate the reader to further investigate this rich area of inquiry. End-of-chapter summaries and a glossary of key terms allow for easy review and reference.
I. Introduction.- 1. Set Systems and Languages.- 2. Graphs, Partially Ordered Sets and Lattices.- II. Abstract Linear Dependence - Matroids.- 1. Matroid Axiomatizations.- 2. Matroids and Optimization.- 3. Operations on Matroids.- 4. Submodular Functions and Polymatroids.- III. Abstract Convexity - Antimatroids.- 1. Convex Geometries and Shelling Processes.- 2. Examples of Antimatroids.- 3. Circuits and Paths.- 4. Helly's Theorem and Relatives.- 5. Ramsey-type Results.- 6. Representations of Antimatroids.- IV. General Exchange Structures - Greedoids.- 1. Basic Facts.- 2. Examples of Greedoids.- V. Structural Properties.- 1. Rank Function.- 2. Closure Operators.- 3. Rank and Closure Feasibility.- 4. Minors and Extensions.- 5. Interval Greedoids.- VI. Further Structural Properties.- 1. Lattices Associated with Greedoids.- 2. Connectivity in Greedoids.- VII. Local Poset Greedoids.- 1. Polymatroid Greedoids.- 2. Local Properties of Local Poset Greedoids.- 3. Excluded Minors for Local Posets.- 4. Paths in Local Poset Greedoids.- 5. Excluded Minors for Undirected Branchings Greedoids.- VIII. Greedoids on Partially Ordered Sets.- 1. Supermatroids.- 2. Ordered Geometries.- 3. Characterization of Ordered Geometries.- 4. Minimal and Maximal Ordered Geometries.- IX. Intersection, Slimming and Trimming.- 1. Intersections of Greedoids and Antimatroids.- 2. The Meet of a Matroid and an Antimatroid.- 3. Balanced Interval Greedoids.- 4. Exchange Systems and Gauss Greedoids.- X. Transposition Greedoids.- 1. The Transposition Property.- 2. Applications of the Transposition Property.- 3. Simplicial Elimination.- XI. Optimization in Greedoids.- 1. General Objective Functions.- 2. Linear Functions.- 3. Polyhedral Descriptions.- 4. Transversals and Partial Transversals.- 5. Intersection of Supermatroids.- XII. Topological Results for Greedoids.- 1. A Brief Review of Topological Prerequisites.- 2. Shellability of Greedoids and the Partial Tutte Polynomial.- 3. Homotopy Properties of Greedoids.- References.- Notation Index.- Author Index.- Inclusion Chart (inside the back cover).
Today, fuzzy methods provide tools to handle data sets in relevant, robust and interpretable ways, making it possible to model and exploit imprecision and uncertainty in data modeling and data mining. Scalable Fuzzy Algorithms for Data Management and Analysis: Methods and Design presents innovative, cutting-edge fuzzy techniques that highlight the relevance of fuzziness for huge data sets in the perspective of scalability issues, from both a theoretical and experimental point of view. It covers a wide scope of research areas including data representation, structuring and querying as well as information retrieval and data mining. It encompasses different forms of databases, including data warehouses, data cubes, tabular or relational data, and many applications among which music warehouses, video mining, bioinformatics, semantic web and data streams.
The main aim of this book is to discuss model order reduction (MOR) methods for differential-algebraic equations (DAEs) with linear coefficients that make use of splitting techniques before applying model order reduction. The splitting produces a system of ordinary differential equations (ODE) and a system of algebraic equations, which are then reduced separately. For the reduction of the ODE system, conventional MOR methods can be used, whereas for the reduction of the algebraic systems new methods are discussed. The discussion focuses on the index-aware model order reduction method (IMOR) and its variations, methods for which the so-called index of the original model is automatically preserved after reduction.
Marking the 30th anniversary of the European Conference on Modelling and Simulation (ECMS), this inspirational text/reference reviews significant advances in the field of modelling and simulation, as well as key applications of simulation in other disciplines. The broad-ranging volume presents contributions from a varied selection of distinguished experts chosen from high-impact keynote speakers and best paper winners from the conference, including a Nobel Prize recipient, and the first president of the European Council for Modelling and Simulation (also abbreviated to ECMS). This authoritative book will be of great value to all researchers working in the field of modelling and simulation, in addition to scientists from other disciplines who make use of modelling and simulation approaches in their work.
This book examines construction safety from the perspective of informatics and econometrics. It demonstrates the potential of employing various information technology approaches to share construction safety knowledge. In addition, it presents the application of econometrics in construction safety studies, such as an analytic hierarchy process used to create a construction safety index. It also discusses structure equation and dynamic panel models for the analysis of construction safety claims. Lastly, it describes the use of mathematical and econometric models to investigate construction practitioners' safety.
We are now entering an era where the human world assumes recognition of itself as data. Much of humanity's basis for existence is becoming subordinate to software processes that tabulate, index, and sort the relations that comprise what we perceive as reality. The acceleration of data collection threatens to relinquish ephemeral modes of representation to ceaseless processes of computation. This situation compels the human world to form relations with non-human agencies, to establish exchanges with software processes in order to allow a profound upgrade of our own ontological understanding. By mediating with a higher intelligence, we may be able to rediscover the inner logic of the age of intelligent machines. In The End of the Future, Stephanie Polsky conceives an understanding of the digital through its dynamic intersection with the advent and development of the nation-state, race, colonization, navigational warfare, mercantilism, and capitalism, and the mathematical sciences over the past five centuries, the era during which the world became "modern." The book animates the twenty-first century as an era in which the screen has split off from itself and proliferated onto multiple surfaces, allowing an inverted image of totalitarianism to flash up and be altered to support our present condition of binary apperception. It progresses through a recognition of atomized political power, whose authority lies in the control not of the means of production, but of information, and in which digital media now serves to legitimize and promote a customized micropolitics of identity management. On this new apostolate plane, humanity may be able to shape a new world in which each human soul is captured and reproduced as an autonomous individual bearing affects and identities. The digital infrastructure of the twenty-first century makes it possible for power to operate through an esoteric mathematical means, and for factual material to be manipulated in the interest of advancing the means of control. This volume travels a course from Elizabethan England, to North American slavery, through cybernetic Social Engineering, Cold War counterinsurgency, and the (neo)libertarianism of Silicon Valley in order to arrive at a place where an organizing intelligence that started from an ambition to resourcefully manipulate physical bodies has ended with their profound neutralization. |
![]() ![]() You may like...
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,470
Discovery Miles 24 700
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,319
Discovery Miles 43 190
|