![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
Organizations of all types are consistently working on new initiatives, product lines, or implementation of new workflows as a way to remain competitive in the modern business environment. No matter the type of project, employing the best methods for effective execution and timely completion of the task at hand is essential to project success. The implementation of computer technology has provided further opportunities for innovation and progress in the daily operations and initiatives of corporations. Knowledge Management and Innovation in Network Organizations: Emerging Research and Opportunities is an essential scholarly resource that explores the use of information communication technologies in management models and the development of network organizations operating in various sectors of the economy. Highlighting coverage on a wide range of topics such as cloud computing, organizational development, and business management, this book is ideal for business professionals, organizational researchers, and academicians interested in the latest research on network organizations.
Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design. It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508. The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."
This book focuses on the development of three novel approaches to build up a framework for the frequency domain analysis and design of nonlinear systems. The concepts are derived from Volterra series representation of nonlinear systems which are described by nonlinear difference or differential equations. Occupying the middle ground between traditional linear approaches and more complex nonlinear system theories, the book will help readers to have a good start to analyse and exploit the nonlinearities. Analysis and Design of Nonlinear Systems in the Frequency Domain provides clear illustrations and examples at the beginning and the end of each chapter, respectively, making it of interest to both academics and practicing engineers.
M-commerce (mobile-commerce) refers to e-commerce activities carried out via a mobile terminal such as a phone or PDA. M-commerce applications for both individuals and organizations are expected to grow considerably over the next few years. Mobile Commerce: Technology, Theory and Applications addresses issues pertaining to the development, deployment, and use of these applications. The objective of this book is to provide a single source of up-to-date information about mobile commerce including the technology (hardware and software) involved, research on the expected impact of this technology on businesses and consumers, and case studies describing state-of-the-art m-commerce applications and lessons learned.
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience. After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory.
Decades of research have shown that student collaboration in groups doesn't just happen; rather it needs to be a deliberate process facilitated by the instructor. Promoting collaboration in virtual learning environments presents a variety of challenges. Computer-Supported Collaborative Learning: Best Practices & Principles for Instructors answers the demand for a thorough resource on techniques to facilitate effective collaborative learning in virtual environments. This book provides must-have information on the role of the instructor in computer-supported collaborative learning, real-world perspectives on virtual learning group collaboration, and supporting learning group motivation.
The aim of the book is to give an accessible introduction of mathematical models and signal processing methods in speech and hearing sciences for senior undergraduate and beginning graduate students with basic knowledge of linear algebra, differential equations, numerical analysis, and probability. Speech and hearing sciences are fundamental to numerous technological advances of the digital world in the past decade, from music compression in MP3 to digital hearing aids, from network based voice enabled services to speech interaction with mobile phones. Mathematics and computation are intimately related to these leaps and bounds. On the other hand, speech and hearing are strongly interdisciplinary areas where dissimilar scientific and engineering publications and approaches often coexist and make it difficult for newcomers to enter.
This book provides a platform for academics and practitioners for sharing innovative results, approaches, developments, and research projects in computer science and information technology, focusing on the latest challenges in advanced computing and solutions introducing mathematical and engineering approaches. The book presents discussions in the area of advances and challenges of modern computer science, including telecommunications and signal processing, machine learning and artificial intelligence, intelligent control systems, modeling and simulation, data science and big data, data visualization and graphics systems, distributed, cloud and high-performance computing, and software engineering. The papers included are presented at TELECCON 2019 organized by Peter the Great St. Petersburg University during November 18-19, 2019.
This is the first book devoted to the task of computing integrability structures by computer. The symbolic computation of integrability operator is a computationally hard problem and the book covers a huge number of situations through tutorials. The mathematical part of the book is a new approach to integrability structures that allows to treat all of them in a unified way. The software is an official package of Reduce. Reduce is free software, so everybody can download it and make experiments using the programs available at our website.
Software has long been perceived as complex, at least within
Software Engineering circles. We have been living in a recognised
state of crisis since the first NATO Software Engineering
conference in 1968. Time and again we have been proven unable to
engineer reliable software as easily/cheaply as we imagined. Cost
overruns and expensive failures are the norm.
This book addresses the basics of interval/fuzzy set theory, artificial neural networks (ANN) and computational methods. It presents step-by-step modeling for application problems along with simulation and numerical solutions. In general, every science and engineering problem is inherently biased by uncertainty, and there is often a need to model, solve and interpret problems in the world of uncertainty. At the same time, exact information about models and parameters of practical applications is usually not known and precise values do not exist. This book discusses uncertainty in both data and models. It consists of seven chapters covering various aspects of fuzzy uncertainty in application problems, such as shallow water wave equations, static structural problems, robotics, radon diffusion in soil, risk of invasive alien species and air quality quantification. These problems are handled by means of advanced computational and fuzzy theory along with machine intelligence when the uncertainties involved are fuzzy. The proposed computational methods offer new fuzzy computing methods that help other areas of knowledge construction where inexact information is present.
This book presents a mathematical treatment of the radio resource allocation of modern cellular communications systems in contested environments. It focuses on fulfilling the quality of service requirements of the living applications on the user devices, which leverage the cellular system, and with attention to elevating the users' quality of experience. The authors also address the congestion of the spectrum by allowing sharing with the band incumbents while providing with a quality-of-service-minded resource allocation in the network. The content is of particular interest to telecommunications scheduler experts in industry, communications applications academia, and graduate students whose paramount research deals with resource allocation and quality of service.
Whether by synergy or by synthesis, development and technology are becoming synonymous in every domain. Cases on Transnational Learning and Technologically Enabled Environments reports on national and international initiatives undertaken to adapt advancements in information and communication technology and successfully face the challenges posed by various social and economic forces. The international research in this book represents instances of institutions that are in transition as well as those that are readily using technology in education.
This book shows how mathematics, computer science and science can be usefully and seamlessly intertwined. It begins with a general model of cognitive processes in a network of computational nodes, such as neurons, using a variety of tools from mathematics, computational science and neurobiology. It then moves on to solve the diffusion model from a low-level random walk point of view. It also demonstrates how this idea can be used in a new approach to solving the cable equation, in order to better understand the neural computation approximations. It introduces specialized data for emotional content, which allows a brain model to be built using MatLab tools, and also highlights a simple model of cognitive dysfunction.
This book presents a unique, understandable view of machine learning using many practical examples and access to free professional software and open source code. The user-friendly software can immediately be used to apply everything you learn in the book without the need for programming. After an introduction to machine learning and artificial intelligence, the chapters in Part II present deeper explanations of machine learning algorithms, performance evaluation of machine learning models, and how to consider data in machine learning environments. In Part III the author explains automatic speech recognition, and in Part IV biometrics recognition, face- and speaker-recognition. By Part V the author can then explain machine learning by example, he offers cases from real-world applications, problems, and techniques, such as anomaly detection and root cause analyses, business process improvement, detecting and predicting diseases, recommendation AI, several engineering applications, predictive maintenance, automatically classifying datasets, dimensionality reduction, and image recognition. Finally, in Part VI he offers a detailed explanation of the AI-TOOLKIT, software he developed that allows the reader to test and study the examples in the book and the application of machine learning in professional environments. The author introduces core machine learning concepts and supports these with practical examples of their use, so professionals will appreciate his approach and use the book for self-study. It will also be useful as a supplementary resource for advanced undergraduate and graduate courses on machine learning and artificial intelligence.
This book bridges fundamental gaps between control theory and formal methods. Although it focuses on discrete-time linear and piecewise affine systems, it also provides general frameworks for abstraction, analysis, and control of more general models. The book is self-contained, and while some mathematical knowledge is necessary, readers are not expected to have a background in formal methods or control theory. It rigorously defines concepts from formal methods, such as transition systems, temporal logics, model checking and synthesis. It then links these to the infinite state dynamical systems through abstractions that are intuitive and only require basic convex-analysis and control-theory terminology, which is provided in the appendix. Several examples and illustrations help readers understand and visualize the concepts introduced throughout the book.
This research volume presents a sample of recent contributions related to the issue of quality-assessment for Web Based information in the context of information access, retrieval, and filtering systems. The advent of the Web and the uncontrolled process of documents' generation have raised the problem of declining quality assessment to information on the Web, by considering both the nature of documents (texts, images, video, sounds, and so on), the genre of documents ( news, geographic information, ontologies, medical records, products records, and so on), the reputation of information sources and sites, and, last but not least the actions performed on documents (content indexing, retrieval and ranking, collaborative filtering, and so on). The volume constitutes a compendium of both heterogeneous approaches and sample applications focusing specific aspects of the quality assessment for Web-based information for researchers, PhD students and practitioners carrying out their research activity in the field of Web information retrieval and filtering, Web information mining, information quality representation and management.
This book offers a self-contained guide to advanced algorithms and their applications in various fields of science. Gathering contributions by authoritative researchers in the field of mathematics, statistics and computer science, it aims at offering a comprehensive and up-to-date view of algorithms, including the theory behind them, as well as practical considerations, current limitations and solutions. It covers applications in energy management, decision making, computer networks, materials science, mechanics and process optimization. It offers an integrated and timely guide to important algorithms, and represents a valuable reference resource for graduate students and researchers in various fields of applied mathematics, statistics and engineering.
This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.
The focus of this book is the P-versus-NP Question and the theory of NP-completeness. It also provides adequate preliminaries regarding computational problems and computational models. The P-versus-NP Question asks whether or not finding solutions is harder than checking the correctness of solutions. An alternative formulation asks whether or not discovering proofs is harder than verifying their correctness. It is widely believed that the answer to these equivalent formulations is positive, and this is captured by saying that P is different from NP. Although the P-versus-NP Question remains unresolved, the theory of NP-completeness offers evidence for the intractability of specific problems in NP by showing that they are universal for the entire class. Amazingly enough, NP-complete problems exist, and furthermore hundreds of natural computational problems arising in many different areas of mathematics and science are NP-complete.
This book deals with an information-driven approach to plan materials discovery and design, iterative learning. The authors present contrasting but complementary approaches, such as those based on high throughput calculations, combinatorial experiments or data driven discovery, together with machine-learning methods. Similarly, statistical methods successfully applied in other fields, such as biosciences, are presented. The content spans from materials science to information science to reflect the cross-disciplinary nature of the field. A perspective is presented that offers a paradigm (codesign loop for materials design) to involve iteratively learning from experiments and calculations to develop materials with optimum properties. Such a loop requires the elements of incorporating domain materials knowledge, a database of descriptors (the genes), a surrogate or statistical model developed to predict a given property with uncertainties, performing adaptive experimental design to guide the next experiment or calculation and aspects of high throughput calculations as well as experiments. The book is about manufacturing with the aim to halving the time to discover and design new materials. Accelerating discovery relies on using large databases, computation, and mathematics in the material sciences in a manner similar to the way used to in the Human Genome Initiative. Novel approaches are therefore called to explore the enormous phase space presented by complex materials and processes. To achieve the desired performance gains, a predictive capability is needed to guide experiments and computations in the most fruitful directions by reducing not successful trials. Despite advances in computation and experimental techniques, generating vast arrays of data; without a clear way of linkage to models, the full value of data driven discovery cannot be realized. Hence, along with experimental, theoretical and computational materials science, we need to add a "fourth leg'' to our toolkit to make the "Materials Genome'' a reality, the science of Materials Informatics.
Since its first volume in 1960, Advances in Computers has
presented detailed coverage of innovations in computer hardware,
software, theory, design, and applications. It has also provided
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles usually allow.
As a result, many articles have become standard references that
continue to be of sugnificant, lasting value in this rapidly
expanding field.
Increasing numbers of businesses and Information Technology firms are outsourcing their software and Web development tasks. It is has been estimated that currently half of the Fortune 500 companies have utilized outsourcing for their development needs and estimates that by the end of 2008, 40% of U.S. companies will either develop, test, support, or store software overseas, with another 40% considering doing the same. Several industries, from computer software to telemarketing, have begun aggressively shifting white-collar work out of the United States. The United States currently accounts for more than half of worldwide spending on IT outsourcing, with a growing portion of this spending going to countries such as India, Russia, and the Philippines, and this trend will continue. Research has indicated that the primary problem is language because of idiomatic expressions and subtle cultural nuances associated with the use of particular words. Thus communication frequently breaks down when dealing with overseas companies. |
![]() ![]() You may like...
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,214
Discovery Miles 42 140
Systems Analysis And Design In A…
John Satzinger, Robert Jackson, …
Hardcover
![]()
The Oxford Handbook of Music and…
Sheila Whiteley, Shara Rambarran
Hardcover
R4,890
Discovery Miles 48 900
|