![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
Improved geospatial instrumentation and technology such as in laser scanning has now resulted in millions of data being collected, e.g., point clouds. It is in realization that such huge amount of data requires efficient and robust mathematical solutions that this third edition of the book extends the second edition by introducing three new chapters: Robust parameter estimation, Multiobjective optimization and Symbolic regression. Furthermore, the linear homotopy chapter is expanded to include nonlinear homotopy. These disciplines are discussed first in the theoretical part of the book before illustrating their geospatial applications in the applications chapters where numerous numerical examples are presented. The renewed electronic supplement contains these new theoretical and practical topics, with the corresponding Mathematica statements and functions supporting their computations introduced and applied. This third edition is renamed in light of these technological advancements.
In this essay collection, leading physicists, philosophers, and historians attempt to fill the empty theoretical ground in the foundations of information and address the related question of the limits to our knowledge of the world. Over recent decades, our practical approach to information and its exploitation has radically outpaced our theoretical understanding - to such a degree that reflection on the foundations may seem futile. But it is exactly fields such as quantum information, which are shifting the boundaries of the physically possible, that make a foundational understanding of information increasingly important. One of the recurring themes of the book is the claim by Eddington and Wheeler that information involves interaction and putting agents or observers centre stage. Thus, physical reality, in their view, is shaped by the questions we choose to put to it and is built up from the information residing at its core. This is the root of Wheeler's famous phrase "it from bit." After reading the stimulating essays collected in this volume, readers will be in a good position to decide whether they agree with this view.
This book provides a general overview of multiple instance learning (MIL), defining the framework and covering the central paradigms. The authors discuss the most important algorithms for MIL such as classification, regression and clustering. With a focus on classification, a taxonomy is set and the most relevant proposals are specified. Efficient algorithms are developed to discover relevant information when working with uncertainty. Key representative applications are included. This book carries out a study of the key related fields of distance metrics and alternative hypothesis. Chapters examine new and developing aspects of MIL such as data reduction for multi-instance problems and imbalanced MIL data. Class imbalance for multi-instance problems is defined at the bag level, a type of representation that utilizes ambiguity due to the fact that bag labels are available, but the labels of the individual instances are not defined. Additionally, multiple instance multiple label learning is explored. This learning framework introduces flexibility and ambiguity in the object representation providing a natural formulation for representing complicated objects. Thus, an object is represented by a bag of instances and is allowed to have associated multiple class labels simultaneously. This book is suitable for developers and engineers working to apply MIL techniques to solve a variety of real-world problems. It is also useful for researchers or students seeking a thorough overview of MIL literature, methods, and tools.
The latest work by the world's leading authorities on the use of formal methods in computer science is presented in this volume, based on the 1995 International Summer School in Marktoberdorf, Germany. Logic is of special importance in computer science, since it provides the basis for giving correct semantics of programs, for specification and verification of software, and for program synthesis. The lectures presented here provide the basic knowledge a researcher in this area should have and give excellent starting points for exploring the literature. Topics covered include semantics and category theory, machine based theorem proving, logic programming, bounded arithmetic, proof theory, algebraic specifications and rewriting, algebraic algorithms, and type theory.
The last decade has witnessed a rapid surge of interest in new sensing and monitoring devices for wellbeing and healthcare. One key development in this area is wireless, wearable and implantable "in vivo" monitoring and intervention. A myriad of platforms are now available from both academic institutions and commercial organisations. They permit the management of patients with both acute and chronic symptoms, including diabetes, cardiovascular diseases, treatment of epilepsy and other debilitating neurological disorders. Despite extensive developments in sensing technologies, there are significant research issues related to system integration, sensor miniaturisation, low-power sensor interface, wireless telemetry and signal processing. In the 2nd edition of this popular and authoritative reference on Body Sensor Networks (BSN), major topics related to the latest technological developments and potential clinical applications are discussed, with contents covering. Biosensor Design, Interfacing and Nanotechnology Wireless Communication and Network Topologies Communication Protocols and Standards Energy Harvesting and Power Delivery Ultra-low Power Bio-inspired Processing Multi-sensor Fusion and Context Aware Sensing Autonomic Sensing Wearable, Ingestible Sensor Integration and Exemplar Applications System Integration and Wireless Sensor Microsystems The book also provides a comprehensive review of the current wireless sensor development platforms and a step-by-step guide to developing your own BSN applications through the use of BSN development kit.
This book provides a comprehensive presentation of the most advanced research results and technological developments enabling understanding, qualifying and mitigating the soft errors effect in advanced electronics, including the fundamental physical mechanisms of radiation induced soft errors, the various steps that lead to a system failure, the modelling and simulation of soft error at various levels (including physical, electrical, netlist, event driven, RTL, and system level modelling and simulation), hardware fault injection, accelerated radiation testing and natural environment testing, soft error oriented test structures, process-level, device-level, cell-level, circuit-level, architectural-level, software level and system level soft error mitigation techniques. The book contains a comprehensive presentation of most recent advances on understanding, qualifying and mitigating the soft error effect in advanced electronic systems, presented by academia and industry experts in reliability, fault tolerance, EDA, processor, SoC and system design, and in particular, experts from industries that have faced the soft error impact in terms of product reliability and related business issues and were in the forefront of the countermeasures taken by these companies at multiple levels in order to mitigate the soft error effects at a cost acceptable for commercial products. In a fast moving field, where the impact on ground level electronics is very recent and its severity is steadily increasing at each new process node, impacting one after another various industry sectors (as an example, the Automotive Electronics Council comes to publish qualification requirements on soft errors), research and technology developments and industrial practices have evolve very fast, outdating the most recent books edited at 2004.
In this book you will learn all of the basics required to rig any character in Maya. The book covers everything from joints to wires, from the connection editor to pruning small weights. With over 30 example files, 200 images, and countless step by step tutorials, you will be shown exactly how to rig a foot and leg, a hand, and much more. The thing that separates this book from the competition is answering the question of "Why?." The book covers exactly what is a gimbal lock and how do you avoid it? What axis should you use as your primary one? How do I add an influence object to fix a rig already in progress and why would I use a joint in some cases? Knowing why things are done the way they are will allow you to innovate and create new rigs. Knowing why will allow you to troubleshoot someone else's rig, and progress far beyond being a beginner. This book will help the beginner build a solid foundation and is a great addition for any character rigger using Maya. Proceeds donated to charity.
This book presents the first paradigm of social multimedia computing completely from the user perspective. Different from traditional multimedia and web multimedia computing which are content-centric, social multimedia computing rises under the participatory Web2.0 and is essentially user-centric. The goal of this book is to emphasize the user factor in facilitating effective solutions towards both multimedia content analysis, user modeling and customized user services. Advanced topics like cross-network social multimedia computing are also introduced as extensions and potential directions along this research line.
This book gathers selected high-quality research papers presented at Arab Conference for Emerging Technologies 2020 organized virtually in Cairo during 21-23 June 2020. This book emphasizes the role and recent developments in the field of emerging technologies and artificial intelligence, and related technologies with a special focus on sustainable development in the Arab world. The book targets high-quality scientific research papers with applications, including theory, practical, prototypes, new ideas, case studies and surveys which cover machine learning applications in data science.
VLSI 2010 Annual Symposium will present extended versions of the best papers presented in ISVLSI 2010 conference. The areas covered by the papers will include among others: Emerging Trends in VLSI, Nanoelectronics, Molecular, Biological and Quantum Computing. MEMS, VLSI Circuits and Systems, Field-programmable and Reconfigurable Systems, System Level Design, System-on-a-Chip Design, Application-Specific Low Power, VLSI System Design, System Issues in Complexity, Low Power, Heat Dissipation, Power Awareness in VLSI Design, Test and Verification, Mixed-Signal Design and Analysis, Electrical/Packaging Co-Design, Physical Design, Intellectual property creating and sharing.
Studying narratives is often the best way to gain a good understanding of how various aspects of human information are organized and integrated-the narrator employs specific informational methods to build the whole structure of a narrative through combining temporally constructed events in light of an array of relationships to the narratee and these methods reveal the interaction of the rational and the sensitive aspects of human information. Computational and Cognitive Approaches to Narratology discusses issues of narrative-related information and communication technologies, cognitive mechanism and analyses, and theoretical perspectives on narratives and the story generation process. Focusing on emerging research as well as applications in a variety of fields including marketing, philosophy, psychology, art, and literature, this timely publication is an essential reference source for researchers, professionals, and graduate students in various information technology, cognitive studies, design, and creative fields.
This book covers the important aspects involved in making cognitive radio devices portable, mobile and green, while also extending their service life. At the same time, it presents a variety of established theories and practices concerning cognitive radio from academia and industry. Cognitive radio can be utilized as a backbone communication medium for wireless devices. To effectively achieve its commercial application, various aspects of quality of service and energy management need to be addressed. The topics covered in the book include energy management and quality of service provisioning at Layer 2 of the protocol stack from the perspectives of medium access control, spectrum selection, and self-coexistence for cognitive radio networks.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
The 4th FTRA International Conference on Information Technology
Convergence and Services (ITCS-12) will be held in Gwangju, Korea
on September 6 - 8, 2012.
The second volume of the two volumes book is dedicated to various extensions and generalizations of Dyadic (Walsh) analysis and related applications. Considered are dyadic derivatives on Vilenkin groups and various other Abelian and finite non-Abelian groups. Since some important results were developed in former Soviet Union and China, we provide overviews of former work in these countries. Further, we present translations of three papers that were initially published in Chinese. The presentation continues with chapters written by experts in the area presenting discussions of applications of these results in specific tasks in the area of signal processing and system theory. Efficient computing of related differential operators on contemporary hardware, including graphics processing units, is also considered, which makes the methods and techniques of dyadic analysis and generalizations computationally feasible. The volume 2 of the book ends with a chapter presenting open problems pointed out by several experts in the area.
This series, since its first volume in 1960 and now the oldest
series still being published, covers new developments in computer
technology. Each volume contains from 5 to 7 chapters and 3 volumes
are produced annually. Most chapters present an overview of a
current subfield within computer science, include many citations,
and often new developments in the field by the authors of the
individual chapters. Topics include hardware, software, web
technology, communications, theoretical underpinnings of computing,
and novel applications of computers. The book series is a valuable
addition to university courses that emphasize the topics under
discussion in that particular volume as well as belonging on the
bookshelf of industrial practitioners who need to implement many of
the technologies that are described.
1. Paradigmatische Konstruktionen.- Unser heutiges Wirklichkeits-Verstandnis.- Wirklichkeits-Pluralismus.- Entstehen von Wirklichkeiten.- Lebendiger Vollzug von Wirklichkeiten.- Fruchtbare Vielfalt.- Simultane und sequenzielle Wirklichkeiten in der Lebenswelt.- Okkulte Wirklichkeiten und andere Geheimlehren.- Gefahrliche Verabsolutierungen.- 2. Farbe als Wirklichkeit.- Goethes Farbenlehre.- Physiologische Farben.- Farblose Bilder.- Farbige Bilder.- Farbige Schatten.- Schwach wirkende Lichter, subjektive Hoefe, pathologische Farben.- Physische Farben.- Dioptrische Farben der 1. Klasse.- Dioptrische Farben der 2. Klasse.- Das Phanomen der Refraktion.- Refraktion ohne Farberscheinung.- Farberscheinungen bei Linsen.- Grundzuge refraktionsbedingter Farberscheinungen.- Farberscheinungen bei Prismen.- Farberscheinungen an gro?en und kleinen wei?en Bildern.- Farberscheinungen an gro en und kleinen schwarzen Bildern.- Farberscheinungen sind nie statisch.- Zum Wesen von Licht und Farbe aus Goetheseher Sieht.- Wichtige, ganz allgemeine Begriffe.- Die Polaritat.- Die Steigerung.- Phanomen und Urphanomen.- Farbenkreis und Spektrogramm.- Newtons Farben des Liehts.- Newtons Experimente.- 1. Experiment.- 2. Experiment.- 3. Experiment.- 4. Experiment.- 5. Experiment.- Das We sen der Farbe.- Einfache Farbmetrik.- Das Auge.- Der Spektralfarbenzug.- Zwei Wirklichkeiten.- 3. Heilkundliche Wirkliehkeiten.- Chinesische Lebenswirkliehkeit.- Das Schafgarbenorakel.- Das Yin-Yang-Prinzip.- Shen und Kuei. Qi und Jing.- Die funf Elemente.- Chinesische Medizin.- Yin-Yang-Theorie.- Lebenssubstanzen.- Qi.- Blut und Safte.- Jing.- Shen.- Die Funktion der inneren Organe.- Die Leitbahnen oder die Meridiane.- Wie kommt es zur Disharmonie?.- Die Sechs UEbel.- Die sieben Emotionen.- Die Lebensweise.- Das Dishannoniemuster.- Ein Beispiel.- Ein simultanes Massenphanomen.- 4. Mikro-Wirklichkeiten.- Spiele als Mikro-Wirklichkeiten.- Definition des Spielbegriffes.- Die Vielfalt der Spiele.- Mikro-Wirklichkeiten im weiteren Sinn.- 5. Wirklichkeit eines Verbrechens.- Ein Beispiel aus der japanischen Literatur.- Eine neue Erzlihlung des Rashomon-Textes.- Die Aussage eines Holzfallers.- Die Aussage eines Wandergeistlichen.- Die Aussage eines Gerichtsdieners.- Die Aussage einer alten Frau.- Das Gestandnis des Raubers.- Die Aussage eines Gefahrten des Raubers.- Bericht eines Waldbewohners.- Die Beichte der Ehefrau in einem Kloster.- Der Geist des Toten spricht durch den Mund einer Wahrsagerin.- Vergewaltigung und Tod.- 6. Verwandlung von Wirklichkeiten.- Siddhartha. Eine indische Dichtung.- Die Brahmana-Welt.- Die Samana-Welt.- Die Buddha-Welt.- Die Menschenkinder-Welt.- Am Flu?.- 7. Magie und Damonie.- Weissagung.- Wirksarnkeit von Weissagungen.- Kassandra.- Die delphische Seherin.- Andere Fonnen der Weissagung.- Zauber und Damonen.- Magische Praktikep in der Volkskunst.- Magische Praktiken' der Antike.- Kirke verzaubert Manner.- Hexen morden Knaben.- Fluche verandern das Leben.- Fluchtafeln.- Ovids Ibis.- Schamanen.- Spuren des Schamanismus in der Neuzeit.- Antike Schamanen.- Orpheus.- Pythagoras.- Empedokles.- Vespasian.- Nekromantie.- Die Macht des Okkulten.- Magie und Damonie als Wirklichkeit?.- 8. Totalitare Wirklichkeiten.- Wahnsinn als totalitare Wirklichkeit.- Das Entstehen eines Wahnes.- Der logische Zusammenhang von Wahnideen.- Die weitgehende Unkorrigierbarkeit.- Gro?en und Verfolgungswahn.- Groe?enwahn.- Verfolgungswahn.- Paranoia erotica.- Eifersuchtsparanoia.- Religioeser Wahn mit erotischer Komponente.- Kraftentfaltung in totalitaren Wirklichkeiten.- Der Kriegstanz der Maori.- Atomare Bedrohung.- Extremsituationen in totalitaren Wirklichkeiten.- Der Tag des Blutes.- Der spontane Volkszorn.- Entgleisung einer Hochtechnologie.- Die Eigendynamik und die Hilflosigkeit.- 9. Chance und Bedrangnis.- Wirklichkeit ist eine Konstruktion. Der Urgrund ist ohne Eigenschaften.- Wirklichkeiten als Gewordenes.- Die Lebenswirklichkeit als Ausgangsbasi
This book describes new algorithms and ideas for making effective decisions under constraints, including applications in control engineering, manufacturing (how to optimally determine the production level), econometrics (how to better predict stock market behavior), and environmental science and geosciences (how to combine data of different types). It also describes general algorithms and ideas that can be used in other application areas. The book presents extended versions of selected papers from the annual International Workshops on Constraint Programming and Decision Making (CoProd'XX) from 2013 to 2016. These workshops, held in the US (El Paso, Texas) and in Europe (Wurzburg, Germany, and Uppsala, Sweden), have attracted researchers and practitioners from all over the world. It is of interest to practitioners who benefit from the new techniques, to researchers who want to extend the ideas from these papers to new application areas and/or further improve the corresponding algorithms, and to graduate students who want to learn more - in short, to anyone who wants to make more effective decisions under constraints.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.
This book offers a comprehensive and accessible exposition of Euclidean Distance Matrices (EDMs) and rigidity theory of bar-and-joint frameworks. It is based on the one-to-one correspondence between EDMs and projected Gram matrices. Accordingly the machinery of semidefinite programming is a common thread that runs throughout the book. As a result, two parallel approaches to rigidity theory are presented. The first is traditional and more intuitive approach that is based on a vector representation of point configuration. The second is based on a Gram matrix representation of point configuration. Euclidean Distance Matrices and Their Applications in Rigidity Theory begins by establishing the necessary background needed for the rest of the book. The focus of Chapter 1 is on pertinent results from matrix theory, graph theory and convexity theory, while Chapter 2 is devoted to positive semidefinite (PSD) matrices due to the key role these matrices play in our approach. Chapters 3 to 7 provide detailed studies of EDMs, and in particular their various characterizations, classes, eigenvalues and geometry. Chapter 8 serves as a transitional chapter between EDMs and rigidity theory. Chapters 9 and 10 cover local and universal rigidities of bar-and-joint frameworks. This book is self-contained and should be accessible to a wide audience including students and researchers in statistics, operations research, computational biochemistry, engineering, computer science and mathematics.
Podcasting Success in a Day: Beginner's Guide to Fast, Easy, and Efficient Learning of Podcasting What is Podcasting? Want to take your online marketing to the next level and provide Podcasts? Need simple guide to getting started with Podcasting? Need cheap and easy solutions to Podcasting? What equipment to use for Podcasting? How about a successful strategy to Podcasting? Want tips on how to get consumers to subscribe to your podcast? All start today right here with one click!
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful." |
![]() ![]() You may like...
Web Services - Concepts, Methodologies…
Information Reso Management Association
Hardcover
R9,718
Discovery Miles 97 180
Learn to Design a Website for Your…
Michael Nelson, David Ezeanaka
Hardcover
R502
Discovery Miles 5 020
Analytic Number Theory - In Honor of…
Carl Pomerance, Michael Th Rassias
Hardcover
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,412
Discovery Miles 14 120
|