Your cart is empty
This book integrates the foundations of quantum computing with a hands-on coding approach to this emerging field; it is the first work to bring these strands together in an updated manner. This work is suitable for both academic coursework and corporate technical training. This volume comprises three books under one cover: Part I outlines the necessary foundations of quantum computing and quantum circuits. Part II walks through the canon of quantum computing algorithms and provides code on a range of quantum computing methods in current use. Part III covers the mathematical toolkit required to master quantum computing. Additional resources include a table of operators and circuit elements and a companion GitHub site providing code and updates. Jack D. Hidary is a research scientist in quantum computing and in AI at Alphabet X, formerly Google X. "Quantum Computing will change our world in unexpected ways. Everything technology leaders, engineers and graduate students need is in this book including the methods and hands-on code to program on this novel platform." -Eric Schmidt, PhD, Former Chairman and CEO of Google; Founder, Innovation Endeavors
This newly expanded and updated second edition of the best-selling classic continues to take the "mystery" out of designing algorithms, and analyzing their efficacy and efficiency. Expanding on the first edition, the book now serves as the primary textbook of choice for algorithm design courses while maintaining its status as the premier practical reference guide to algorithms for programmers, researchers, and students. The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing design over analysis. The first part, Techniques, provides accessible instruction on methods for designing and analyzing computer algorithms. The second part, Resources, is intended for browsing and reference, and comprises the catalog of algorithmic resources, implementations and an extensive bibliography. NEW to the second edition: * Doubles the tutorial material and exercises over the first edition * Provides full online support for lecturers, and a completely updated and improved website component with lecture slides, audio and video * Contains a unique catalog identifying the 75 algorithmic problems that arise most often in practice, leading the reader down the right path to solve them * Includes several NEW "war stories" relating experiences from real-world applications * Provides up-to-date links leading to the very best algorithm implementations available in C, C++, and Java
The "Drag and Drop Series" is a series of 12 books, mainly aimed at beginners and students. It is based on the WYSIWYG (What You See is What You Get) method, so the reader can easily correlated what is written in the book with what is displayed of dragging, dropping and clicking on the command with the mouse. Each book in the series focuses on a particular software and explains it in a clear and concise manner.
This pioneering text/reference explores how innovative new modes of computation may provide exciting new directions for future developments in the music industry, guiding the reader through the latest research in this emerging, interdisciplinary field. This work includes coverage of electronic music compositions and performances that incorporate unconventional interfacing, hacking and circuit bending. Features: presents an introduction to unconventional computing in music; discusses initiatives involving biophysical electronic music, the work of self-styled silicon luthiers, and the intersection of music and quantum computing; introduces the memristor, a new electronic component with the potential to revolutionize how computers are built; reviews experiments and practical applications of biological memristors in music; describes IMUSIC, an unconventional tone-based programming language, which enables the programming of computers using musical phrases; includes review questions at the end of each chapter.
The issue of water quality monitoring is becoming a huge area as the EU requirements for cleaner water increase. On-line monitoring involves measuring a body of water constantly and in-situ as opposed to analysing samples in the lab. Currently filling the gap in the market, "Wastewater Quality Monitoring: On-line Methods" provides information on how to produce the best analyses of wastewater in order to meet the above mentioned requirements.
This reference will prove invaluable to all local water companies, industrial companies producing wastewater, as well as environment agencies and researchers.
Many of the significant developments of our era have resulted from advances in technology, including the design of large-scale systems; advances in medicine, manufacturing, and artificial intelligence; the role of social media in influencing behaviour and toppling governments; and the surge of online transactions that are replacing human face-to-face interactions. These advances have given rise to new kinds of ethical concerns around the uses (and misuses) of technology. This collection of essays by prominent academics and technology leaders covers important ethical questions arising in modern industry, offering guidance on how to approach these dilemmas. Chapters discuss what we can learn from the ethical lapses of #MeToo, Volkswagen, and Cambridge Analytica, and highlight the common need across all applications for sound decision-making and understanding the implications for stakeholders. Technologists and general readers with no formal ethics training and specialists exploring technological applications to the field of ethics will benefit from this overview.
The three-volume set CCIS 1224, CCIS 1225, and CCIS 1226 contains the extended abstracts of the posters presented during the 21st International Conference on Human-Computer Interaction, HCII 2020, which took place in Copenhagen, Denmark, in July 2020.* HCII 2020 received a total of 6326 submissions, of which 1439 papers and 238 posters were accepted for publication in the pre-conference proceedings after a careful reviewing process. The 238 papers presented in these three volumes are organized in topical sections as follows: Part I: design and evaluation methods and tools; user characteristics, requirements and preferences; multimodal and natural interaction; recognizing human psychological states; user experience studies; human perception and cognition. -AI in HCI. Part II: virtual, augmented and mixed reality; virtual humans and motion modelling and tracking; learning technology. Part III: universal access, accessibility and design for the elderly; smartphones, social media and human behavior; interacting with cultural heritage; human-vehicle interaction; transport, safety and crisis management; security, privacy and trust; product and service design. *The conference was held virtually due to the COVID-19 pandemic.
With more than 500 new apps entering the market every day, what does it take to build a successful digital product? You can greatly reduce your risk of failure with design sprints, a process that enables your team to prototype and test a digital product idea within a week. This practical guide shows you exactly what a design sprint involves and how you can incorporate the process into your organization. Design sprints not only let you test digital product ideas before you pour too many resources into a project, they also help everyone get on board-whether they're team members, decision makers, or potential users. You'll know within days whether a particular product idea is worth pursuing. Design sprints enable you to: Clarify the problem at hand, and identify the needs of potential users Explore solutions through brainstorming and sketching exercises Distill your ideas into one or two solutions that you can test Prototype your solution and bring it to life Test the prototype with people who would use it
Starting from first principles, this book covers all of the foundational material needed to develop a clear understanding of the Mathematica language, with a practical emphasis on solving problems. Concrete examples throughout the text demonstrate how Mathematica language, can be used to solve problems in science, engineering, economics/finance, computational linguistics, geoscience, bioinformatics, and a range of other fields. The book will appeal to students, researchers and programmers wishing to further their understanding of Mathematica language. Designed to suit users of any ability, it assumes no formal knowledge of programming so it is ideal for self-study. Over 290 exercises are provided to challenge the reader s understanding of the material covered and these provide ample opportunity to practice using the language. Mathematica language notebooks containing examples, programs and solutions to exercises are available from www.cambridge.org/wellin."
Lecture Series on Computer and on Computational Sciences (LSCCS) aims to provide a medium for the publication of new results and developments of high-level research and education in the field of computer and computational science. In this series, only selected proceedings of conferences in all areas of computer science and computational sciences will be published. All publications are aimed at top researchers in the field and all papers in the proceedings volumes will be strictly peer reviewed. The series aims to cover the following areas of computer and computational sciences: Computer Science Hardware Computer Systems Organization Software Data Theory of Computation Mathematics of Computing Information Systems Computing Methodologies Computer Applications Computing Milieu Computational Sciences Computational Mathematics, Theoretical and Computational Physics, Theoretical and Computational Chemistry Scientific Computation Numerical and Computational Algorithms, Modeling and Simulation of Complex System, Web-Based Simulation and Computing, Grid-Based Simulation and Computing Fuzzy Logic, Hybrid Computational Methods, Data Mining and Information Retrieval and Virtual Reality, Reliable Computing, Image Processing, Computational Science and Education
With this practical book, architects, CTOs, and CIOs will learn a set of patterns for the practice of architecture, including analysis, documentation, and communication. Author Eben Hewitt shows you how to create holistic and thoughtful technology plans, communicate them clearly, lead people toward the vision, and become a great architect or Chief Architect. This book covers each key aspect of architecture comprehensively, including how to incorporate business architecture, information architecture, data architecture, application (software) architecture together to have the best chance for the system's success. Get a practical set of proven architecture practices focused on shipping great products using architecture Learn how architecture works effectively with development teams, management, and product management teams through the value chain Find updated special coverage on machine learning architecture Get usable templates to start incorporating into your teams immediately Incorporate business architecture, information architecture, data architecture, and application (software) architecture together
Information technologies have become an integral part of writing and communication courses, shaping the ways students and teachers think about and do their work. But, too often, teachers and other educational stakeholders take a passive or simply reactive role in institutional approaches to technologies, and this means they are missing out on the chance to make positive changes in their departments and on campus. Institutional Literacies argues that writing and communication teachers and program directors should collaborate more closely and engage more deeply with IT staff as technology projects are planned, implemented, and expanded. Teachers need to both analyze how their institutions approach information technologies and intervene in productive ways as active university citizens with relevant expertise. To help them do so, the book offers a three-part heuristic, reflecting the reality that academic IT units are complex and multilayered, with historical, spatial, and textual dimensions. It discusses six ways teachers can intervene in the academic IT work of their own institutions: maintaining awareness, using systems and services, mediating for audiences, participating as user advocates, working as designers, and partnering as researchers. With these strategies in hand, educators can be proactive in helping institutional IT approaches align with the professional values and practices of writing and communication programs.
This book examines contemporary structural social injustices from a feminist perspective. It asks: what makes oppression, discrimination, and domination wrongful? Is there a single wrongness-making feature of various social injustices that are due to social kind membership? Why is sexist oppression of women wrongful? What does the wrongfulness of patriarchal damage done to women consist in? In thinking about what normatively grounds social injustice, the book puts forward two related views. First, it argues for a paradigm shift in focus away from feminist philosophy that is organized around the gender concept woman, and towards feminist philosophy that is humanist. This is against the following theoretical backdrop: Politically effective feminism requires ways to elucidate how and why patriarchy damages women, and to articulate and defend feminism's critical claims. In order to meet these normative demands an influential theoretical outlook has emerged: for emancipatory purposes feminist philosophers should articulate a thick conception of the gender concept woman around which feminist philosophical work is organized. However, Part I of the book argues that we should resist this move, and that feminist philosophers should reframe their analyses of injustice in humanist terms. Second, the book spells out a humanist alternative to the more prevalent gender-focus in feminist philosophy. This hinges on a notion of dehumanization, which Part II of the book develops. The argued for understanding of dehumanization is used to explicate the wrongness-making feature of social injustices, both in general and of those due to patriarchy. Dehumanization is not another form of injustice-rather, it is that which makes forms of social injustice unjust. The book's second part then provides a regimentation of social injustice from a feminist perspective in order to spell out the specifics of the proposed humanist feminism, and to demonstrate how it improves some non-feminist analyses of injustice too.
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020. The 21 papers presented in this book were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on zero knowledge, symmetric key cryptography, elliptic curves, post quantum cryptography, lattice based cryptography, side channel attacks, cryptanalysis and new algorithms and schemes. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
This two-volume set LNAI 12163 and 12164 constitutes the refereed proceedings of the 21th International Conference on Artificial Intelligence in Education, AIED 2020, held in Ifrane, Morocco, in July 2020.* The 49 full papers presented together with 66 short, 4 industry & innovation, 4 doctoral consortium, and 4 workshop papers were carefully reviewed and selected from 214 submissions. The conference provides opportunities for the cross-fertilization of approaches, techniques and ideas from the many fields that comprise AIED, including computer science, cognitive and learning sciences, education, game design, psychology, sociology, linguistics as well as many domain-specific areas. *The conference was held virtually due to the COVID-19 pandemic.
Learn how to institute and implement enterprise architecture in your organisation. You can make a quick start and establish a baseline for your enterprise architecture within ten weeks, then grow and stabilise the architecture over time using the proven Ready, Set, Go Approach. Reading this book will: Give you directions on how to institute and implement enterprise architecture in your organization. You will be able to build close relationships with stakeholders and delivery teams, but you will not need to micromanage the architectures operations; Increase your awareness that enterprise architecture is about business, not information technology; Enable you to initiate and facilitate dramatic business development. The architecture of an enterprise must be tolerant of currently unknown business initiatives; Show you how to get a holistic view of the process of implementing enterprise architecture; Make you aware that information is a key business asset and that information architecture is a key part of the enterprise architecture; Allow you to learn from our experiences. This book is based on our 30 years of work in the enterprise architecture field, colleagues in Europe, customer cases, and students. If your company is about to make a major change and you are looking for a way to reduce the changes into manageable pieces -- and still retain control of how they fit together -- this is your handbook. Maybe you are already acting as an enterprise architect and using a formal method, but you need practical hints. Or maybe you are about to set up an enterprise architect network or group of specialists and need input on how to organise your work. The Ready-Set-Go method for introducing enterprise architecture provides you, the enterprise architect, with an immediate understanding of the basic steps for starting, organising, and operating the entirety of your organisations architecture. Chapter 1 shows how to model and analyse your business operations, assess their current status, construct a future scenario, compare it to the current structure, analyse what you see, and show the result in a city plan. Chapter 2 deals with preparing for the implementation of the architecture with governance, enterprise architecture organisation, staffing, etc. This is the organising step before beginning the actual work. Chapter 3 establishes how to implement a city plan in practice. It deals with the practicalities of working as an enterprise architect and is called the running step. The common thread through all aspects of the enterprise architects work is the architects mastery of a number of tools, such as business models, process models, information models, and matrices. We address how to initiate the architecture process within the organisation in such a way that the overarching enterprise architecture and architecture-driven approach can be applied methodically and gradually improved.
This open access book is a modern guide for all C++ programmers to learn Threading Building Blocks (TBB). Written by TBB and parallel programming experts, this book reflects their collective decades of experience in developing and teaching parallel programming with TBB, offering their insights in an approachable manner. Throughout the book the authors present numerous examples and best practices to help you become an effective TBB programmer and leverage the power of parallel systems. Pro TBB starts with the basics, explaining parallel algorithms and C++'s built-in standard template library for parallelism. You'll learn the key concepts of managing memory, working with data structures and how to handle typical issues with synchronization. Later chapters apply these ideas to complex systems to explain performance tradeoffs, mapping common parallel patterns, controlling threads and overhead, and extending TBB to program heterogeneous systems or system-on-chips. What You'll Learn Use Threading Building Blocks to produce code that is portable, simple, scalable, and more understandable Review best practices for parallelizing computationally intensive tasks in your applications Integrate TBB with other threading packages Create scalable, high performance data-parallel programs Work with generic programming to write efficient algorithms Who This Book Is For C++ programmers learning to run applications on multicore systems, as well as C or C++ programmers without much experience with templates. No previous experience with parallel programming or multicore processors is required.
The volume LNAI 12179 constitutes the proceedings of the International Joint Conference on Rough Sets, IJCRS 2020, which was due to be held in Havana, Cuba, in June 2020. The conference was held virtually due to the COVID-19 pandemic. The 37 full papers accepted were carefully reviewed and selected from 50 submissions. The papers are grouped in the following topical sections: general rough sets; three-way decision theory; attribute reduction; granular computing; formal concept analysis; data summarization; community detection; fuzzy cognitive maps; tutorials.
A concise introduction to key computing skills for biologists While biological data continues to grow exponentially in size and quality, many of today's biologists are not trained adequately in the computing skills necessary for leveraging this information deluge. In Computing Skills for Biologists, Stefano Allesina and Madlen Wilmes present a valuable toolbox for the effective analysis of biological data. Based on the authors' experiences teaching scientific computing at the University of Chicago, this textbook emphasizes the automation of repetitive tasks and the construction of pipelines for data organization, analysis, visualization, and publication. Stressing practice rather than theory, the book's examples and exercises are drawn from actual biological data and solve cogent problems spanning the entire breadth of biological disciplines, including ecology, genetics, microbiology, and molecular biology. Beginners will benefit from the many examples explained step-by-step, while more seasoned researchers will learn how to combine tools to make biological data analysis robust and reproducible. The book uses free software and code that can be run on any platform. Computing Skills for Biologists is ideal for scientists wanting to improve their technical skills and instructors looking to teach the main computing tools essential for biology research in the twenty-first century. Excellent resource for acquiring comprehensive computing skills Both novice and experienced scientists will increase efficiency by building automated and reproducible pipelines for biological data analysis Code examples based on published data spanning the breadth of biological disciplines Detailed solutions provided for exercises in each chapter Extensive companion website
The goals of an IT balanced scorecard include the alignment of IT plans with business objectives, the establishment of measures of IT effectiveness, the directing of employee efforts toward IT objectives, the improved performance of technology, and the achievement of balanced results across stakeholder groups. CIOs, CTOs, and other technical managers can achieve these goals by considering multiple perspectives, long- and short-term objectives, and how the IT scorecard is linked to other scorecards throughout their organizations. Implementing the IT Balanced Scorecard: Aligning IT with Corporate Strategy lays the groundwork for implementing the scorecard approach, and successfully integrating it with corporate strategy. This volume thoroughly explains the concept of the scorecard framework from both the corporate and IT perspectives. It provides examples, case histories, and current research for critical issues such as performance measurement and management, continuous process improvement, benchmarking, metrics selection, and people management. The book also discusses how to integrate these issues with the four perspectives of the balanced scorecard: customer, business processes, learning, and innovation and financial.
Computation is revolutionizing our world, even the inner world of the 'pure' mathematician. Mathematical methods - especially the notion of proof - that have their roots in classical antiquity have seen a radical transformation since the 1970s, as successive advances have challenged the priority of reason over computation. Like many revolutions, this one comes from within. Computation, calculation, algorithms - all have played an important role in mathematical progress from the beginning - but behind the scenes, their contribution was obscured in the enduring mathematical literature. To understand the future of mathematics, this fascinating book returns to its past, tracing the hidden history that follows the thread of computation. Along the way it invites us to reconsider the dialog between mathematics and the natural sciences, as well as the relationship between mathematics and computer science. It also sheds new light on philosophical concepts, such as the notions of analytic and synthetic judgment. Finally, it brings us to the brink of the new age, in which machine intelligence offers new ways of solving mathematical problems previously inaccessible. This book is the 2007 winner of the Grand Prix de Philosophie de l'Academie Francaise.
This book constitutes the refereed proceedings of the First International Conference on Biologically Inspired Music, Sound, Art and Design, EvoMUSART 2012, held in M laga, Spain, in April 2012, colocated with the Evo* 2012 events EuroGP, EvoCOP, EvoBIO, and EvoApplications. Due to its significant growth in the last 10 years, this 10th EvoMUSART event has become an Evo* conference in 2012. The 15 revised full papers and 5 poster papers presented were carefully reviewed and selected from 43 submissions. They cover a wide range of topics reflecting the current state of research in the field, including theory, generation, computer aided creativity, computational creativity, and automation.
You may like...
Algorithmics - The Spirit of Computing
David Harel, Yishai Feldman Paperback R1,506 Discovery Miles 15 060
Introduction to Automata Theory…
John Hopcroft, Rajeev Motwani, … Paperback R1,540 Discovery Miles 15 400
Requirements Analysis and Systems Design
Leszek Maciaszek Paperback R1,647 Discovery Miles 16 470
Fluency With Information Technology…
Lawrence Snyder Paperback
Data Structures Using C++
D. Malik Paperback
Systems Analysis and Design
Harry J. Rosenblatt, Scott Tilley Hardcover
Foundations of Computer Science
Behrouz Forouzan Paperback
Discovering Computers (c)2017
Jennifer Campbell, Mark Frydenberg, … Paperback (3)
Windows 10 Portable Genius
Paul McFedries Paperback
Introduction to Computer Theory
Daniel I. A. Cohen Paperback (4)
R5,288 Discovery Miles 52 880