![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
This volume of the CRM Conference Series is based on a carefully refereed selection of contributions presented at the "11th International Symposium on Quantum Theory and Symmetries", held in Montreal, Canada from July 1-5, 2019. The main objective of the meeting was to share and make accessible new research and recent results in several branches of Theoretical and Mathematical Physics, including Algebraic Methods, Condensed Matter Physics, Cosmology and Gravitation, Integrability, Non-perturbative Quantum Field Theory, Particle Physics, Quantum Computing and Quantum Information Theory, and String/ADS-CFT. There was also a special session in honour of Decio Levi. The volume is divided into sections corresponding to the sessions held during the symposium, allowing the reader to appreciate both the homogeneity and the diversity of mathematical tools that have been applied in these subject areas. Several of the plenary speakers, who are internationally recognized experts in their fields, have contributed reviews of the main topics to complement the original contributions.
The information economy continues to challenge businesses in many ways with information technologies and globalization leading to blurred the organizational boundaries. ""Infonomics for Distributed Business and Decision-Making Environments: Creating Information System Ecology"" provides greater understanding of issues, challenges, trends, and technologies effecting the overall utilization and management of information in modern organizations around the world. A leading field resource, this innovative collection addresses the emerging issues in information resources economics and its applications.
Problem solving is an essential part of every scientific discipline. It has two components: (1) problem identification and formulation, and (2) the solution to the formulated problem. One can solve a problem on its own using ad hoc techniques or by following techniques that have produced efficient solutions to similar problems. This requires the understanding of various algorithm design techniques, how and when to use them to formulate solutions, and the context appropriate for each of them.Algorithms: Design Techniques and Analysis advocates the study of algorithm design by presenting the most useful techniques and illustrating them with numerous examples - emphasizing on design techniques in problem solving rather than algorithms topics like searching and sorting. Algorithmic analysis in connection with example algorithms are explored in detail. Each technique or strategy is covered in its own chapter through numerous examples of problems and their algorithms.Readers will be equipped with problem solving tools needed in advanced courses or research in science and engineering.
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.
Cellular Automata (CA) are a class of spatially and temporally discrete mathematical systems characterized by local interaction and synchronous dynamical evolution, which show complex behavior and are able to model biological phenomena. Cellular Automata and Complex Systems: Methods for Modeling Biological Phenomena describes the use of cellular automata to provide important insights into a vast range of physical, biological, social, economic and psychological phenomena. This book presents contemporary research on discrete dynamical systems such as one-dimensional and two-dimensional cellular automata and outlines how these systems can be exploited for artistic purposes, translating their mathematical configurations into music and visual media.
The growing trend for high-quality computer science in school curricula has drawn recent attention in classrooms. With an increasingly information-based and global society, computer science education coupled with computational thinking has become an integral part of an experience for all students, given that these foundational concepts and skills intersect cross-disciplinarily with a set of mental competencies that are relevant in their daily lives and work. While many agree that these concepts should be taught in schools, there are systematic inequities that exist to prevent students from accessing related computer science skills. The Handbook of Research on Equity in Computer Science in P-16 Education is a comprehensive reference book that highlights relevant issues, perspectives, and challenges in P-16 environments that relate to the inequities that students face in accessing computer science or computational thinking and examines methods for challenging these inequities in hopes of allowing all students equal opportunities for learning these skills. Additionally, it explores the challenges and policies that are created to limit access and thus reinforce systems of power and privilege. The chapters highlight issues, perspectives, and challenges faced in P-16 environments that include gender and racial imbalances, population of growing computer science teachers who are predominantly white and male, teacher preparation or lack of faculty expertise, professional development programs, and more. It is intended for teacher educators, K-12 teachers, high school counselors, college faculty in the computer science department, school administrators, curriculum and instructional designers, directors of teaching and learning centers, policymakers, researchers, and students.
Advances in information technologies have allowed end users to become a fundamental element in the development and application of computing technology and digital information.
This book contains international perspectives that unifies the themes of strategic management, decision theory, and data science. It contains thought-provoking presentations of case studies backed by adequate analysis adding significance to the discussions. Most of the decision-making models in use do take due advantage of collection and processing of relevant data using appropriate analytics oriented to provide inputs into effective decision-making. The book showcases applications in diverse fields including banking and insurance, portfolio management, inventory analysis, performance assessment of comparable economic agents, managing utilities in a health-care facility, reducing traffic snarls on highways, monitoring achievement of some of the sustainable development goals in a country or state, and similar other areas that showcase policy implications. It holds immense value for researchers as well as professionals responsible for organizational decisions.
This book uses new mathematical tools to examine broad computability and complexity questions in enumerative combinatorics, with applications to other areas of mathematics, theoretical computer science, and physics. A focus on effective algorithms leads to the development of computer algebra software of use to researchers in these domains. After a survey of current results and open problems on decidability in enumerative combinatorics, the text shows how the cutting edge of this research is the new domain of Analytic Combinatorics in Several Variables (ACSV). The remaining chapters of the text alternate between a pedagogical development of the theory, applications (including the resolution by this author of conjectures in lattice path enumeration which resisted several other approaches), and the development of algorithms. The final chapters in the text show, through examples and general theory, how results from stratified Morse theory can help refine some of these computability questions. Complementing the written presentation are over 50 worksheets for the SageMath and Maple computer algebra systems working through examples in the text.
ADA Programming at its best! Discover A Book That Tells You What You Should Do and How! Instead of jumping right into the instructions, this book will provide you first with all the necessary concepts that you need to learn in order to make the learning process a whole lot easier. This way, you're sure not to get lost in confusion once you get to the more complex lessons provided in the latter chapters. Graphs and flowcharts, as well as sample codes, are provided for a more visual approach on your learning You will also learn the designs and forms of ADA, and what's more convenient than getting to know both sides! Want to know More? Buy It Now
The latest edition of a classic text on concurrency and distributed programming - from a winner of the ACM/SIGCSE Award for Outstanding Contribution to Computer Science Education.
The digital age is ripe with emerging advances and applications in technological innovations. Mimicking the structure of complex systems in nature can provide new ideas on how to organize mechanical and personal systems. The Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms is an essential scholarly resource on current algorithms that have been inspired by the natural world. Featuring coverage on diverse topics such as cellular automata, simulated annealing, genetic programming, and differential evolution, this reference publication is ideal for scientists, biological engineers, academics, students, and researchers that are interested in discovering what models from nature influence the current technology-centric world.
Interactive systems in the mobile, ubiquitous, and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use and usability of these systems. Ubiquitous Computing: Design, Implementation and Usability highlights the emergent usability theories, techniques, tools and best practices in these environments. This book shows that usable and useful systems are able to be achieved in ways that will improve usability to enhance user experiences. Research on the usability issues for young children, teenagers, adults, and the elderly is presented, with different techniques for the mobile, ubiquitous, and virtual environments.
This book provides analytical and numerical methods for the estimation of dimension characteristics (Hausdorff, Fractal, Caratheodory dimensions) for attractors and invariant sets of dynamical systems and cocycles generated by smooth differential equations or maps in finite-dimensional Euclidean spaces or on manifolds. It also discusses stability investigations using estimates based on Lyapunov functions and adapted metrics. Moreover, it introduces various types of Lyapunov dimensions of dynamical systems with respect to an invariant set, based on local, global and uniform Lyapunov exponents, and derives analytical formulas for the Lyapunov dimension of the attractors of the Henon and Lorenz systems. Lastly, the book presents estimates of the topological entropy for general dynamical systems in metric spaces and estimates of the topological dimension for orbit closures of almost periodic solutions to differential equations.
Strategists describe networking and being able to access knowledge as the leading path to gaining a competitive advantage. ""Cultural Implications of Knowledge Sharing, Management and Transfer: Identifying Competitive Advantage"" gathers contributions of scholars from multi-disciplinary fields to illustrate, compare, and discuss models, perspectives, and approaches involved in the distribution, administration, and transmission of knowledge across organizations. Containing research from leading international experts, this defining reference collection offers diverse viewpoints and depicts possible trajectories of future development in achieving competitive advantage.
Early in recorded human history, the literacy rate was as low as one percent, and reading materials were available to only the elite. How times have changed In "Information Age Tales, " author Brad Bradford chronicles these changes, documenting how technology growth continues to change the world, upsetting the balance of power on almost every continent. "Information Age Tales" recaps the history of speech, languages, writing, and memory and describes how these revolutions paved the way for today's age of cyberspace. He shows how history may be repeating itself as knowledge-sharing information technology such as Facebook and Twitter have a global effect. Bradford presents an information technology trail that includes concepts such as the following: Water monkeys may have been our ancestors. Fearsome Mongol warriors played a positive role in the rise of Western Civilization. Hindus in India and the Arabs unveiled long-hidden numerical tools needed for modern science to emerge in the West. Interchangeable parts appear more than four centuries before Eli Whitney won his historic patent to manufacture muskets with them. "Information Age Tales" imparts stories revolving around the wonders of the written word and shows the role technology has played in the rise of past civilizations.
Education and research in the field of information technology management can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Information Technology Management: Contemporary Issues supplements course instruction and student research with quality chapters focused on key issues concerning the management and utilization of information technology. Containing over 30 chapters from authors across the globe, these selected readings in areas such as information systems, knowledge management, and IT governance depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.
Service delivery in the digital era is all about bringing together innovative ideas from various stakeholders in the private, public, and civil sectors to meet customer expectations. Like any business, government public service entities must provide public service delivery to their customers in an age that is heavily influenced by technological advancements. Information Systems Strategic Planning for Public Service Delivery in the Digital Era is an essential reference source that discusses issues related to public service delivery in the digital era and the degree to which governments may take advantage of the transformational potential of ICT to move towards seamless government, particularly for improving service delivery, democratic responsiveness, and public outreach. The book also provides a pragmatic framework for government entities to define their information systems strategic plan (ISSP), guiding the reader in a step-by-step practical description of the various technical concepts, current and future technology trends, and implementation considerations for formulating their ISSP to ensure the maximum gain from public service delivery. Including research on topics such as human capital, knowledge economy, and block chain technology, this book is ideally designed for academicians, public administrators, government officials, IT consultants.
This book engages in an ongoing topic, such as the implementation of nature-inspired metaheuristic algorithms, with a main concentration on optimization problems in different fields of engineering optimization applications. The chapters of the book provide concise overviews of various nature-inspired metaheuristic algorithms, defining their profits in obtaining the optimal solutions of tiresome engineering design problems that cannot be efficiently resolved via conventional mathematical-based techniques. Thus, the chapters report on advanced studies on the applications of not only the traditional, but also the contemporary certain nature-inspired metaheuristic algorithms to specific engineering optimization problems with single and multi-objectives. Harmony search, artificial bee colony, teaching learning-based optimization, electrostatic discharge, grasshopper, backtracking search, and interactive search are just some of the methods exhibited and consulted step by step in application contexts. The book is a perfect guide for graduate students, researchers, academicians, and professionals willing to use metaheuristic algorithms in engineering optimization applications.
Smart homes, smart cities, and wearable technologies are the growing applications of the internet of things (IoT). Ranging from healthcare tracking applications to smart watches and smart bands for personal safety, the IoT has turned out to be one of the most indispensable parts of our lives even as it is becoming more interconnected to better serve people. With the exponential growth of the IoT and its applications, building the next-generation smart world becomes much more feasible. The IoT and the Net Revolutions Automating the World covers a spectrum of intelligent applications of the IoT in parking, traffic management, waste management, lighting, air pollution controlling, healthcare, weather tracking, retail, and other areas calling for automation. Highlighting a wide range of topics such as e-commerce, security management, and web infrastructure, this book is ideal for academicians, students, researchers, industry professionals, IT consultants, engineers, and scientists. |
![]() ![]() You may like...
Competence in High Performance Computing…
Christian Bischof, Heinz-Gerd Hegering, …
Hardcover
R2,889
Discovery Miles 28 890
Computer Vision: Specialized Processors…
Eduard Montseny, Joan Frau
Hardcover
R2,978
Discovery Miles 29 780
Parallel Programming in OpenMP
Rohit Chandra, Ramesh Menon, …
Paperback
R1,482
Discovery Miles 14 820
|