|
|
Books > Computing & IT > General theory of computing
This book shows you 1000 ways to seduce your website's visitor:
Make visitors to buyers. Better: Make customers to friends. It
explains how to become a successful seller by viral marketing at
the web.
This book presents the data privacy protection which has been
extensively applied in our current era of big data. However,
research into big data privacy is still in its infancy. Given the
fact that existing protection methods can result in low data
utility and unbalanced trade-offs, personalized privacy protection
has become a rapidly expanding research topic.In this book, the
authors explore emerging threats and existing privacy protection
methods, and discuss in detail both the advantages and
disadvantages of personalized privacy protection. Traditional
methods, such as differential privacy and cryptography, are
discussed using a comparative and intersectional approach, and are
contrasted with emerging methods like federated learning and
generative adversarial nets. The advances discussed cover various
applications, e.g. cyber-physical systems, social networks, and
location-based services. Given its scope, the book is of interest
to scientists, policy-makers, researchers, and postgraduates alike.
This unique volume introduces and discusses the methods of
validating computer simulations in scientific research. The core
concepts, strategies, and techniques of validation are explained by
an international team of pre-eminent authorities, drawing on
expertise from various fields ranging from engineering and the
physical sciences to the social sciences and history. The work also
offers new and original philosophical perspectives on the
validation of simulations. Topics and features: introduces the
fundamental concepts and principles related to the validation of
computer simulations, and examines philosophical frameworks for
thinking about validation; provides an overview of the various
strategies and techniques available for validating simulations, as
well as the preparatory steps that have to be taken prior to
validation; describes commonly used reference points and
mathematical frameworks applicable to simulation validation;
reviews the legal prescriptions, and the administrative and
procedural activities related to simulation validation; presents
examples of best practice that demonstrate how methods of
validation are applied in various disciplines and with different
types of simulation models; covers important practical challenges
faced by simulation scientists when applying validation methods and
techniques; offers a selection of general philosophical reflections
that explore the significance of validation from a broader
perspective. This truly interdisciplinary handbook will appeal to a
broad audience, from professional scientists spanning all natural
and social sciences, to young scholars new to research with
computer simulations. Philosophers of science, and methodologists
seeking to increase their understanding of simulation validation,
will also find much to benefit from in the text.
This book presents selected papers from the 3rd International
Workshop on Computational Engineering held in Stuttgart from
October 6 to 10, 2014, bringing together innovative contributions
from related fields with computer science and mathematics as an
important technical basis among others. The workshop discussed the
state of the art and the further evolution of numerical techniques
for simulation in engineering and science. We focus on current
trends in numerical simulation in science and engineering, new
requirements arising from rapidly increasing parallelism in
computer architectures, and novel mathematical approaches.
Accordingly, the chapters of the book particularly focus on
parallel algorithms and performance optimization, coupled systems,
and complex applications and optimization.
Here's the first focused discussion of issues and technology in
developing networked multimedia systems. This book includes a
unique explanation of color specification and its role in achieving
high picture quality, high compression ratio and high information
retrieval performance, plus valuable coverage of principles and
techniques of multimedia information indexing and retrieval
critical for future systems.
This comprehensive and timely publication aims to be an essential
reference source, building on the available literature in the field
of Gamification for the economic and social development of
countries while providing further research opportunities in this
dynamic and growing field. Thus, the book aims to provide the
opportunity for a reflection on this important issue, increasing
the understanding of the importance of Gamification in the context
of organizations' improvements, providing relevant academic work,
empirical research findings and, an overview of this relevant field
of study. This text will provide the resources necessary for
policymakers, technology developers, and managers to adopt and
implement solutions for a more digital era.
The book provides suggestions on how to start using bionic
optimization methods, including pseudo-code examples of each of the
important approaches and outlines of how to improve them. The most
efficient methods for accelerating the studies are discussed. These
include the selection of size and generations of a study's
parameters, modification of these driving parameters, switching to
gradient methods when approaching local maxima, and the use of
parallel working hardware. Bionic Optimization means finding the
best solution to a problem using methods found in nature. As
Evolutionary Strategies and Particle Swarm Optimization seem to be
the most important methods for structural optimization, we
primarily focus on them. Other methods such as neural nets or ant
colonies are more suited to control or process studies, so their
basic ideas are outlined in order to motivate readers to start
using them. A set of sample applications shows how Bionic
Optimization works in practice. From academic studies on simple
frames made of rods to earthquake-resistant buildings, readers
follow the lessons learned, difficulties encountered and effective
strategies for overcoming them. For the problem of tuned mass
dampers, which play an important role in dynamic control, changing
the goal and restrictions paves the way for
Multi-Objective-Optimization. As most structural designers today
use commercial software such as FE-Codes or CAE systems with
integrated simulation modules, ways of integrating Bionic
Optimization into these software packages are outlined and examples
of typical systems and typical optimization approaches are
presented. The closing section focuses on an overview and outlook
on reliable and robust as well as on Multi-Objective-Optimization,
including discussions of current and upcoming research topics in
the field concerning a unified theory for handling stochastic
design processes.
This is a volume of chapters on the historical study of
information, computing, and society written by seven of the most
senior, distinguished members of the History of Computing field.
These are edited, expanded versions of papers presented in a
distinguished lecture series in 2018 at the University of Colorado
Boulder - in the shadow of the Flatirons, the front range of the
Rocky Mountains. Topics range widely across the history of
computing. They include the digitalization of computer and
communication technologies, gender history of computing, the
history of data science, incentives for innovation in the computing
field, labor history of computing, and the process of
standardization. Authors were given wide latitude to write on a
topic of their own choice, so long as the result is an exemplary
article that represents the highest level of scholarship in the
field, producing articles that scholars in the field will still
look to read twenty years from now. The intention is to publish
articles of general interest, well situated in the research
literature, well grounded in source material, and well-polished
pieces of writing. The volume is primarily of interest to
historians of computing, but individual articles will be of
interest to scholars in media studies, communication, computer
science, cognitive science, general and technology history, and
business.
Handbook of Research on Ambient Intelligence and Smart
Environments: Trends and Perspectives covers the cutting-edge
aspects of AMI applications, specifically those involving the
effective design, realization, and implementation of a
comprehensive AmI application. This pertinent publication targets
researchers and practitioners in Ambient Intelligence, as well as
those in ubiquitous and pervasive computing, artificial
intelligence, sensor networks, knowledge representation, automated
reasoning and learning, system and software engineering, and
man-machine interfaces.
The world of corporate management benefits when organizations
realize the profitability, reliability, and flexibility obtained
through IT standardization. Toward Corporate IT Standardization
Management: Frameworks and Solutions details the IT standards
conceptual model through insightful case studies that illustrate
the factors affecting the performance of business processes. By
offering organizations the opportunity to enhance process
performance through IT standardization, this reference work
demonstrates the effectiveness of IT standards, and the applicable
techniques for implementation and management of such practices.
This book features information useful to educators and students in
the fields of Information Systems, IT-Management, Business Studies,
and Economics, as well as IT practitioners and IS Managers.
In this work we plan to revise the main techniques for enumeration
algorithms and to show four examples of enumeration algorithms that
can be applied to efficiently deal with some biological problems
modelled by using biological networks: enumerating central and
peripheral nodes of a network, enumerating stories, enumerating
paths or cycles, and enumerating bubbles. Notice that the
corresponding computational problems we define are of more general
interest and our results hold in the case of arbitrary graphs.
Enumerating all the most and less central vertices in a network
according to their eccentricity is an example of an enumeration
problem whose solutions are polynomial and can be listed in
polynomial time, very often in linear or almost linear time in
practice. Enumerating stories, i.e. all maximal directed acyclic
subgraphs of a graph G whose sources and targets belong to a
predefined subset of the vertices, is on the other hand an example
of an enumeration problem with an exponential number of solutions,
that can be solved by using a non trivial brute-force approach.
Given a metabolic network, each individual story should explain how
some interesting metabolites are derived from some others through a
chain of reactions, by keeping all alternative pathways between
sources and targets. Enumerating cycles or paths in an undirected
graph, such as a protein-protein interaction undirected network, is
an example of an enumeration problem in which all the solutions can
be listed through an optimal algorithm, i.e. the time required to
list all the solutions is dominated by the time to read the graph
plus the time required to print all of them. By extending this
result to directed graphs, it would be possible to deal more
efficiently with feedback loops and signed paths analysis in signed
or interaction directed graphs, such as gene regulatory networks.
Finally, enumerating mouths or bubbles with a source s in a
directed graph, that is enumerating all the two vertex-disjoint
directed paths between the source s and all the possible targets,
is an example of an enumeration problem in which all the solutions
can be listed through a linear delay algorithm, meaning that the
delay between any two consecutive solutions is linear, by turning
the problem into a constrained cycle enumeration problem. Such
patterns, in a de Bruijn graph representation of the reads obtained
by sequencing, are related to polymorphisms in DNA- or RNA-seq
data.
This unique text/reference provides an overview of crossbar-based
interconnection networks, offering novel perspectives on these
important components of high-performance, parallel-processor
systems. A particular focus is placed on solutions to the blocking
and scalability problems. Topics and features: introduces the
fundamental concepts in interconnection networks in multi-processor
systems, including issues of blocking, scalability, and crossbar
networks; presents a classification of interconnection networks,
and provides information on recognizing each of the networks;
examines the challenges of blocking and scalability, and analyzes
the different solutions that have been proposed; reviews a variety
of different approaches to improve fault tolerance in multistage
interconnection networks; discusses the scalable crossbar network,
which is a non-blocking interconnection network that uses
small-sized crossbar switches as switching elements. This
invaluable work will be of great benefit to students, researchers
and practitioners interested in computer networks, parallel
processing and reliability engineering. The text is also essential
reading for course modules on interconnection network design and
reliability.
This pioneering book presents new models for the thermomechanical
behavior of composite materials and structures taking into account
internal physico-chemical transformations such as
thermodecomposition, sublimation and melting at high temperatures
(up to 3000 K). It is of great importance for the design of new
thermostable materials and for the investigation of reliability and
fire safety of composite structures. It also supports the
investigation of interaction of composites with laser irradiation
and the design of heat-shield systems. Structural methods are
presented for calculating the effective mechanical and thermal
properties of matrices, fibres and unidirectional, reinforced by
dispersed particles and textile composites, in terms of properties
of their constituent phases. Useful calculation methods are
developed for characteristics such as the rate of thermomechanical
erosion of composites under high-speed flow and the heat
deformation of composites with account of chemical shrinkage. The
author expansively compares modeling results with experimental
data, and readers will find unique experimental results on
mechanical and thermal properties of composites under temperatures
up to 3000 K. Chapters show how the behavior of composite shells
under high temperatures is simulated by the finite-element method
and so cylindrical and axisymmetric composite shells and composite
plates are investigated under local high-temperature heating. <
The book will be of interest to researchers and to engineers
designing composite structures, and invaluable to materials
scientists developing advanced performance thermostable materials.
Marking the 30th anniversary of the European Conference on
Modelling and Simulation (ECMS), this inspirational text/reference
reviews significant advances in the field of modelling and
simulation, as well as key applications of simulation in other
disciplines. The broad-ranging volume presents contributions from a
varied selection of distinguished experts chosen from high-impact
keynote speakers and best paper winners from the conference,
including a Nobel Prize recipient, and the first president of the
European Council for Modelling and Simulation (also abbreviated to
ECMS). This authoritative book will be of great value to all
researchers working in the field of modelling and simulation, in
addition to scientists from other disciplines who make use of
modelling and simulation approaches in their work.
This comprehensive text presents cutting-edge advances in the
theory and methodology of modeling and simulation (M&S) and
reveals how this work has been influenced by the fundamental
contributions of Prof. Tuncer OEren to this field. Exploring the
synergies among the domains of M&S and systems engineering
(SE), the book describes how M&S and SE can help to address the
complex problems identified as "Grand Challenges" more effectively
under a model-driven and simulation-directed systems engineering
framework. Features: examines frameworks for the development of
advanced simulation methodologies; presents a focus on advanced
modeling methodologies; reviews the reliability and quality
assurance of models; discusses the specification and simulation of
human and social behavior, including models of personality,
emotions, conflict management, perception and anticipation;
provides a survey of the body of knowledge in M highlights the
foundations established by the pioneering work of Prof. Tuncer
OEren.
The creation of a new public realm through the use of the Internet
and ICT may positively promote political liberties and freedom of
speech, but could also threaten the political and public autonomy
of the individual. Human Rights and the Impact of ICT in the Public
Sphere: Participation, Democracy, and Political Autonomy focuses on
the new technological era as an innovative way to initiate
democratic dialogue, but one that can also endanger individual
rights to freedom, privacy, and autonomy. This reference book
focuses on the new opportunities technology offers for political
expression and will be of use to both academic and legal audiences,
including academics, students, independent authorities, legislative
bodies, and lawyers.
Smart city development and governance is a technological issue and
a complex mechanism of the political understanding of technology,
environmental interest, and urban interactions in terms of both
economic gains and other public values. A smart city is defined by
the technology it possesses and how it integrates and uses that
technology to improve operational efficiency, propel citizen
engagement, and justify inward migration. Understanding the
principles and policies at work creates a full understanding of
smart cities. Examining the Socio-Technical Impact of Smart Cities
is an essential publication that enhances our theoretical
understanding of the socio-technical impact of smart cities by
promoting the conceptual interactions between social and
governmental structures (people, task, structure) with new
technologies. Highlighting a wide range of topics including
community inclusion, cultural innovation, and public safety, this
book is ideally designed for urban planners, entrepreneurs,
engineers, government officials, policymakers, academicians,
researchers, and students.
This treatise presents an integrated perspective on the interplay
of set theory and graph theory, providing an extensive selection of
examples that highlight how methods from one theory can be used to
better solve problems originated in the other. Features: explores
the interrelationships between sets and graphs and their
applications to finite combinatorics; introduces the fundamental
graph-theoretical notions from the standpoint of both set theory
and dyadic logic, and presents a discussion on set universes;
explains how sets can conveniently model graphs, discussing set
graphs and set-theoretic representations of claw-free graphs;
investigates when it is convenient to represent sets by graphs,
covering counting and encoding problems, the random generation of
sets, and the analysis of infinite sets; presents excerpts of
formal proofs concerning graphs, whose correctness was verified by
means of an automated proof-assistant; contains numerous exercises,
examples, definitions, problems and insight panels.
This book contains the full papers presented at ICCEBS 2013 - the
1st International Conference on Computational and Experimental
Biomedical Sciences, which was organized in Azores, in October
2013. The included papers present and discuss new trends in those
fields, using several methods and techniques, including active
shape models, constitutive models, isogeometric elements, genetic
algorithms, level sets, material models, neural networks,
optimization and the finite element method, in order to address
more efficiently different and timely applications involving
biofluids, computer simulation, computational biomechanics, image
based diagnosis, image processing and analysis, image segmentation,
image registration, scaffolds, simulation and surgical planning.
The main audience for this book consists of researchers, Ph.D
students and graduate students with multidisciplinary interests
related to the areas of artificial intelligence, bioengineering,
biology, biomechanics, computational fluid dynamics, computational
mechanics, computational vision, histology, human motion,
imagiology, applied mathematics, medical image, medicine,
orthopaedics, rehabilitation, speech production and tissue
engineering.
|
You may like...
Julius Caesar
Richard Appignanesi
Paperback
(2)
R269
R254
Discovery Miles 2 540
Kill Joy
Holly Jackson
Paperback
R217
R201
Discovery Miles 2 010
Hypothermia
Vanessa Brooks
Paperback
R310
Discovery Miles 3 100
|