![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > General
This book provides a broad-based approach to decision support systems (DSS) and their applications to finance and accounting. Heymann and Bloom go beyond mere description of DSS applications for particular system configurations to provide a comprehensive, technical analysis. They identify the changing roles over time of finance and accounting within organizational management and business control systems, outline the foundation of economic models within the objectives and methodology of scientific research, and provide an introduction to the logical structure of theoretical models in finance and accounting. The systems approach is examined as an alternative to the traditional decision model approach, and different tasks within a firm are presented in terms of complex and integrated management processes. In addition, the authors describe the role of DSS in the management of a firm, present specific applications of DSS in the areas of finance and accounting, and discuss the future outlook of DSS in computerized management systems as well as their possible effects on organizational structures and management control procedures.
The computer is the great technological and scientific innovation of the last half of the twentieth century. It has revolutionized how we organize information, how we communicate with each other, and even the way that we think about the human mind. Computers have eased the drudgery of such tasks as calculating sums and clerical work, making them both more bearable and more efficient. The computer has become ubiquitous in many aspects of business, recreation, and everyday life, and the trend is that they are becoming both more powerful and easier to use. Computers: The Life Story of a Technology provides an accessible overview of this ever changing technology history, giving students and lay readers an understanding of the complete scope of its history from ancient times to the present day. In addition to providing a concise biography of how this technology developed, this book provides insights into how the computer has changed our lives: * Demonstrates how, just as the invention of the steam engine in the 1700s stimulated scientists to think of the laws of nature in terms of machines, the success of the computer in the late 1900s prompted scientists to think of the basic laws of the universe as being similar to the operation of a computer. * Provides a worldwide examination of computing, and how such needs as security and defense during the Cold War drove the development of computing technology. * Shows how the computer has entered almost every aspect of daily life in the 21st century The volume includes a glossary of terms, a timeline of important events, and a selected bibliography of useful resources for further information.
The information technology explosion in our global society is creating tremendous challenges and opportunities for educators as we help shape the next generation of information pioneers. But in these times of severe budget cuts, our challenges become even greater, and the necessity for success more critical. Current Issues in IT Education addresses the ongoing quest for teaching excellence in the midst of implementing teaching technologies and crossing disciplinary boundaries.
This is volume 73 of "Advances in Computers." This series, which
began publication in 1960, is the oldest continuously published
anthology that chronicles the ever- changing information technology
field. In these volumes we publish from 5 to 7 chapters, three
times per year, that cover the latest changes to the design,
development, use and implications of computer technology on society
today. In this current volume, subtitled "Emerging Technologies,"
we discuss several new advances in computer software generation as
well as describe new applications of those computers.
Nash equilibrium is the central solution concept in Game Theory. Since Nash's original paper in 1951, it has found countless applications in modeling strategic behavior of traders in markets, (human) drivers and (electronic) routers in congested networks, nations in nuclear disarmament negotiations, and more. A decade ago, the relevance of this solution concept was called into question by computer scientists, who proved (under appropriate complexity assumptions) that computing a Nash equilibrium is an intractable problem. And if centralized, specially designed algorithms cannot find Nash equilibria, why should we expect distributed, selfish agents to converge to one? The remaining hope was that at least approximate Nash equilibria can be efficiently computed.Understanding whether there is an efficient algorithm for approximate Nash equilibrium has been the central open problem in this field for the past decade. In this book, we provide strong evidence that even finding an approximate Nash equilibrium is intractable. We prove several intractability theorems for different settings (two-player games and many-player games) and models (computational complexity, query complexity, and communication complexity). In particular, our main result is that under a plausible and natural complexity assumption ("Exponential Time Hypothesis for PPAD"), there is no polynomial-time algorithm for finding an approximate Nash equilibrium in two-player games. The problem of approximate Nash equilibrium in a two-player game poses a unique technical challenge: it is a member of the class PPAD, which captures the complexity of several fundamental total problems, i.e., problems that always have a solution; and it also admits a quasipolynomial time algorithm. Either property alone is believed to place this problem far below NP-hard problems in the complexity hierarchy; having both simultaneously places it just above P, at what can be called the frontier of intractability. Indeed, the tools we develop in this book to advance on this frontier are useful for proving hardness of approximation of several other important problems whose complexity lies between P and NP: Brouwer's fixed point, market equilibrium, CourseMatch (A-CEEI), densest k-subgraph, community detection, VC dimension and Littlestone dimension, and signaling in zero-sum games.
This book introduces the concept of policy decision emergence and its dynamics at the sub systemic level of the decision process. This level constitutes the breeding ground of the emergence of policy decisions but remains unexplored due to the absence of adequate tools. It is a nonlinear complex system made of several entities that interact dynamically. The behavior of such a system cannot be understood with linear and deterministic methods. The book presents an innovative multidisciplinary approach that results in the development of a Policy Decision Emergence Simulation Model (PODESIM). This computational model is a multi-level fuzzy inference system that allows the identification of the decision emergence levers. This development represents a major advancement in the field of public policy decision studies. It paves the way for decision emergence modeling and simulation by bridging complex systems theory, multiple streams theory, and fuzzy logic theory.
In Silico Chemistry and Biology: Current and Future Prospects provides a compact overview on recent advances in this highly dynamic branch of chemistry. Various methods of protein modelling and computer-assisted drug design are presented, including fragment- and ligand-based approaches. Many successful practical applications of these techniques are demonstrated. The authors also look to the future and describe the main challenges of the field.
As software RandD investment increases, the benefits from short feedback cycles using technologies such as continuous deployment, experimentation-based development, and multidisciplinary teams require a fundamentally different strategy and process. This book will cover the three overall challenges that companies are grappling with: speed, data and ecosystems. Speed deals with shortening the cycle time in RandD. Data deals with increasing the use of and benefit from the massive amounts of data that companies collect. Ecosystems address the transition of companies from being internally focused to being ecosystem oriented by analyzing what the company is uniquely good at and where it adds value.
This book will help future scientists to become more intelligent users of computing technology in their practice of science. The content is suitable for introductory courses on the foundations of computing and the specific application of computers in different areas of science. The text presents a set of modules for use in existing science courses in order to integrate individual aspects of computational thinking, as well as a set of modules introducing the computer science concepts needed to understand the computing involved. These modules guide science students in their independent learning. The book covers computing applications in such diverse areas as bioinformatics, chemical kinetics, hydrogeological modeling, and mechanics of materials, geographic information systems, flow analysis, the solving of equations, curve fitting, optimization, and scientific data acquisition. The computing topics covered include simulations, errors, data representation, algorithms, XMS, compression, databases, performance, and complexity.
This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic. This book provides a link between new proposals related to contact tracing applications and a contextual literature review primarily from the cryptologic viewpoint. As these applications are related to security and privacy of individuals, analyzing them from cryptologic viewpoint is of utmost importance. Therefore, present developments from cryptologic aspects of most proposals around the world, including Singapore, Europe, USA, Australia and India, have been discussed. Providing an in-depth study on the design rationale of each protocol, this book is of value to researchers, students and professionals alike.
The World Wide Web exploded into public consciousness in 1995, a year which saw the coming of age of the Internet. People are communicating, working, shopping, learning, and entertaining themselves, as well as satisfying carnal desires and even finding God through the simple act of connecting their computers to the wide universe of cyberspace. We are assured, at the same time, that this progress will have profound effects on work, culture, leisure--everything, including the ways in which we interact with each other. Yet just what these effects will be, how power will be distributed, and what recourse will be available to those adversely affected by the new technologies, are issues that have yet to be negotiated. Aside from the occasional panic over cyber-porn, few have considered the wide-ranging effects of our increasing reliance on interactive technologies. "Cyberfutures" offers a close examination of issues that will become increasingly important as computers, networks, and technologies occupy crucial roles in our everyday lives. Comprised of essays from a range of occupational and disciplinary perspectives, including those of Vivian Sobchack and Arturo Escobar, this volume makes essential reading for students in cultural and media studies, anthropology, as well as for citizens interested in considering the larger implications of the Information Superhighway.
Power consumption becomes the most important design goal in a wide range of electronic systems. There are two driving forces towards this trend: continuing device scaling and ever increasing demand of higher computing power. First, device scaling continues to satisfy Moore's law via a conventional way of scaling (More Moore) and a new way of exploiting the vertical integration (More than Moore). Second, mobile and IT convergence requires more computing power on the silicon chip than ever. Cell phones are now evolving towards mobile PC. PCs and data centers are becoming commodities in house and a must in industry. Both supply enabled by device scaling and demand triggered by the convergence trend realize more computation on chip (via multi-core, integration of diverse functionalities on mobile SoCs, etc.) and finally more power consumption incurring power-related issues and constraints. "Energy-Aware System Design: Algorithms and Architectures" provides state-of-the-art ideas for low power design methods from circuit, architecture to software level andoffers design case studies in three fast growing areas of mobile storage, biomedical and security. Important topics and features: - Describes very recent advanced issues and methods for energy-aware design at each design level from circuit andarchitecture toalgorithm level, and also covering important blocks including low power main memory subsystem and on-chip network at architecture level - Explains efficient power conversion and delivery which is becoming important as heterogeneous power sources are adopted for digital and non-digital parts - Investigates 3D die stacking emphasizing temperature awareness for better perspective on energy efficiency - Presents three practical energy-aware design case studies; novel storage device (e.g., solid state disk), biomedical electronics (e.g., cochlear and retina implants), and wireless surveillance camera systems. Researchers and engineers in the field of hardware and software design will find this book an excellent starting point to catch up with the state-of-the-art ideas of low power design.
This volume represents the papers reviewed and accepted for the HOIT2007 conference held at the Indian Institute of Technology Madras in the city of Chennai, India in August 2007. This volume addresses many of the major themes of current interest in the field, with a particular focus on community-based technologies. This comprehensive book is divided into five different sections reflecting the most up-to-date research on computers and society.
Competitive intelligence uses public sources to obtain valuable information on competition and competitors. By using competitive intelligence aggressively and intelligently, corporations can obtain information on potential acquisition targets, markets, key personnel, the probable emergence of new products, or the financial strength or contracts of a competing firm. An absolutely indispensable playbook for anyone who has to compete during the information explosion. "Martin Sikora, Editor, Mergers and AcquisitionS" Competitive intelligence uses public sources to obtain valuable information on competition and competitors. In an open society such as our own, businesses place a great deal of information in the public domain. By using competitive intelligence aggressively and intelligently, corporations can obtain information on potential acquisition targets, markets, key personnel, the probable emergence of new products, or the financial strength or contracts of a competing firm. In fact, the authors contend that as much as 90 percent of the information required to decide on a course of litigation, acquisitions, expansion, new product introduction, or financing, is available through competitive intelligence.
Social media has revolutionized how individuals, communities, and organizations create, share, and consume information. Similarly, social media offers numerous opportunities as well as enormous social and economic ills for individuals, communities, and organizations. Despite the increase in popularity of social networking sites and related digital media, there are limited data and studies on consumption patterns of the new media by different global communities. Analyzing Global Social Media Consumption is an essential reference book that investigates the current trends, practices, and newly emerging narratives on theoretical and empirical research on all aspects of social media and its global use. Covering topics that include fake news detection, social media addiction, and motivations and impacts of social media use, this book is ideal for big data analysts, media and communications experts, researchers, academicians, and students in media and communications, information systems, and information technology study programs.
No aspect of business, public, or private lives in developed economies can be discussed today without acknowledging the role of information and communication technologies (ICT). A shortage of studies still exists, however, on how ICTs can help developing economies. Leveraging Developing Economies with the Use of Information Technology: Trends and Tools moves toward filling the gap in research on ICT and developing nations, bringing these countries one step closer to advancement through technology. This essential publication will bring together ideas, views, and perspectives helpful to government officials, business professionals, and other individuals worldwide as they consider the use of ICT for socio-economic progress in the developing world.
The main purpose of this book is to sum up the vital and highly topical research issue of knowledge representation on the Web and to discuss novel solutions by combining benefits of folksonomies and Web 2.0 approaches with ontologies and semantic technologies. The book contains an overview of knowledge representation approaches in past, present and future, introduction to ontologies, Web indexing and in first case the novel approaches of developing ontologies. combines aspects of knowledge representation for both the Semantic Web (ontologies) and the Web 2.0 (folksonomies). Currently there is no monographic book which provides a combined overview over these topics. focus on the topic of using knowledge representation methods for document indexing purposes. For this purpose, considerations from classical librarian interests in knowledge representation (thesauri, classification schemes etc.) are included, which are not part of most other books which have a stronger background in computer science.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
Thecontinuousandincreasinginterestconcerningvectoroptimizationperc- tible in the research community, where contributions dealing with the theory of duality abound lately, constitutes the main motivation that led to writing this book. Decisive was also the research experience of the authors in this ?eld, materialized in a number of works published within the last decade. The need for a book on duality in vector optimization comes from the fact that despite the large amount of papers in journals and proceedings volumes, no book mainly concentrated on this topic was available so far in the scienti?c landscape. There is a considerable presence of books, not all recent releases, on vector optimization in the literature. We mention here the ones due to Chen,HuangandYang(cf. [49]),EhrgottandGandibleux(cf. [65]),Eichfelder (cf. [66]), Goh and Yang (cf. [77]), G.. opfert and Nehse (cf. [80]), G.. opfert, - ahi, Tammer and Z? alinescu (cf. [81]), Jahn (cf. [104]), Kaliszewski (cf. [108]), Luc (cf. [125]), Miettinen (cf. [130]), Mishra, Wang and Lai (cf. [131,132]) and Sawaragi, Nakayama and Tanino (cf. [163]), where vector duality is at most tangentially treated. We hope that from our e?orts will bene? t not only researchers interested in vector optimization, but also graduate and und- graduate students. The framework we consider is taken as general as possible, namely we work in (locally convex) topological vector spaces, going to the usual ?nite - mensional setting when this brings additional insights or relevant connections to the existing literature.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services. |
![]() ![]() You may like...
The Oxford Handbook of Music and…
Sheila Whiteley, Shara Rambarran
Hardcover
R4,779
Discovery Miles 47 790
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,119
Discovery Miles 41 190
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
|