|
|
Books > Computing & IT > General theory of computing > General
Sir Tony Hoare has had an enormous influence on computer science,
from the Quicksort algorithm to the science of software
development, concurrency and program verification. His
contributions have been widely recognised: He was awarded the ACM's
Turing Award in 1980, the Kyoto Prize from the Inamori Foundation
in 2000, and was knighted for "services to education and computer
science" by Queen Elizabeth II of England in 2000. This book
presents the essence of his various works-the quest for effective
abstractions-both in his own words as well as chapters written by
leading experts in the field, including many of his research
collaborators. In addition, this volume contains biographical
material, his Turing award lecture, the transcript of an interview
and some of his seminal papers. Hoare's foundational paper "An
Axiomatic Basis for Computer Programming", presented his approach,
commonly known as Hoare Logic, for proving the correctness of
programs by using logical assertions. Hoare Logic and subsequent
developments have formed the basis of a wide variety of software
verification efforts. Hoare was instrumental in proposing the
Verified Software Initiative, a cooperative international project
directed at the scientific challenges of large-scale software
verification, encompassing theories, tools and experiments. Tony
Hoare's contributions to the theory and practice of concurrent
software systems are equally impressive. The process algebra called
Communicating Sequential Processes (CSP) has been one of the
fundamental paradigms, both as a mathematical theory to reason
about concurrent computation as well as the basis for the
programming language occam. CSP served as a framework for exploring
several ideas in denotational semantics such as powerdomains, as
well as notions of abstraction and refinement. It is the basis for
a series of industrial-strength tools which have been employed in a
wide range of applications. This book also presents Hoare's work in
the last few decades. These works include a rigorous approach to
specifications in software engineering practice, including
procedural and data abstractions, data refinement, and a modular
theory of designs. More recently, he has worked with collaborators
to develop Unifying Theories of Programming (UTP). Their goal is to
identify the common algebraic theories that lie at the core of
sequential, concurrent, reactive and cyber-physical computations.
 |
Big Data Security
(Hardcover)
Shibakali Gupta, Indradip Banerjee, Siddhartha Bhattacharyya
|
R3,625
Discovery Miles 36 250
|
Ships in 10 - 15 working days
|
|
|
After a short description of the key concepts of big data the book
explores on the secrecy and security threats posed especially by
cloud based data storage. It delivers conceptual frameworks and
models along with case studies of recent technology.
The evolution of soft computing applications have offered a
multitude of methodologies and techniques that are useful in
facilitating new ways to address practical and real scenarios in a
variety of fields. Exploring Innovative and Successful Applications
of Soft Computing highlights the applications and conclusions
associated with soft computing in different technological
environments. Providing potential results based on new trends in
the development of these services, this book aims to be a reference
source for researchers, practitioners, and students interested in
the most successful soft computing methods applied to recent
problems.
Advancements of information systems are rapidly altering both the
economy and society. This progression of information creates
operational and strategic advantages which is important to the
success of organizations and firms. Approaches and Processes for
Managing the Economics of Information Systems explores the value of
information and its management by highlighting theoretical and
empirical approaches in the economics of information systems. By
providing insight into how information systems can generate
economic value for businesses and consumers, this book is essential
for professors, students, researchers, and developers of
information systems.
The book will benefit a reader with a background in physical
sciences and applied mathematics interested in the mathematical
models of genetic evolution. In the first chapter, we analyze
several thought experiments based on a basic model of stochastic
evolution of a single genomic site in the presence of the factors
of random mutation, directional natural selection, and random
genetic drift. In the second chapter, we present a more advanced
theory for a large number of linked loci. In the third chapter, we
include the effect of genetic recombination into account and find
out the advantage of sexual reproduction for adaptation. These
models are useful for the evolution of a broad range of asexual and
sexual populations, including virus evolution in a host and a host
population.
Multi-Agent Applications with Evolutionary Computation and
Biologically Inspired Technologies: Intelligent Techniques for
Ubiquity and Optimization compiles numerous ongoing projects and
research efforts in the design of agents in light of recent
development in neurocognitive science and quantum physics. This
innovative collection provides readers with interdisciplinary
applications of multi-agents systems, ranging from economics to
engineering.
Recently, the event-based paradigm, a burgeoning technology
receiving attention in research as well as industry, has gained
momentum in the commercial world causing a need for further
research in the field. Principles and Applications of Distributed
Event-Based Systems showcases event-based systems in real-world
applications, providing an overview of relevant terminology and
content approachable for readers from a variety of backgrounds.
Containing expert international contributions, this advanced
publication provides professionals, researchers, and students in
systems design with a rich compendium of latest applications in the
field.
This story was totally fiction and the characters are fiction as
well. Some of the material used in this book was gleaned from
articles written about Osama Ben Laden; Afghanistan; the United
States Marine Corps; the Kennedy Assassination; the gas attack on
the Tokyo Subway system. A lot of the technical knowledge was taken
from magazine articles and articles on the Internet. A great
portion of the possible use of the computer for law enforcement was
part of the writer's imagination. It remains to be seen if a lot of
the technology mentioned in this story will come to fruition. The
advances of computer technology in the last few years have been so
astounding that it is hard to imagine what lies ahead for us. It
could become a golden age and one that can promote peace to the
world. It can be a boon to the Medical Profession as it already
has. We could be heading for a civilization where we don't have to
worry about crime or sickness or war. H G Wells wrote about time
travel. Even that is not as implausible as it once was. When the
writer was born, Space travel was talked of but no one thought that
there would ever be a modern Buck Rogers. Who ever imagined that we
would have six foot wide flat screen televisions broadcasting
events all over the world and from outer space. So the Technology
used by "Investicom" may not be so far fetched. Let's see.
The digital divide, caused by several factors such as poverty and
slow communication technologies, has offset the progression of many
developing countries. However, with rapid changes in technology, a
better collaboration among communities and governance based on the
latest research in ICT and technology has begun to emerge.
Employing Recent Technologies for Improved Digital Governance is an
essential reference source that provides research on recent
advances in the development, application, and impact of
technologies for the initiative of digital governance. The book has
a dual objective with the first objective being to encourage more
research in deploying recent trends in the internet for deploying a
collaborative digital governance. The second objective is to
explore new possibilities using internet of things (IoT) and
cloud/fog-based solutions for creating a collaboration between the
governance and IT infrastructure. Featuring research on topics such
as intelligent systems, social engineering, and cybersecurity, this
book is ideally designed for policymakers, government officials,
ICT specialists, researchers, academicians, industry professionals,
and students.
Are you aware that C Programming is one of the most popular and
most commonly used programming languages today? Did you know many
expert developers have started with learning C in order to become
knowledgeable in computer programming? Were you aware that grade
schools and high schools have begun implementing C Programming in
their curriculum's? Are you wanting a simple way to understand a
step by step action to learning C Programming? While skipping all
the technical jargon so many learners fear in programming? If you
are having doubts learning the language, do not! C is actually easy
to learn. Compared to C++, C is much simpler! You do not need to
spend years to become a master of this language.
From the Foreword: "...the presentation of real-time scheduling is
probably the best in terms of clarity I have ever read in the
professional literature. Easy to understand, which is important for
busy professionals keen to acquire (or refresh) new knowledge
without being bogged down in a convoluted narrative and an
excessive detail overload. The authors managed to largely avoid
theoretical-only presentation of the subject, which frequently
affects books on operating systems. ... an indispensable [resource]
to gain a thorough understanding of the real-time systems from the
operating systems perspective, and to stay up to date with the
recent trends and actual developments of the open-source real-time
operating systems." -Richard Zurawski, ISA Group, San Francisco,
California, USA Real-time embedded systems are integral to the
global technological and social space, but references still rarely
offer professionals the sufficient mix of theory and practical
examples required to meet intensive economic, safety, and other
demands on system development. Similarly, instructors have lacked a
resource to help students fully understand the field. The
information was out there, though often at the abstract level,
fragmented and scattered throughout literature from different
engineering disciplines and computing sciences. Accounting for
readers' varying practical needs and experience levels, Real Time
Embedded Systems: Open-Source Operating Systems Perspective offers
a holistic overview from the operating-systems perspective. It
provides a long-awaited reference on real-time operating systems
and their almost boundless application potential in the embedded
system domain. Balancing the already abundant coverage of operating
systems with the largely ignored real-time aspects, or
"physicality," the authors analyze several realistic case studies
to introduce vital theoretical material. They also discuss popular
open-source operating systems-Linux and FreRTOS, in particular-to
help embedded-system designers identify the benefits and weaknesses
in deciding whether or not to adopt more traditional, less
powerful, techniques for a project.
Information Communication Technologies (ICTs) exert a great
influence on global activities. ITC has affected the structure of
governments, economies, cultures, and even human health. Another
area in which ICT has had a tremendous impact is within the
developing world and nations where women face repression and fewer
opportunities. Overcoming Gender Inequalities through Technology
Integration is a critical source for understanding the role of
technology adoption within female empowerment and equality in
developing nations and beyond. This publication examines the
strategies applicable to the use of technology in the purist of
societal recognition of women in addition to the trajectory and
visibility of women in developing as well as developed countries in
which they have access to ICTs. This book is an essential reference
source for students and teachers of gender studies or information
technology, women's advocacy groups, policy makers, NGOs, and
technology developers.
|
|