![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
This book provides comprehensive coverage of the latest trends/advances in subjective and objective quality evaluation for traditional visual signals, such as 2D images and video, as well as the most recent challenges for the field of multimedia quality assessment and processing, such as mobile video and social media. Readers will learn how to ensure the highest storage/delivery/ transmission quality of visual content (including image, video, graphics, animation, etc.) from the server to the consumer, under resource constraints, such as computation, bandwidth, storage space, battery life, etc.
The Heinz Nixdorf Museum Forum (HNF) is the world's largest c- puter museum and is dedicated to portraying the past, present and future of information technology. In the "Year of Informatics 2006" the HNF was particularly keen to examine the history of this still quite young discipline. The short-lived nature of information technologies means that individuals, inventions, devices, institutes and companies"age" more rapidly than in many other specialties. And in the nature of things the group of computer pioneers from the early days is growing smaller all the time. To supplement a planned new exhibit on "Software and Inform- ics" at the HNF, the idea arose of recording the history of informatics in an accompanying publication. Mysearchforsuitablesourcesandauthorsveryquickly cameupwith the right answer, the very rst name in Germany: Friedrich L. Bauer, Professor Emeritus of Mathematics at the TU in Munich, one of the - thers of informatics in Germany and for decades the indefatigable author of the"Historical Notes" column of the journal Informatik Spektrum. Friedrich L. Bauer was already the author of two works on the history of informatics, published in different decades and in different books. Both of them are notable for their knowledgeable, extremely comp- hensive and yet compact style. My obvious course was to motivate this author to amalgamate, supplement and illustrate his previous work.
Exchange Server is necessary to support Outlook and SharePoint in
the enterprise messaging at virtually all Fortune 1000 firms.
Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and
Migration describes everything that you need to know about
designing, planning, and implementing an Exchange 2003 environment.
This book covers, in detail, the tools and techniques that
messaging system planners and administrators will require in order
to establish a functioning interoperability environment between
Exchange 2003 and previous versions of Exchange including Exchange
5.5 and Exchange 2000. The book describes various deployment
topologies and environments to cater for a multitude of different
organizational requirements. The book has been updated to reflect
the new changes that Microsoft introduced with Exchange 2003 and
SP1 and SP2 updates in relation to major architectural changes to
migrations techniques and other services such as RPC over HTTP and
journaling functionality.
For a long time, there has been a need for a practical,
down-to-earth developers book for the Java Cryptography Extension.
I am very happy to see there is now a book that can answer many of
the technical questions that developers, managers, and researchers
have about such a critical topic. I am sure that this book will
contribute greatly to the success of securing Java applications and
deployments for e-business. --Anthony Nadalin, Java Security Lead
Architect, IBM
This book reviews the algorithms for processing geometric data, with a practical focus on important techniques not covered by traditional courses on computer vision and computer graphics. Features: presents an overview of the underlying mathematical theory, covering vector spaces, metric space, affine spaces, differential geometry, and finite difference methods for derivatives and differential equations; reviews geometry representations, including polygonal meshes, splines, and subdivision surfaces; examines techniques for computing curvature from polygonal meshes; describes algorithms for mesh smoothing, mesh parametrization, and mesh optimization and simplification; discusses point location databases and convex hulls of point sets; investigates the reconstruction of triangle meshes from point clouds, including methods for registration of point clouds and surface reconstruction; provides additional material at a supplementary website; includes self-study exercises throughout the text.
Mirror Images: Popular Culture and Education is the first international and multidisciplinary effort to coalesce knowledge on education and popular culture studied as broad phenomena and not as a collection of case studies. In this volume, popular culture has been thematically treated as it appears in a variety of media, including movies, digital games, advertising, television, popular songs, and the internet. The book considers education in both formal and informal settings, and looks critically at the accepted dichotomy between education and popular culture. It argues that popular culture is capable of educating and that education shares many characteristics with popular culture, and tries to overcome these dichotomous relationships while also trying to clarify the reciprocal effects between the two. The book calls disciplinary and media boundaries into question in an effort to widen the possibility of enlarging the vocabulary and the verbs of all that stays unnamed by what is considered knowledge.
While many architects use PHP for projects, they are often not
aware of the power of PHP in creating enterprise-level
applications. This book covers the latest version of PHP - version
5 -- and focuses on its capabilities within a multi-tier
application framework. It contains numerous coding samples and
commentaries on them. A chapter discusses object orientation in PHP
as it applies to the multi-tier architecture and other chapters
discuss HTTP and SOAP, the two communication protocols most useful
in tying together multiple layers. There is also coverage of
database design and query construction as well as information about
tricks you can use in generating user interfaces.
While women maintain an increased visibility in the games culture, the issues involving gender in computing gaming is still relevant; and it is evident that the industry could benefit from the involvement of women in all aspects from consumer to developer. Gender Divide and the Computer Game Industry takes a look at the games industry from a gendered perspective and highlights the variety of ways in which women remain underrepresented in this industry. This reference source provides a comprehensive overview on the issue of gender, computer games, and the ICT sector. It supplies students and academics in numerous disciplines with the concerns of the computer games industry, male dominated occupations, and the complexity of gender in the workforce.
"Software Defined Networks" discusses the historical networking
environment that gave rise to SDN, as well as the latest advances
in SDN technology. The book gives you the state of the art
knowledge needed for successful deployment of an SDN, including:
How to explain to the non-technical business decision makers in
your organization the potential benefits, as well as the risks, in
shifting parts of a network to the SDN modelHow to make intelligent
decisions about when to integrate SDN technologies in a networkHow
to decide if your organization should be developing its own SDN
applications or looking to acquire these from an outside vendorHow
to accelerate the ability to develop your own SDN application, be
it entirely novel or a more efficient approach to a long-standing
problem
NewInternetdevelopmentsposegreaterandgreaterprivacydilemmas. Inthe- formation Society, the need for individuals to protect their autonomy and retain control over their personal information is becoming more and more important. Today, informationandcommunicationtechnologies-andthepeopleresponsible for making decisions about them, designing, and implementing them-scarcely consider those requirements, thereby potentially putting individuals' privacy at risk. The increasingly collaborative character of the Internet enables anyone to compose services and contribute and distribute information. It may become hard for individuals to manage and control information that concerns them and particularly how to eliminate outdated or unwanted personal information, thus leavingpersonalhistoriesexposedpermanently. Theseactivitiesraisesubstantial new challenges for personal privacy at the technical, social, ethical, regulatory, and legal levels: How can privacy in emerging Internet applications such as c- laborative scenarios and virtual communities be protected? What frameworks and technical tools could be utilized to maintain life-long privacy? DuringSeptember3-10,2009, IFIP(InternationalFederationforInformation Processing)workinggroups9. 2 (Social Accountability),9. 6/11. 7(IT Misuseand theLaw),11. 4(NetworkSecurity)and11. 6(IdentityManagement)heldtheir5th InternationalSummerSchoolincooperationwiththeEUFP7integratedproject PrimeLife in Sophia Antipolis and Nice, France. The focus of the event was on privacy and identity managementfor emerging Internet applications throughout a person's lifetime. The aim of the IFIP Summer Schools has been to encourage young a- demic and industry entrants to share their own ideas about privacy and identity management and to build up collegial relationships with others. As such, the Summer Schools havebeen introducing participants to the social implications of information technology through the process of informed discussion.
In e-learning, the learner spends a significant amount of time online, interacting with Web-based applications. This interaction carries tremendous weight in the learning process, because it directly influences the way the learner receives, comprehends, and ultimately retains information. Affective, Interactive, and Cognitive Methods for E-Learning Design: Creating an Optimal Education Experience brides a current gap in e-learning literature through focus on the study and application of human computer interaction principles in the design of online education in order to offer students the optimal learning experience. This advanced publication gives insight into the most significant design issues encountered and offers solutions to help in the creation of an ideal learning environment.
Each day, new applications and methods are developed for utilizing technology in the field of medical sciences, both as diagnostic tools and as methods for patients to access their medical information through their personal gadgets. However, the maximum potential for the application of new technologies within the medical field has not yet been realized. Mobile Devices and Smart Gadgets in Medical Sciences is a pivotal reference source that explores different mobile applications, tools, software, and smart gadgets and their applications within the field of healthcare. Covering a wide range of topics such as artificial intelligence, telemedicine, and oncology, this book is ideally designed for medical practitioners, mobile application developers, technology developers, software experts, computer engineers, programmers, ICT innovators, policymakers, researchers, academicians, and students.
Visual Knowledge Modeling for Semantic Web Technologies: Models and Ontologies aims to make visual knowledge modeling available to individuals as an intellectual method and a set of tools at different levels of formalization. It aims to provide to its readers a simple, yet powerful visual language to structure their thoughts, analyze information, transform it to personal knowledge, and communicate information to support knowledge acquisition in collaborative activities.
Through a series of step-by-step tutorials and numerous hands-on exercises, this book aims to equip the reader with both a good understanding of the importance of space in the abstract world of engineers and the ability to create a model of a product in virtual space - a skill essential for any designer or engineer who needs to present ideas concerning a particular product within a professional environment. The exercises progress logically from the simple to the more complex; while Solid Works or NX is the software used, the underlying philosophy is applicable to all modeling software. In each case, the explanation covers the entire procedure from the basic idea and production capabilities through to the real model; the conversion from 3D model to 2D manufacturing drawing is also clearly explained. Topics covered include modeling of prism, axisymmetric, symmetric and sophisticated shapes; digitization of physical models using modeling software; creation of a CAD model starting from a physical model; free form surface modeling; modeling of product assemblies following bottom-up and top-down principles; and the presentation of a product in accordance with the rules of technical documentation. This book, which includes more than 500 figures, will be ideal for students wishing to gain a sound grasp of space modeling techniques. Academics and professionals will find it to be an excellent teaching and research aid, and an easy-to-use guide.
In recent years there has been an explosion of research into linear programming, as well as further steady advances in integer programming. This research has been reported in the research literature but there has been little done from the view of a "combined whole". This book aims to overcome this. With an international authorship of contributors from acknowledged experts in their field, this book provides a clear exposition on such topics as simplex algorithms, and interior point algorithms, both from a theoretical and a computational viewpoint. Surveying recent research that is currently only available in journals this topical book will be of interest not only in the field of mathematics, but also in computer science and operations research as well.
This text on geometry is devoted to various central geometrical topics including: graphs of functions, transformations, (non-)Euclidean geometries, curves and surfaces as well as their applications in a variety of disciplines. This book presents elementary methods for analytical modeling and demonstrates the potential for symbolic computational tools to support the development of analytical solutions. The author systematically examines several powerful tools of MATLAB (R) including 2D and 3D animation of geometric images with shadows and colors and transformations using matrices. With over 150 stimulating exercises and problems, this text integrates traditional differential and non-Euclidean geometries with more current computer systems in a practical and user-friendly format. This text is an excellent classroom resource or self-study reference for undergraduate students in a variety of disciplines.
This work, a tribute to renowned researcher Robert Paige, is a collection of revised papers published in his honor in the Higher-Order and Symbolic Computation Journal in 2003 and 2005. Among them there are two key papers: a retrospective view of his research lines, and a proposal for future studies in the area of the automatic program derivation. The book also includes some papers by members of the IFIP Working Group 2.1 of which Bob was an active member.
Nash equilibrium is the central solution concept in Game Theory. Since Nash's original paper in 1951, it has found countless applications in modeling strategic behavior of traders in markets, (human) drivers and (electronic) routers in congested networks, nations in nuclear disarmament negotiations, and more. A decade ago, the relevance of this solution concept was called into question by computer scientists, who proved (under appropriate complexity assumptions) that computing a Nash equilibrium is an intractable problem. And if centralized, specially designed algorithms cannot find Nash equilibria, why should we expect distributed, selfish agents to converge to one? The remaining hope was that at least approximate Nash equilibria can be efficiently computed.Understanding whether there is an efficient algorithm for approximate Nash equilibrium has been the central open problem in this field for the past decade. In this book, we provide strong evidence that even finding an approximate Nash equilibrium is intractable. We prove several intractability theorems for different settings (two-player games and many-player games) and models (computational complexity, query complexity, and communication complexity). In particular, our main result is that under a plausible and natural complexity assumption ("Exponential Time Hypothesis for PPAD"), there is no polynomial-time algorithm for finding an approximate Nash equilibrium in two-player games. The problem of approximate Nash equilibrium in a two-player game poses a unique technical challenge: it is a member of the class PPAD, which captures the complexity of several fundamental total problems, i.e., problems that always have a solution; and it also admits a quasipolynomial time algorithm. Either property alone is believed to place this problem far below NP-hard problems in the complexity hierarchy; having both simultaneously places it just above P, at what can be called the frontier of intractability. Indeed, the tools we develop in this book to advance on this frontier are useful for proving hardness of approximation of several other important problems whose complexity lies between P and NP: Brouwer's fixed point, market equilibrium, CourseMatch (A-CEEI), densest k-subgraph, community detection, VC dimension and Littlestone dimension, and signaling in zero-sum games. |
You may like...
A History of Alcatraz Island Since 1853
Gregory L. Wellman
Paperback
Military Architecture in England During…
A.Hamilton Thompson
Hardcover
R1,215
Discovery Miles 12 150
Hospital 21 - Breathing new Life in the…
Roberto Bologna, Thomas Schinko
Hardcover
R1,206
Discovery Miles 12 060
|