![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming > General
The fourteenth volume of the Second Edition covers central topics in philosophical logic that have been studied for thousands of years, since Aristotle: Inconsistency, Causality, Conditionals, and Quantifiers. These topics are central in many applications of logic in central disciplines and this book is indispensable to any advanced student or researcher using logic in these areas. The chapters are comprehensive and written by major figures in the field.
This book is an important collection for scholars and students interested in the critical analysis of digital games, and will be of interest across several disciplines including game studies, game design and development, internet studies, visual studies, cultural studies, communication studies, and media studies, as well as disability studies The book explores the opportunities and challenges people with disabilities experience in the context of digital games from the perspective of three related areas: representation, access and inclusion, and community Drawing on key concerns in disability media studies, the book brings together scholars from disability studies and game studies, alongside game developers, educators, and disability rights activists, to reflect upon the increasing visibility of disabled characters in digital games Chapters explore the contemporary gaming environment as it relates to disability on platforms such as Twitch, Minecraft, and Tingyou, while also addressing future possibilities and pitfalls for people with disabilities within gaming given the rise of virtual reality applications, and augmented games such as Pokemon Go The book also asks how game developers can attempt to represent diverse abilities, taking games such as BlindSide and Overwatch as examples
The only beginning book of its kind, this book will teach you SAP/ABAP developers the skills you need for Java 5 programming. The book emphasizes the fundamentals of core Java SE 5 and Java EE 5, to get you up to speed with these technologies. You'll learn about the most important enterprise Java API found in the new Java EE 5 platform, which you can immediately use and integrate. Furthermore, the book elaborates on connecting to a database, SAP Java Connector, servlets, Java Server Pages, Enterprise JavaBeans, and Java Messaging.
SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.
Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in relational databases. "Introduction to Constraint Databases" comprehensively covers both constraint-database theory and several sample systems. The book reveals how constraint databases bring together techniques from a variety of fields, such as logic and model theory, algebraic and computational geometry, and symbolic computation, to the design and analysis of data models and query languages. Constraint databases are shown to be powerful and simple tools for data modeling and querying in application areas¿such as environmental modeling, bioinformatics, and computer vision--that are not suitable for relational databases. Specific applications are examined in geographic information systems, spatiotemporal data management, linear programming, genome databases, model checking of automata, and other areas. Topics and features: *Offers a database perspective and a focus on simplicity at the user level *Utilizes simple tools for determining whether queries are safe or not *Incorporates scientist-supplied descriptions of applications *Explains constraint databases from a developer's viewpoint *Provides extensive exercise sets, and sample software systems, that facilitate rapid learning of the topic within a real-world software context This volume presents a comprehensive introduction to the theory and applications of constraint database systems, which provide new methods for the design of data models and query languages. It is an essential resource for advanced students, practitioners, and professionals in computer science, database systems, and information systems.
All games are potentially transformative experiences because they engage the player in dynamic action. When repurposed in an educational context, even highly popular casual games played online to pass the time can engage players in a way that deepens learning. Games as Transformative Experiences for Critical Thinking, Cultural Awareness, and Deep Learning: Strategies & Resources examines the learning value of a wide variety of games across multiple disciplines. Organized just like a well-made game, the book is divided into four parts highlighting classroom experiences, community and culture, virtual learning, and interdisciplinary instruction. The author crosses between the high school and college classroom and addresses a range of disciplines, both online and classroom practice, the design of curriculum, and the transformation of assessment practices. In addition to a wealth of practical exercises, resources, and lesson ideas, the book explains how to use a wide and diverse range of games from casual to massively multiplayer online games for self-improvement as well as classroom situations.
This volume contains the proceedings of the conference Logical Foundations of Mathematics, Computer Science, and Physics-Kurt Godel's Legacy, held in Brno, Czech Republic on the 90th anniversary of his birth. The wide and continuing importance of Godel s work in the logical foundations of mathematics, computer science, and physics is confirmed by the broad range of speakers who participated in making this gathering a scientific event.
Encompassing all the major topics students will encounter in courses on the subject, the authors teach both the underlying mathematical foundations and how these ideas are implemented in practice. They illustrate all the concepts with both worked examples and plenty of exercises, and, in addition, provide software so that students can try out numerical methods and so hone their skills in interpreting the results. As a result, this will make an ideal textbook for all those coming to the subject for the first time. Authors' note: A problem recently found with the software is due to a bug in Formula One, the third party commercial software package that was used for the development of the interface. It occurs when the date, currency, etc. format is set to a non-United States version. Please try setting your computer date/currency option to the United States option . The new version of Formula One, when ready, will be posted on WWW.
Peer-to-peer computing has gained significant attention from both industry and research communities in the past decade as the number of users worldwide continues to grow along with demand for mobile computing. Mobile Peer-to-Peer Computing for Next Generation Distributed Environments: Advancing Conceptual and Algorithmic Applications focuses on current research and innovation in mobile and wireless technologies that address challenges from both a theoretical and applied perspective. This advanced publication provides researchers, practitioners, and academicians with an authoritative reference source to the latest state-of-the-art developments in this growing technology field.
This is a book on Linear-Fractional Programming (here and in what follows we will refer to it as "LFP"). The field of LFP, largely developed by Hungarian mathematician B. Martos and his associates in the 1960's, is concerned with problems of op timization. LFP problems deal with determining the best possible allo cation of available resources to meet certain specifications. In particular, they may deal with situations where a number of resources, such as people, materials, machines, and land, are available and are to be combined to yield several products. In linear-fractional programming, the goal is to determine a per missible allocation of resources that will maximize or minimize some specific showing, such as profit gained per unit of cost, or cost of unit of product produced, etc. Strictly speaking, linear-fractional programming is a special case of the broader field of Mathematical Programming. LFP deals with that class of mathematical programming problems in which the relations among the variables are linear: the con straint relations (i.e. the restrictions) must be in linear form and the function to be optimized (i.e. the objective function) must be a ratio of two linear functions."
This book discusses theoretically and empirically the trade-off relationship between the frequency of product adaptation activities and the constraints on development resources, and how companies can respond to these constraints. The objective of this book is to identify effective management practices in continuous product development. With the continuation of development activities, companies are required to constantly adapt their products to changes in the external environment. In continuous product development, the development process extends beyond product release, and interaction with the external environment is not limited to the planning stage but occurs multiple times throughout the process. What impact does the multiple adaptation activities have on the product performance as development activities become more continuous, and how to use limited development resources to provide stable and constant high-quality adaptation activities with optimal frequency have become urgent issues in the development sites. To address these research questions, this book focuses primarily on the development activities of the online game industry. The factors that bring about superior product performance are examined by combining case studies and questionnaire surveys on online game development projects. Furthermore, user community management is also discussed from the perspective of the interaction process between multiple user groups.
Far from being the passive containers for semiconductor devices of the past, the packages in today's high performance computers pose numerous challenges in interconnecting, powering, cooling and protecting devices. While semiconductor circuit performance measured in picoseconds continues to improve, computer performance is expected to be in nanoseconds for the rest of this century -a factor of 1000 difference between on-chip and off-chip performance which is attributable to losses associated with the package. Thus the package, which interconnects all the chips to form a particular function such as a central processor, is likely to set the limits on how far computers can evolve. Multichip packaging, which can relax these limits and also improve the reliability and cost at the systems level, is expected to be the basis of all advanced computers in the future. In addition, since this technology allows chips to be spaced more closely, in less space and with less weight, it has the added advantage of being useful in portable consumer electronics as well as in medical, aerospace, automotive and telecommunications products. The multichip technologies with which these applications can be addressed are many. They range from ceramics to polymer-metal thin films to printed wiring boards for interconnections; flip chip, TAB or wire bond for chip-to-substrate connections; and air or water cooling for the removal of heat.
Cay Horstmann s seventh edition of Java Concepts provides an approachable introduction to fundamental programming techniques and design skills, helping students master basic concepts and become competent coders. Major rewrites and an updated visual design make this student-friendly text even more engaging. The text is known for its realistic programming examples, great quantity and variety of homework assignments, and lab exercises that build student problem-solving abilities. The seventh edition now includes problem solving sections, more example code online, and exercises from Science and Business.
This book presents 13 peer-reviewed papers as written results from the 2005 workshop "Topology-Based Methods in Visualization" that was initiated to enable additional stimulation in this field. It contains a survey of the state-of-the-art, as well original work by leading experts that has not been published before, spanning both theory and applications. It captures key concepts and novel ideas and serves as an overview of current trends in its subject.
This book describes the rapidly developing field of interior point methods (IPMs). An extensive analysis is given of path-following methods for linear programming, quadratic programming and convex programming. These methods, which form a subclass of interior point methods, follow the central path, which is an analytic curve defined by the problem. Relatively simple and elegant proofs for polynomiality are given. The theory is illustrated using several explicit examples. Moreover, an overview of other classes of IPMs is given. It is shown that all these methods rely on the same notion as the path-following methods: all these methods use the central path implicitly or explicitly as a reference path to go to the optimum. For specialists in IPMs as well as those seeking an introduction to IPMs. The book is accessible to any mathematician with basic mathematical programming knowledge.
Part of the highly successful Shelly Cashman Series (R), this text provides an introduction to HTML5 and CSS and leads the user through a clear, step-by-step, screen-by-screen approach to learning. Readers learn how to create a Web page using HTML5, format the page, add graphics, and more.
The field of global optimization has been developing at a rapid pace. There is a journal devoted to the topic, as well as many publications and notable books discussing various aspects of global optimization. This book is intended to complement these other publications with a focus on stochastic methods for global optimization. Stochastic methods, such as simulated annealing and genetic algo rithms, are gaining in popularity among practitioners and engineers be they are relatively easy to program on a computer and may be cause applied to a broad class of global optimization problems. However, the theoretical performance of these stochastic methods is not well under stood. In this book, an attempt is made to describe the theoretical prop erties of several stochastic adaptive search methods. Such a theoretical understanding may allow us to better predict algorithm performance and ultimately design new and improved algorithms. This book consolidates a collection of papers on the analysis and de velopment of stochastic adaptive search. The first chapter introduces random search algorithms. Chapters 2-5 describe the theoretical anal ysis of a progression of algorithms. A main result is that the expected number of iterations for pure adaptive search is linear in dimension for a class of Lipschitz global optimization problems. Chapter 6 discusses algorithms, based on the Hit-and-Run sampling method, that have been developed to approximate the ideal performance of pure random search. The final chapter discusses several applications in engineering that use stochastic adaptive search methods."
Praise from the Reviewers: "The practicality of the subject in a real-world situation
distinguishes this book from others available on the market." "This book could replace the computer organization texts now in
use that every CS and CpE student must take. . . . It is much
needed, well written, and thoughtful." A distinctive, educational text onsoftware performance and scalability This is the first book to take a quantitative approach to the subject of software performance and scalability. It brings together three unique perspectives to demonstrate how your products can be optimized and tuned for the best possible performance and scalability: The Basics--introduces the computer hardware and software architectures that predetermine the performance and scalability of a software product as well as the principles of measuring the performance and scalability of a software productQueuing Theory--helps you learn the performance laws and queuing models for interpreting the underlying physics behind software performance and scalability, supplemented with ready-to-apply techniques for improving the performance and scalability of a software systemAPI Profiling--shows you how to design more efficient algorithms and achieve optimized performance and scalability, aided by adopting an API profiling framework (perfBasic) built on the concept of a performance map for drilling down performance root causes at the API level "Software Performance and Scalability" gives you a specialized skill set that will enable you to design and build performance into your products with immediate, measurable improvements. Complemented with real-world case studies, it is an indispensable resource for software developers, quality and performance assurance engineers, architects, and managers. It is anideal text for university courses related to computer and software performance evaluation and can also be used to supplement a course in computer organization or in queuing theory for upper-division and graduate computer science students.
Electronics has become the largest industry, surpassing agriCUlture, auto. and heavy metal industries. It has become the industry of choice for a country to prosper, already having given rise to the phenomenal prosperity of Japan. Korea. Singapore. Hong Kong. and Ireland among others. At the current growth rate, total worldwide semiconductor sales will reach $300B by the year 2000. The key electronic technologies responsible for the growth of the industry include semiconductors. the packaging of semiconductors for systems use in auto, telecom, computer, consumer, aerospace, and medical industries. displays. magnetic, and optical storage as well as software and system technologies. There has been a paradigm shift, however, in these technologies. from mainframe and supercomputer applications at any cost. to consumer applications at approximately one-tenth the cost and size. Personal computers are a good example. going from $500IMIP when products were first introduced in 1981, to a projected $lIMIP within 10 years. Thin. light portable. user friendly and very low-cost are. therefore. the attributes of tomorrow's computing and communications systems. Electronic packaging is defined as interconnection. powering, cool ing, and protecting semiconductor chips for reliable systems. It is a key enabling technology achieving the requirements for reducing the size and cost at the system and product level."
By its very nature, free and open source software encourages collaboration within and across virtual teams and promotes interdisciplinary methods and perspectives. Multi-Disciplinary Advancement in Open Source Software and Processes reviews the development, design, and use of free and open source software, providing relevant topics of discussion for programmers, as well as researchers in human-computer studies, online and virtual collaboration, and e-learning. This reference explores successes and failures in the discipline, providing a foundation for future research and new approaches for the development and application of free and open source projects.
First published in 1993, this thesis is concerned with the design of efficient algorithms for listing combinatorial structures. The research described here gives some answers to the following questions: which families of combinatorial structures have fast computer algorithms for listing their members? What general methods are useful for listing combinatorial structures? How can these be applied to those families which are of interest to theoretical computer scientists and combinatorialists? Amongst those families considered are unlabelled graphs, first order one properties, Hamiltonian graphs, graphs with cliques of specified order, and k-colourable graphs. Some related work is also included, which compares the listing problem with the difficulty of solving the existence problem, the construction problem, the random sampling problem, and the counting problem. In particular, the difficulty of evaluating Polya's cycle polynomial is demonstrated.
Operations research and mathematical programming would not be as advanced today without the many advances in interior point methods during the last decade. These methods can now solve very efficiently and robustly large scale linear, nonlinear and combinatorial optimization problems that arise in various practical applications. The main ideas underlying interior point methods have influenced virtually all areas of mathematical programming including: analyzing and solving linear and nonlinear programming problems, sensitivity analysis, complexity analysis, the analysis of Newton's method, decomposition methods, polynomial approximation for combinatorial problems etc. This book covers the implications of interior techniques for the entire field of mathematical programming, bringing together many results in a uniform and coherent way. For the topics mentioned above the book provides theoretical as well as computational results, explains the intuition behind the main ideas, gives examples as well as proofs, and contains an extensive up-to-date bibliography. Audience: The book is intended for students, researchers and practitioners with a background in operations research, mathematics, mathematical programming, or statistics.
Analyses a variety of approaches to development and publishing, across a multitude of platforms and genres, to provide a new vision for the next twenty years of game development. Considers technical advances in adjacent markets and how they will impact the games industry over the next twenty years. Includes insightful interviews from leading game and entertainment industry figures.
At a time when information systems are becoming ever more complex and quality to market and time to market are critical for many companies, a structured test process is essential. Even more important is a structured test management process to keep testing under control. Nowadays a test manager must have extensive knowledge of and experience with project management, risk assessment, team building, and, process improvement. Based on their long-term industry experience, Pinkster and her coauthors describe a holistic approach to test management that combines test methods, test management, risk assessment and stakeholder management into one integral process, giving test managers, test coordinators, IT project managers, and QA managers a competitive edge in environments where there are numerous unstructured requirements, tough testing schedules and limited resources. This book should be in every test manager's backpack!
Time is ubiquitous in information systems. Almost every enterprise faces the problem of its data becoming out of date. However, such data is often valu able, so it should be archived and some means to access it should be provided. Also, some data may be inherently historical, e.g., medical, cadastral, or ju dicial records. Temporal databases provide a uniform and systematic way of dealing with historical data. Many languages have been proposed for tem poral databases, among others temporal logic. Temporal logic combines ab stract, formal semantics with the amenability to efficient implementation. This chapter shows how temporal logic can be used in temporal database applica tions. Rather than presenting new results, we report on recent developments and survey the field in a systematic way using a unified formal framework [GHR94; Ch094]. The handbook [GHR94] is a comprehensive reference on mathematical foundations of temporal logic. In this chapter we study how temporal logic is used as a query and integrity constraint language. Consequently, model-theoretic notions, particularly for mula satisfaction, are of primary interest. Axiomatic systems and proof meth ods for temporal logic [GHR94] have found so far relatively few applications in the context of information systems. Moreover, one needs to bear in mind that for the standard linearly-ordered time domains temporal logic is not re cursively axiomatizable [GHR94]' so recursive axiomatizations are by necessity incomplete. |
![]() ![]() You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,366
Discovery Miles 13 660
Research Anthology on Agile Software…
Information R Management Association
Hardcover
R16,166
Discovery Miles 161 660
|