![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
Hone Your Agile Leadership Skills to Help Your Organization Transform and Thrive To leverage the immense opportunities associated with accelerating change, organizations need teams capable of trying new ideas quickly, learning from their experiences, and adapting based on that learning. Helping these teams to grow and thrive requires agile leaders who support, inspire, and encourage, and who can leave behind the management skills of directing, monitoring, and rewarding or punishing. The Professional Agile Leader is a realistic, practical guide, written by experienced agile leaders who share their collective experiences in helping agile leaders to grow responsive and adaptive teams. They structure powerful lessons around a case study based on decades of experience helping agile leaders achieve and sustain agile transformation. Best of all, they never settle for high-level hand-waving--they show you how it's really done. Reignite once-successful organizations that have lost their way Form cross-functional teams and empower them with purpose Learn to let go, as your teams start taking more responsibility Overcome forces that want to reel you back into the "old rules" Realign the whole organization, since agile and traditional models can't coexist forever Achieve the most challenging goal of all: changing culture Great agile leaders aren't born that way--they're regular people who care deeply about helping others achieve shared goals and have discovered a better way to lead. Whatever your role in the organization, this guide will help you master those skills and mindsets a whole lot faster. "Drawing on vast experience, Ron, Kurt, and Laurens tease out practical tips and patterns for good leadership [and show] how a leader can help shape the environment for agile teams to succeed. . . . The narrative style of the book makes it easy to read, and I am sure there will be many times that you see yourself in it." --From the Foreword by Dave West, CEO and Product Owner, Scrum.org Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
The interplay between words, computability, algebra and arithmetic has now proved its relevance and fruitfulness. Indeed, the cross-fertilization between formal logic and finite automata (such as that initiated by J.R. Buchi) or between combinatorics on words and number theory has paved the way to recent dramatic developments, for example, the transcendence results for the real numbers having a "simple" binary expansion, by B. Adamczewski and Y. Bugeaud. This book is at the heart of this interplay through a unified exposition. Objects are considered with a perspective that comes both from theoretical computer science and mathematics. Theoretical computer science offers here topics such as decision problems and recognizability issues, whereas mathematics offers concepts such as discrete dynamical systems. The main goal is to give a quick access, for students and researchers in mathematics or computer science, to actual research topics at the intersection between automata and formal language theory, number theory and combinatorics on words. The second of two volumes on this subject, this book covers regular languages, numeration systems, formal methods applied to decidability issues about infinite words and sets of numbers.
These days, the nature of services and the volume of demand in the telecommu nication industry is changing radically, with the replacement of analog transmis sion and traditional copper cables by digital technology and fiber optic transmis sion equipment. Moreover, we see an increasing competition among providers of telecommunication services, and the development of a broad range of new services for users, combining voice, data, graphics and video. Telecommunication network planning has thus become an important problem area for developing and applying optimization models. Telephone companies have initiated extensive modeling and planning efforts to expand and upgrade their transmission facilities, which are, for most national telecommunication networks, divided in three main levels (see Balakrishnan et al. 5]), namely, l. the long-distance or backbone network that typically connects city pairs through gateway nodes; 2. the inter-office or switching center network within each city, that interconnects switching centers in different subdivisions (clusters of customers) and provides access to the gateway(s) node(s); 1 2 DESIGN OF SURVNABLE NETWORKS WITH BOUNDED RINGS 3. the local access network that connects individual subscribers belonging to a cluster to the corresponding switching center. These three levels differ in several ways including their design criteria. Ideally, the design of a telecommunication network should simultaneously account for these three levels. However, to simplify the planning task, the overall planning problem is decomposed by considering each level separately."
This comprehensive guide walks readers through the entire process of getting and keeping a writing job in the games industry. It outlines exactly what a beginner needs to know about education requirements, finding opportunities, applying for roles, and acing studio interviews. Professional writers will learn how to navigate studio hierarchies, transfer roles and companies, work overseas, and keep developing their careers. Written by an experienced games writer with nearly two decades of industry knowledge, the book contains a wealth of interviews and perspectives with industry leaders, hiring managers, and developers from marginalized communities, all offering their tips and insights. Included are examples of materials such as job posts, writing samples, and portfolios, as well as chapter end challenges for readers to directly apply the skills they have learnt. This book will be of great interest to all beginner and aspiring games writers and narrative designers, as well as more experienced writers looking to hone their skills.
The budding field of nanotechnology offers enormous potential for advances in medical science, engineering, transportation, computers, and many other industries. As this growing field solidifies, these technological advances may soon become a reality. Nanoscience and Advancing Computational Methods in Chemistry: Research Progress provides innovative chapters covering the growth of educational, scientific, and industrial research activities among chemical engineers and provides a medium for mutual communication between international academia and the industry. This book publishes significant research reporting new methodologies and important applications in the fields of chemical informatics and discusses latest coverage of chemical databases and the development of new experimental methods.
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture. Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures. Focusing on cognitive resource and service management, the book examines the specific research challenges of the Swarm computing approach, related to the characteristics of IoT connected devices that form the infrastructure. It also offers academics and practitioners insights for future research in the fields of Edge and Swarm computing.
This book explores the fundamentals of computer music and functional programming through the Haskell programming language. Functional programming is typically considered difficult to learn. This introduction in the context of creating music will allow students and professionals with a musical inclination to leverage their experience to help understand concepts that might be intimidating in more traditional computer science settings. Conversely, the book opens the door for programmers to interact with music by using a medium that is familiar to them. Readers will learn how to use the Euterpea library for Haskell (http://www.euterpea.com) to represent and create their own music with code, without the need for other music software. The book explores common paradigms used in algorithmic music composition, such as stochastic generation, musical grammars, self-similarity, and real-time interactive systems. Other topics covered include the basics of signal-based systems in Haskell, sound synthesis, and virtual instrument design.
This book provides a unified and insightful treatment of deterministic global optimization. It introduces theoretical and algorithmic advances that address the computation and characterization of global optima, determine valid lower and upper bounds on the global minima and maxima, and enclose all solutions of nonlinear constrained systems of equations. Among its special features, the book: Introduces the fundamentals of deterministic global optimization; Provides a thorough treatment of decomposition-based global optimization approaches for biconvex and bilinear problems; Covers global optimization methods for generalized geometric programming problems Presents in-depth global optimization algorithms for general twice continuously differentiable nonlinear problems; Provides a detailed treatment of global optimization methods for mixed-integer nonlinear problems; Develops global optimization approaches for the enclosure of all solutions of nonlinear constrained systems of equations; Includes many important applications from process design, synthesis, control, and operations, phase equilibrium, design under uncertainty, parameter estimation, azeotrope prediction, structure prediction in clusters and molecules, protein folding, and peptide docking. Audience: This book can be used as a textbook in graduate-level courses and as a desk reference for researchers in all branches of engineering and applied science, applied mathematics, industrial engineering, operations research, computer science, economics, computational chemistry and molecular biology.
The World Wide Web and ubiquitous computing technologies have given a significant boost to the emerging field of XML database research. ""Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies"" covers comprehensive issues and challenges discovered through leading international XML database research. A useful reference source for researchers, practitioners, and academicians, this book provides complete references to the latest research in XML technology.
Hybrid systems are models for complex physical systems and have become a widely used concept for understanding their behavior. Many applications are safety-critical, including car, railway, and air traffic control, robotics, physical-chemical process control, and biomedical devices. Hybrid systems analysis studies how we can build computerized controllers for physical systems which are guaranteed to meet their design goals. The author gives a unique, logic-based perspective on hybrid systems analysis. It is the first book that leverages the power of logic for hybrid systems. The author develops a coherent logical approach for systematic hybrid systems analysis, covering its theory, practice, and applications. It is further shown how the developed verification techniques can be used to study air traffic and railway control systems. This book is intended for researchers, postgraduates, and professionals who are interested in hybrid systems analysis, cyberphysical or embedded systems design, logic and theorem proving, or transportation and automation.
This book presents revised versions of the best papers selected from the symposium Mathematical Progress in Expressive Image Synthesis (MEIS2013) held in Fukuoka, Japan, in 2013. The topics cover various areas of computer graphics (CG), such as surface deformation/editing, character animation, visual simulation of fluids, texture and sound synthesis and photorealistic rendering. From a mathematical point of view, the book also presents papers addressing discrete differential geometry, Lie theory, computational fluid dynamics, function interpolation and learning theory. This book showcases the latest joint efforts between mathematicians, CG researchers and practitioners exploring important issues in graphics and visual perception.The book provides a valuable resource for all computer graphics researchers seeking open problem areas, especially those now entering the field who have not yet selected a research direction."
With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.
This book provides readers the "big picture" and a comprehensive survey of the domain of big data processing systems. For the past decade, the Hadoop framework has dominated the world of big data processing, yet recently academia and industry have started to recognize its limitations in several application domains and thus, it is now gradually being replaced by a collection of engines that are dedicated to specific verticals (e.g. structured data, graph data, and streaming data). The book explores this new wave of systems, which it refers to as Big Data 2.0 processing systems. After Chapter 1 presents the general background of the big data phenomena, Chapter 2 provides an overview of various general-purpose big data processing systems that allow their users to develop various big data processing jobs for different application domains. In turn, Chapter 3 examines various systems that have been introduced to support the SQL flavor on top of the Hadoop infrastructure and provide competing and scalable performance in the processing of large-scale structured data. Chapter 4 discusses several systems that have been designed to tackle the problem of large-scale graph processing, while the main focus of Chapter 5 is on several systems that have been designed to provide scalable solutions for processing big data streams, and on other sets of systems that have been introduced to support the development of data pipelines between various types of big data processing jobs and systems. Next, Chapter 6 focuses on covering the emerging frameworks and systems in the domain of scalable machine learning and deep learning processing. Lastly, Chapter 7 shares conclusions and an outlook on future research challenges. This new and considerably enlarged second edition not only contains the completely new chapter 6, but also offers a refreshed content for the state-of-the-art in all domains of big data processing over the last years. Overall, the book offers a valuable reference guide for professional, students, and researchers in the domain of big data processing systems. Further, its comprehensive content will hopefully encourage readers to pursue further research on the subject.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICI2CT 2020), held at National University of Singapore, Singapore, during 18-19 December 2020. It presents the works on the intersection of the Computer Science and Communication Engineering. Topics covered in the book include communications engineering, Internet and web technology, computer and information science, artificial intelligence, data science and management, and ICT applications.
The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)
"Pro Java EE 5 Performance Management and Optimization" features proven methodology to guarantee top-performing Java EE 5 applications, and explains how to measure performance in your specific environment. The book also details performance integration points throughout the development and deployment lifecycles that are crucial for application success. For QA and preproduction stages, this book guides you through testing and optimally deploying your Java EE 5 applications, with a focus on assessing capacity and discovering saturation points. It defines the concept and application of wait-based tuningone of the most effective approaches to application server tuning. The book also helps you assess and improve the health of your applications upon deployment. The topics covered include trending, forecasting, and capacity assessing and planning. When production issues arise, youll be armed with troubleshooting methodology and solutions to common problems that have been observed in real-world environments. This book even guides you through the creation of a formal Java EE 5 Performance Management Plancustomized to your environment to help you interpret and react to changing trends in usage patterns.
The parameter estimation and hypothesis testing are the basic tools in statistical inference. These techniques occur in many applications of data processing., and methods of Monte Carlo have become an essential tool to assess performance. For pedagogical purposes the book includes several computational problems and exercices. To prevent students from getting stuck on exercises, detailed corrections are provided.
These proceedings gather outstanding research papers presented at the Second International Conference on Data Engineering 2015 (DaEng-2015) and offer a consolidated overview of the latest developments in databases, information retrieval, data mining and knowledge management. The conference brought together researchers and practitioners from academia and industry to address key challenges in these fields, discuss advanced data engineering concepts and form new collaborations. The topics covered include but are not limited to: * Data engineering * Big data * Data and knowledge visualization * Data management * Data mining and warehousing * Data privacy & security * Database theory * Heterogeneous databases * Knowledge discovery in databases * Mobile, grid and cloud computing * Knowledge management * Parallel and distributed data * Temporal data * Web data, services and information engineering * Decision support systems * E-Business engineering and management * E-commerce and e-learning * Geographical information systems * Information management * Information quality and strategy * Information retrieval, integration and visualization * Information security * Information systems and technologies
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
This book provides insights into the state of the art of digital cultural heritage using computer graphics, image processing, computer vision, visualization and reconstruction, virtual and augmented reality and serious games. It aims at covering the emergent approaches for digitization and preservation of Cultural Heritage, both in its tangible and intangible facets. Advancements in Digital Cultural Heritage research have been abundant in recent years covering a wide assortment of topics, ranging from visual data acquisition, pre-processing, classification, analysis and synthesis, 3D modelling and reconstruction, semantics and symbolic representation, metadata description, repository and archiving, to new forms of interactive and personalized presentation, visualization and immersive experience provision via advanced computer graphics, interactive virtual and augmented environments, serious games and digital storytelling. Different aspects pertaining to visual computing with regard to tangible (books, images, paintings, manuscripts, uniforms, maps, artefacts, archaeological sites, monuments) and intangible (e.g. dance and performing arts, folklore, theatrical performances) cultural heritage preservation, documentation, protection and promotion are covered, including rendering and procedural modelling of cultural heritage assets, keyword spotting in old documents, drone mapping and airborne photogrammetry, underwater recording and reconstruction, gamification, visitor engagement, animated storytelling, analysis of choreographic patterns, and many more. The book brings together and targets researchers from the domains of computing, engineering, archaeology and the arts, and aims at underscoring the potential for cross-fertilization and collaboration among these communities.
Oxford Coding and Robotics
Novice Level 2, in partnership with Resolute Education, comprises a
Workbook and Teacher's Guide, for use together with the Novice Bot Kit.
The Level 2 Workbook introduces learners to the parts of a robot, and
provides opportunities to practise coding skills with LEDs, LED arrays,
push buttons as well as movements. They also learn the importance of
time and space in coding.
SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization. |
You may like...
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Practical Guide to Usability Testing
Joseph S. Dumas, Janice C. Redish
Paperback
R984
Discovery Miles 9 840
|