![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > General
This volume contains the edited texts of the lectures presented at the workshop on Nonlinear Optimization: Theory and Applications, held in Erice at the "G. Stampacchia" School of Mathematics of the "E. Majorana" International Centre for Scientific Culture June 13-21, 1995. The meeting was conceived to review and discuss recent advances and promising research trends concerning theory, algorithms, and innovative applications in the field This is a field of mathematics which is providing viable of Nonlinear Optimization. tools in engineering, in economics and in other applied sciences, and which is giving a great contribution also in the solution of the more practiced linear optimization prob lems. The meeting was attended by approximately 70 people from 18 countries. Besides the lectures, several formal and informal discussions took place. The result was a broad exposure providing a wide and deep understanding of the present research achievements in the field. We wish to express our appreciation for the active contributions of all the partici pants in the meeting. Our gratitude is due to the Ettore Majorana Center in Erice, which offered its facilities and stimulating environment: its staff was certainly instrumental for the success of the meeting. Our gratitude is also due to Francisco Facchinei and Massino Roma for the time spent in the organization of the workshop, and to Giuliana Cai for the careful typesetting of this volume."
This book - composed of two volumes - explores the syntactical constructs of the most common programming languages, and sheds a mathematical light on their semantics, providing also an accurate presentation of the material aspects that interfere with coding. Concepts and Semantics of Programming Languages 2 presents an original semantic model, collectively taking into account all of the constructs and operations of modules and classes: visibility, import, export, delayed definitions, parameterization by types and values, extensions, etc. The model serves for the study of Ada and OCaml modules, as well as C header files. It can be deployed to model object and class features, and is thus used to describe Java, C++, OCaml and Python classes. This book is intended not only for computer science students and teachers but also seasoned programmers, who will find a guide to reading reference manuals and the foundations of program verification.
Hone Your Agile Leadership Skills to Help Your Organization Transform and Thrive To leverage the immense opportunities associated with accelerating change, organizations need teams capable of trying new ideas quickly, learning from their experiences, and adapting based on that learning. Helping these teams to grow and thrive requires agile leaders who support, inspire, and encourage, and who can leave behind the management skills of directing, monitoring, and rewarding or punishing. The Professional Agile Leader is a realistic, practical guide, written by experienced agile leaders who share their collective experiences in helping agile leaders to grow responsive and adaptive teams. They structure powerful lessons around a case study based on decades of experience helping agile leaders achieve and sustain agile transformation. Best of all, they never settle for high-level hand-waving--they show you how it's really done. Reignite once-successful organizations that have lost their way Form cross-functional teams and empower them with purpose Learn to let go, as your teams start taking more responsibility Overcome forces that want to reel you back into the "old rules" Realign the whole organization, since agile and traditional models can't coexist forever Achieve the most challenging goal of all: changing culture Great agile leaders aren't born that way--they're regular people who care deeply about helping others achieve shared goals and have discovered a better way to lead. Whatever your role in the organization, this guide will help you master those skills and mindsets a whole lot faster. "Drawing on vast experience, Ron, Kurt, and Laurens tease out practical tips and patterns for good leadership [and show] how a leader can help shape the environment for agile teams to succeed. . . . The narrative style of the book makes it easy to read, and I am sure there will be many times that you see yourself in it." --From the Foreword by Dave West, CEO and Product Owner, Scrum.org Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
The interplay between words, computability, algebra and arithmetic has now proved its relevance and fruitfulness. Indeed, the cross-fertilization between formal logic and finite automata (such as that initiated by J.R. Buchi) or between combinatorics on words and number theory has paved the way to recent dramatic developments, for example, the transcendence results for the real numbers having a "simple" binary expansion, by B. Adamczewski and Y. Bugeaud. This book is at the heart of this interplay through a unified exposition. Objects are considered with a perspective that comes both from theoretical computer science and mathematics. Theoretical computer science offers here topics such as decision problems and recognizability issues, whereas mathematics offers concepts such as discrete dynamical systems. The main goal is to give a quick access, for students and researchers in mathematics or computer science, to actual research topics at the intersection between automata and formal language theory, number theory and combinatorics on words. The second of two volumes on this subject, this book covers regular languages, numeration systems, formal methods applied to decidability issues about infinite words and sets of numbers.
These days, the nature of services and the volume of demand in the telecommu nication industry is changing radically, with the replacement of analog transmis sion and traditional copper cables by digital technology and fiber optic transmis sion equipment. Moreover, we see an increasing competition among providers of telecommunication services, and the development of a broad range of new services for users, combining voice, data, graphics and video. Telecommunication network planning has thus become an important problem area for developing and applying optimization models. Telephone companies have initiated extensive modeling and planning efforts to expand and upgrade their transmission facilities, which are, for most national telecommunication networks, divided in three main levels (see Balakrishnan et al. 5]), namely, l. the long-distance or backbone network that typically connects city pairs through gateway nodes; 2. the inter-office or switching center network within each city, that interconnects switching centers in different subdivisions (clusters of customers) and provides access to the gateway(s) node(s); 1 2 DESIGN OF SURVNABLE NETWORKS WITH BOUNDED RINGS 3. the local access network that connects individual subscribers belonging to a cluster to the corresponding switching center. These three levels differ in several ways including their design criteria. Ideally, the design of a telecommunication network should simultaneously account for these three levels. However, to simplify the planning task, the overall planning problem is decomposed by considering each level separately."
This comprehensive guide walks readers through the entire process of getting and keeping a writing job in the games industry. It outlines exactly what a beginner needs to know about education requirements, finding opportunities, applying for roles, and acing studio interviews. Professional writers will learn how to navigate studio hierarchies, transfer roles and companies, work overseas, and keep developing their careers. Written by an experienced games writer with nearly two decades of industry knowledge, the book contains a wealth of interviews and perspectives with industry leaders, hiring managers, and developers from marginalized communities, all offering their tips and insights. Included are examples of materials such as job posts, writing samples, and portfolios, as well as chapter end challenges for readers to directly apply the skills they have learnt. This book will be of great interest to all beginner and aspiring games writers and narrative designers, as well as more experienced writers looking to hone their skills.
The budding field of nanotechnology offers enormous potential for advances in medical science, engineering, transportation, computers, and many other industries. As this growing field solidifies, these technological advances may soon become a reality. Nanoscience and Advancing Computational Methods in Chemistry: Research Progress provides innovative chapters covering the growth of educational, scientific, and industrial research activities among chemical engineers and provides a medium for mutual communication between international academia and the industry. This book publishes significant research reporting new methodologies and important applications in the fields of chemical informatics and discusses latest coverage of chemical databases and the development of new experimental methods.
This book explores the most recent Edge and Distributed Cloud computing research and industrial advances, settling the basis for Advanced Swarm Computing developments. It features the Swarm computing concepts and realizes it as an Ad-hoc Edge Cloud architecture. Unlike current techniques in Edge and Cloud computing that solely view IoT connected devices as sources of data, Swarm computing aims at using the compute capabilities of IoT connected devices in coordination with current Edge and Cloud computing innovations. In addition to being more widely available, IoT-connected devices are also quickly becoming more sophisticated in terms of their ability to carry considerable compute and storage resources. Swarm computing and Ad-hoc Edge Cloud take full advantage of this trend to create on-demand, autonomic and decentralized self-managed computing infrastructures. Focusing on cognitive resource and service management, the book examines the specific research challenges of the Swarm computing approach, related to the characteristics of IoT connected devices that form the infrastructure. It also offers academics and practitioners insights for future research in the fields of Edge and Swarm computing.
This book explores the fundamentals of computer music and functional programming through the Haskell programming language. Functional programming is typically considered difficult to learn. This introduction in the context of creating music will allow students and professionals with a musical inclination to leverage their experience to help understand concepts that might be intimidating in more traditional computer science settings. Conversely, the book opens the door for programmers to interact with music by using a medium that is familiar to them. Readers will learn how to use the Euterpea library for Haskell (http://www.euterpea.com) to represent and create their own music with code, without the need for other music software. The book explores common paradigms used in algorithmic music composition, such as stochastic generation, musical grammars, self-similarity, and real-time interactive systems. Other topics covered include the basics of signal-based systems in Haskell, sound synthesis, and virtual instrument design.
This book provides a unified and insightful treatment of deterministic global optimization. It introduces theoretical and algorithmic advances that address the computation and characterization of global optima, determine valid lower and upper bounds on the global minima and maxima, and enclose all solutions of nonlinear constrained systems of equations. Among its special features, the book: Introduces the fundamentals of deterministic global optimization; Provides a thorough treatment of decomposition-based global optimization approaches for biconvex and bilinear problems; Covers global optimization methods for generalized geometric programming problems Presents in-depth global optimization algorithms for general twice continuously differentiable nonlinear problems; Provides a detailed treatment of global optimization methods for mixed-integer nonlinear problems; Develops global optimization approaches for the enclosure of all solutions of nonlinear constrained systems of equations; Includes many important applications from process design, synthesis, control, and operations, phase equilibrium, design under uncertainty, parameter estimation, azeotrope prediction, structure prediction in clusters and molecules, protein folding, and peptide docking. Audience: This book can be used as a textbook in graduate-level courses and as a desk reference for researchers in all branches of engineering and applied science, applied mathematics, industrial engineering, operations research, computer science, economics, computational chemistry and molecular biology.
The World Wide Web and ubiquitous computing technologies have given a significant boost to the emerging field of XML database research. ""Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies"" covers comprehensive issues and challenges discovered through leading international XML database research. A useful reference source for researchers, practitioners, and academicians, this book provides complete references to the latest research in XML technology.
Hybrid systems are models for complex physical systems and have become a widely used concept for understanding their behavior. Many applications are safety-critical, including car, railway, and air traffic control, robotics, physical-chemical process control, and biomedical devices. Hybrid systems analysis studies how we can build computerized controllers for physical systems which are guaranteed to meet their design goals. The author gives a unique, logic-based perspective on hybrid systems analysis. It is the first book that leverages the power of logic for hybrid systems. The author develops a coherent logical approach for systematic hybrid systems analysis, covering its theory, practice, and applications. It is further shown how the developed verification techniques can be used to study air traffic and railway control systems. This book is intended for researchers, postgraduates, and professionals who are interested in hybrid systems analysis, cyberphysical or embedded systems design, logic and theorem proving, or transportation and automation.
An Expert Guide to Software Performance Optimization From mobile and cloud apps to video games to driverless vehicle control, more and more software is time-constrained: It must deliver reliable results seamlessly, consistently, and virtually instantaneously. If it doesn't, customers are unhappy--and sometimes lives are put at risk. When complex software underperforms or fails, software engineers need to identify and address the root causes. This is difficult and, historically, few tools have been available to help. In Understanding Software Dynamics, performance expert Richard L. Sites tackles the problem head on, offering expert methods and advanced tools for understanding complex, time-constrained software dynamics, improving reliability and troubleshooting challenging performance problems. Sites draws on several decades of experience pioneering software performance optimization, as well as extensive experience teaching graduate-level developers. He introduces principles and techniques for use in any environment, from embedded devices to datacenters, illuminating them with examples based on x86 or ARM processors running Linux and linked by Ethernet. He also guides readers through building and applying a powerful, new, extremely low-overhead open-source software tool, KUtrace, to precisely trace executions on every CPU core. Using insights gleaned from this tool, readers can apply nuanced solutions--not merely brute-force techniques such as turning off caches or cores. Measure and address issues associated with CPUs, memory, disk/SSD, networks, and their interactions Fix programs that are always too slow, and those that sometimes lag for no apparent reason Design useful observability, logging, and time-stamping capabilities into your code Reason more effectively about performance data to see why reality differs from expectations Identify problems such as excess execution, slow instruction execution, waiting for resources, and software locks Understanding Software Dynamics will be valuable to experienced software professionals, including application and OS developers, hardware and system architects, real-time system designers, and game developers, as well as advanced students. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
This book presents revised versions of the best papers selected from the symposium Mathematical Progress in Expressive Image Synthesis (MEIS2013) held in Fukuoka, Japan, in 2013. The topics cover various areas of computer graphics (CG), such as surface deformation/editing, character animation, visual simulation of fluids, texture and sound synthesis and photorealistic rendering. From a mathematical point of view, the book also presents papers addressing discrete differential geometry, Lie theory, computational fluid dynamics, function interpolation and learning theory. This book showcases the latest joint efforts between mathematicians, CG researchers and practitioners exploring important issues in graphics and visual perception.The book provides a valuable resource for all computer graphics researchers seeking open problem areas, especially those now entering the field who have not yet selected a research direction."
With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.
This book provides readers the "big picture" and a comprehensive survey of the domain of big data processing systems. For the past decade, the Hadoop framework has dominated the world of big data processing, yet recently academia and industry have started to recognize its limitations in several application domains and thus, it is now gradually being replaced by a collection of engines that are dedicated to specific verticals (e.g. structured data, graph data, and streaming data). The book explores this new wave of systems, which it refers to as Big Data 2.0 processing systems. After Chapter 1 presents the general background of the big data phenomena, Chapter 2 provides an overview of various general-purpose big data processing systems that allow their users to develop various big data processing jobs for different application domains. In turn, Chapter 3 examines various systems that have been introduced to support the SQL flavor on top of the Hadoop infrastructure and provide competing and scalable performance in the processing of large-scale structured data. Chapter 4 discusses several systems that have been designed to tackle the problem of large-scale graph processing, while the main focus of Chapter 5 is on several systems that have been designed to provide scalable solutions for processing big data streams, and on other sets of systems that have been introduced to support the development of data pipelines between various types of big data processing jobs and systems. Next, Chapter 6 focuses on covering the emerging frameworks and systems in the domain of scalable machine learning and deep learning processing. Lastly, Chapter 7 shares conclusions and an outlook on future research challenges. This new and considerably enlarged second edition not only contains the completely new chapter 6, but also offers a refreshed content for the state-of-the-art in all domains of big data processing over the last years. Overall, the book offers a valuable reference guide for professional, students, and researchers in the domain of big data processing systems. Further, its comprehensive content will hopefully encourage readers to pursue further research on the subject.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICI2CT 2020), held at National University of Singapore, Singapore, during 18-19 December 2020. It presents the works on the intersection of the Computer Science and Communication Engineering. Topics covered in the book include communications engineering, Internet and web technology, computer and information science, artificial intelligence, data science and management, and ICT applications.
The classic guide to cryptography and network security - now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important. This book explains sophisticated concepts in a friendly and intuitive manner. For protocol standards, it explains the various constraints and committee decisions that led to the current designs. For cryptographic algorithms, it explains the intuition behind the designs, as well as the types of attacks the algorithms are designed to avoid. It explains implementation techniques that can cause vulnerabilities even if the cryptography itself is sound. Homework problems deepen your understanding of concepts and technologies, and an updated glossary demystifies the field's jargon. Network Security, Third Edition will appeal to a wide range of professionals, from those who design and evaluate security systems to system administrators and programmers who want a better understanding of this important field. It can also be used as a textbook at the graduate or advanced undergraduate level. Coverage includes Network security protocol and cryptography basics Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3) First-generation public key algorithms (RSA, Diffie-Hellman, ECC) How quantum computers work, and why they threaten the first-generation public key algorithms Quantum-safe public key algorithms: how they are constructed, and optimizations to make them practical Multi-factor authentication of people Real-time communication (SSL/TLS, SSH, IPsec) New applications (electronic money, blockchains) New cryptographic techniques (homomorphic encryption, secure multiparty computation)
"Pro Java EE 5 Performance Management and Optimization" features proven methodology to guarantee top-performing Java EE 5 applications, and explains how to measure performance in your specific environment. The book also details performance integration points throughout the development and deployment lifecycles that are crucial for application success. For QA and preproduction stages, this book guides you through testing and optimally deploying your Java EE 5 applications, with a focus on assessing capacity and discovering saturation points. It defines the concept and application of wait-based tuningone of the most effective approaches to application server tuning. The book also helps you assess and improve the health of your applications upon deployment. The topics covered include trending, forecasting, and capacity assessing and planning. When production issues arise, youll be armed with troubleshooting methodology and solutions to common problems that have been observed in real-world environments. This book even guides you through the creation of a formal Java EE 5 Performance Management Plancustomized to your environment to help you interpret and react to changing trends in usage patterns.
The parameter estimation and hypothesis testing are the basic tools in statistical inference. These techniques occur in many applications of data processing., and methods of Monte Carlo have become an essential tool to assess performance. For pedagogical purposes the book includes several computational problems and exercices. To prevent students from getting stuck on exercises, detailed corrections are provided.
These proceedings gather outstanding research papers presented at the Second International Conference on Data Engineering 2015 (DaEng-2015) and offer a consolidated overview of the latest developments in databases, information retrieval, data mining and knowledge management. The conference brought together researchers and practitioners from academia and industry to address key challenges in these fields, discuss advanced data engineering concepts and form new collaborations. The topics covered include but are not limited to: * Data engineering * Big data * Data and knowledge visualization * Data management * Data mining and warehousing * Data privacy & security * Database theory * Heterogeneous databases * Knowledge discovery in databases * Mobile, grid and cloud computing * Knowledge management * Parallel and distributed data * Temporal data * Web data, services and information engineering * Decision support systems * E-Business engineering and management * E-commerce and e-learning * Geographical information systems * Information management * Information quality and strategy * Information retrieval, integration and visualization * Information security * Information systems and technologies
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic. |
You may like...
Deep Learning for Sustainable…
Ramesh Poonia, Vijander Singh, …
Paperback
R2,957
Discovery Miles 29 570
Machine Learning and Biometrics
Jucheng Yang, Dong Sun Park, …
Hardcover
R3,065
Discovery Miles 30 650
Machine Learning for Biometrics…
Partha Pratim Sarangi, Madhumita Panda, …
Paperback
R2,570
Discovery Miles 25 700
Handbook of Research on Emerging Trends…
Arun Solanki, Sandeep Kumar, …
Hardcover
R10,356
Discovery Miles 103 560
|