![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > General
This book constitutes the refereed proceedings of the 11th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, TridentCom 2016, held in Hangzhou, China, in June 2016. The 16 papers were carefully selected from 25 submissions and provide a forum about technologies of big data, cyber physical systems and computer communications. The papers cover future Internet and software defined networks, network testbed design and implementation, testbed for network applications, and QoS/QoE in networks.
The idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you go hands-on with packaging applications, testing, installing, running programs securely, and deploying them across a cluster of hosts. With examples showing how Docker benefits the whole dev lifecycle, you'll discover techniques for everything from dev-and-test machines to full-scale cloud deployments.
This book constitutes the proceedings of the First International Workshop on Dynamic Logic, DALI 2017, held in Brasilia, Brazil, in September 2017. Both its theoretical relevance and practical potential make Dynamic Logic a topic of interest in a number of scientific venues, from wide-scope software engineering conferences to modal logic specific events. The workshop is promoted by an R&D project on dynamic logics for cyber-physical systems. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The workshop is based on the project DaLi - Dynamic logics for cyber-physical systems: towards contract based design.
This book presents the latest research into the application of information and communication technologies within the travel and tourism sectors. Readers will find insightful contributions on a wide range of topics, including digital marketing, social media and online travel reviews, mobile computing, augmented and virtual reality, gamification, recommender systems, electronic distribution, online education and learning, and the sharing economy. Particular attention is devoted to the actual and potential impact of big data, and the development and implementation of digital strategies, including digital marketing and the digital economy. In addition to the description of research advances and innovative concepts, a number of informative case studies are presented. The contents of the book are based on the 2018 ENTER eTourism conference, held in Joenkoeping, Sweden. The volume will appeal to all academics and practitioners with an interest in the most recent developments in eTourism.
The book introduces the fundamentals and development of Computer aided design, Computer aided process planning, and Computer aided manufacturing. The integration of CAD/CAPP/CAM, product data management and Concurrent engineering and collaborative design etc. are also illustrated in detail, which make this book be an essential reference for graduate students, scientists and practitioner in the research fields of computer sciences and engineering.
Learn how to build logic into your apps by configuring Salesforce.com Lightning Process Builder and Visual Workflow software tools to meet the needs of your organization without the use of code. You will be able to build workflow diagrams on the Salesforce.com platform and perform complex logic. Individuals who have created workflow diagrams in other applications (e.g., Microsoft Visio) will feel very comfortable using these two tools from Salesforce. If you find yourself in a situation where a standard Salesforce configuration does not meet your needs, you can always rely on a developer to extend the functionality through Visualforce and Apex code. What if you could take back that control and not rely on a developer or consultant? With two new technologies-Process Builder and Visual Workflow-introduced onto the Salesforce.com platform, you can accomplish much of what was normally handled with Apex code. Lightning Process Builder and Visual workflow both allow for advanced logic that standard configuration such as Salesforce.com Workflow cannot do. Salesforce.com Lightning Process Builder and Visual Workflow details how these technologies can be used to: Create a call center application that guides operators through a call with screens that change based on the caller's responses. Automatically submit approvals to speed up and streamline your business. Update related records for any object being modified, including standard and custom objects.
The recent pursuits emerging in the realm of big data processing, interpretation, collection and organization have emerged in numerous sectors including business, industry and government organizations. Data sets such as customer transactions for a mega-retailer, weather monitoring, intelligence gathering, quickly outpace the capacities of traditional techniques and tools of data analysis. The 3V (volume, variability and velocity) challenges led to the emergence of new techniques and tools in data visualization, acquisition, and serialization. Soft Computing being regarded as a plethora of technologies of fuzzy sets (or Granular Computing), neurocomputing and evolutionary optimization brings forward a number of unique features that might be instrumental to the development of concepts and algorithms to deal with big data. This carefully edited volume provides the reader with an updated, in-depth material on the emerging principles, conceptual underpinnings, algorithms and practice of Computational Intelligence in the realization of concepts and implementation of big data architectures, analysis, and interpretation as well as data analytics. The book is aimed at a broad audience of researchers and practitioners including those active in various disciplines in which big data, their analysis and optimization are of genuine relevance. One focal point is the systematic exposure of the concepts, design methodology, and detailed algorithms. In general, the volume adheres to the top-down strategy starting with the concepts and motivation and then proceeding with the detailed design that materializes in specific algorithms and representative applications. The material is self-contained and provides the reader with all necessary prerequisites and augments some parts with a step-by-step explanation of more advanced concepts supported by a significant amount of illustrative numeric material and some application scenarios to motivate the reader and make some abstract concepts more tangible.
This book reports on the development and validation of a generic defeasible logic programming framework for carrying out argumentative reasoning in Semantic Web applications (GF@SWA). The proposed methodology is unique in providing a solution for representing incomplete and/or contradictory information coming from different sources, and reasoning with it. GF@SWA is able to represent this type of information, perform argumentation-driven hybrid reasoning to resolve conflicts, and generate graphical representations of the integrated information, thus assisting decision makers in decision making processes. GF@SWA represents the first argumentative reasoning engine for carrying out automated reasoning in the Semantic Web context and is expected to have a significant impact on future business applications. The book provides the readers with a detailed and clear exposition of different argumentation-based reasoning techniques, and of their importance and use in Semantic Web applications. It addresses both academics and professionals, and will be of primary interest to researchers, students and practitioners in the area of Web-based intelligent decision support systems and their application in various domains.
Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus, merely using ontologies, like using XML, does not reduce heterogeneity: it just raises heterogeneity problems to a higher level. Euzenat and Shvaiko's book is devoted to ontology matching as a solution to the semantic heterogeneity problem faced by computer systems. Ontology matching aims at finding correspondences between semantically related entities of different ontologies. These correspondences may stand for equivalence as well as other relations, such as consequence, subsumption, or disjointness, between ontology entities. Many different matching solutions have been proposed so far from various viewpoints, e.g., databases, information systems, and artificial intelligence. The second edition of Ontology Matching has been thoroughly revised and updated to reflect the most recent advances in this quickly developing area, which resulted in more than 150 pages of new content. In particular, the book includes a new chapter dedicated to the methodology for performing ontology matching. It also covers emerging topics, such as data interlinking, ontology partitioning and pruning, context-based matching, matcher tuning, alignment debugging, and user involvement in matching, to mention a few. More than 100 state-of-the-art matching systems and frameworks were reviewed. With Ontology Matching, researchers and practitioners will find a reference book that presents currently available work in a uniform framework. In particular, the work and the techniques presented in this book can be equally applied to database schema matching, catalog integration, XML schema matching and other related problems. The objectives of the book include presenting (i) the state of the art and (ii) the latest research results in ontology matching by providing a systematic and detailed account of matching techniques and matching systems from theoretical, practical and application perspectives.
This book constitutes the refereed proceedings of the 6th International Conference on Well-Being in the Information Society, WIS 2016, held in Tampere, Finland, in September 2016. The 21 revised full papers presented were carefully reviewed and selected from 42 submissions. With the core topic "Building Sustainable Health Ecosystems" WIS 2016 focused on innovations and fresh ideas in the cross-section of urban living, information society and health as understood in a wide sense. The papers presented in this volume are organized along the following seven broad topics: 1. Macro level considerations of e-health and welfare, 2.Welfare issues of children, youth, young elderly and seniors, 3. Analytics issues of eHealth and welfare, 4. National/regional initiatives in eHealth and welfare, and 5. Specific topics of eHealth. The papers in these topics span qualitative and quantitative analysis, empirical surveys, case studies as well as conceptual work.
Software is pervasive in our lives. We are accustomed to dealing with the failures of much of that software - restarting an application is a very familiar solution. Such solutions are unacceptable when the software controls our cars, airplanes and medical devices or manages our private information. These applications must run without error. SPARK provides a means, based on mathematical proof, to guarantee that a program has no errors. SPARK is a formally defined programming language and a set of verification tools specifically designed to support the development of software used in high integrity applications. Using SPARK, developers can formally verify properties of their code such as information flow, freedom from runtime errors, functional correctness, security properties and safety properties. Written by two SPARK experts, this is the first introduction to the just-released 2014 version. It will help students and developers alike master the basic concepts for building systems with SPARK.
The book provides a comprehensive approach to configuration management from a variety of product development perspectives, including embedded and IT. It provides authoritative advice on how to extend products for a variety of markets due to configuration options. The book also describes the importance of configuration management to other parts of the organization. It supplies an overview of configuration management and its process elements to provide readers with a contextual understanding of the theory, practice, and application of CM. The book illustrates the interplay of configuration and data management with all enterprise resources during each phase of a product lifecycle.
This book constitutes the proceedings of the 5th International Conference on Context-Aware Systems and Applications, ICCASA 2016, held in Thu Dau Mot, Vietnam, in November 2016. The 22 revised full papers presented were carefully selected from 35 submissions and cover a wide spectrum in the area of Context-Aware-Systems (CAS). CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection, where context awareness used to dynamically control computing and networking functions. The overall goal of CAS is to realize nature-inspired autonomic systems that can manage themselves without direct human interventions.
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum. The scale and complexity is simply so complex that it is no longer realistic for IT teams to manually foresee the potential issues and manage the dynamism and dependencies across an increasing inter-dependent chain of service provision. This Open Access Pivot explores these challenges and offers a solution for the intelligent and reliable management of physical infrastructure and the optimal placement of applications for the provision of services on distributed clouds. This book provides a conceptual reference model for reliable capacity provisioning for distributed clouds and discusses how data analytics and machine learning, application and infrastructure optimization, and simulation can deliver quality of service requirements cost-efficiently in this complex feature space. These are illustrated through a series of case studies in cloud computing, telecommunications, big data analytics, and smart cities.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
This book takes an in-depth look at consumer behavior in the context of multichannel commerce and explores how the convergence of physical and electronic channels influences consumer decision-making in a multichannel environment. In this regard, it goes far beyond explaining choices between online and offline sales channels, instead providing insights into how the interplay between different channel types is valued by different consumer types and for different products. The book extends previous conceptualizations of multichannel commerce to reflect and incorporate recent technological advances. The results provide valuable guidelines on how, why and when multichannel integration services can be exploited by classical retailers, helping them to compete with their purely online competitors on the internet.
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificial intelligence, and microeconomics.
Information and communication technology, in particular artificial intelligence, can be used to support economy and commerce using digital means. This book is about agents and multi-agent distributed systems applied to digital economy and e-commerce to meet, improve, and overcome challenges in the digital economy and e-commerce sphere. Agent and multi-agent solutions are applied in implementing real-life, exciting developments associated with the need to eliminate problems of distributed systems. The book presents solutions for both technology and applications, illustrating the possible uses of agents in the enterprise domain, covering design and analytic methods, needed to provide a solid foundation required for practical systems. More specifically, the book provides solutions for the digital economy, e-sourcing clusters in network economy, and knowledge exchange between agents applicable to online trading agents, and security solutions to both digital economy and e-commerce. Furthermore, it offers solutions for e-commerce, such as, mapping and alignment of ontologies for business, negotiation, automated auctions, recommender systems to support traders in business activities, and game simulations.
Data Mining is the process of posing queries and extracting useful information, patterns and trends previously unknown from large quantities of data [Thu, 00]. It is the process where intelligent tools are applied in order to extract data patterns [JM, 01]. This encompasses a number of different technical approaches, such as cluster analysis, learning classification and association rules, and finding dependencies. Agents are defined as software entities that perform some set of tasks on behalf of users with some degree of autonomy. This research work deals about developing a automated data mining system which encompasses the familiar data mining algorithms using intelligent agents in object oriented databases and proposing a framework. Because the data mining system uses the intelligent agents, a new user will be able to interact with the data mining system without much data mining technical knowledge. This system will automatically select the appropriate data mining technique and select the necessary field needed from the database at the appropriate time without expecting the users to specify the specific technique and the parameters. Also a new framework is proposed for incorporating intelligent agents with automated data mining. One of the major goals in developing this system is to give the control to the computer for learning automatically by using intelligent agents.
* Joey F. George I was honored to be asked to open the VI Conference of the Italian Chapter of the Association for Information Systems (ItAIS), held in Olbia, on the Costa Smeralda of Sardinia, Italy, in October 2009. Over 90 research papers were presented over two days, and over 120 people attended the conference. Each day, five par- lel sessions featured papers on diverse information systems topics. Session themes included Information and Knowledge Management; Organizational Change and Impact of ICT; IS Quality, Metrics and Impact; E-Justice and Ethics of Information Systems; Information Systems Development and Design Methodo- gies; E-Services in Public and Private Sectors; Innovation Transfer of IT Research Projects; the Strategic Role of Information Systems; Accounting Management and Information Systems; Human Computer Interaction; and Emerging Issues in a Globalized and Interconnected World. The majority of attendees were from Italy, which would be expected for a meeting of the Italian Chapter of AIS. However, as much as 30% of participants came from elsewhere, from other parts of Europe to be sure, but also from as far away as Nigeria, Mexico and Australia. That the conference was so decidedly international provides support for the 2009 con- rence theme, "Achieving Fusion in the Interconnected World. " Amid lively d- cussion and intellectual exchanges, professional networks were extended well beyond the Costa Smeralda and new connections and friendships were made.
Uncertainty theory is a branch of mathematics based on normality, monotonicity, self-duality, countable subadditivity, and product measure axioms. Uncertainty is any concept that satisfies the axioms of uncertainty theory. Thus uncertainty is neither randomness nor fuzziness. It is also known from some surveys that a lot of phenomena do behave like uncertainty. How do we model uncertainty? How do we use uncertainty theory? In order to answer these questions, this book provides a self-contained, comprehensive and up-to-date presentation of uncertainty theory, including uncertain programming, uncertain risk analysis, uncertain reliability analysis, uncertain process, uncertain calculus, uncertain differential equation, uncertain logic, uncertain entailment, and uncertain inference. Mathematicians, researchers, engineers, designers, and students in the field of mathematics, information science, operations research, system science, industrial engineering, computer science, artificial intelligence, finance, control, and management science will find this work a stimulating and useful reference.
This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.
A new model of business has emerged within the Digital-Economy called Internetworked Enterprise (IE); it's a model that posits networks, communities of individuals and refusal of a centralized mindset as the core elements of the new frame of reference. Internetworked Enterprises are called by some scholars 'Extended' Enterprises, which use digital network to co-operate and compete with other e-business community partners by exchanging knowledge and information across trans-national borders. Evolving Towards the Internetworked Enterprise: Technological and Organizational Perspectives is an edited volume based on a three year research project financed by the Italian Ministry of Research and Education. Researchers for this project are located at Polytechnic of Milan, University of Milan, University of Chieti, Engineering S.P.A and ISUFI-University of Salento. This book presents an overview of IE business methodologies, models, and an interpretative framework analyzing the sector and organizational contingencies that influence the digitalization of organizational processes in networks of SMEs (Small and Medium Enterprise). A set of case studies that provide empirical evidence on the IE phenomenon is included as well. This book is designed for advanced-level students in computer science and business management concentrating on e-business, digital computing, information technology, economics of technology and innovation management as a reference or secondary text book. Practitioners working in these fields as corporate strategic planners and consultants will also find this book a valuable asset.
This volume contains contributions from the 11th International Conference on Management Science (CMS 2014), held at Lisbon, Portugal, on May 29-31, 2014. Its contents reflect the wide scope of Management Science, covering different theoretical aspects for a quite diverse set of applications. Computational Management Science provides a unique perspective in relevant decision-making processes by focusing on all its computational aspects. These include computational economics, finance and statistics; energy; scheduling; supply chains; design, analysis and applications of optimization algorithms; deterministic, dynamic, stochastic, robust and combinatorial optimization models; solution algorithms, learning and forecasting such as neural networks and genetic algorithms; models and tools of knowledge acquisition, such as data mining; and all other topics in management science with the emphasis on computational paradigms.
Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry. |
You may like...
The High School Teacher Technology…
Thomas M. Brinthaupt, Gene Cowart, …
Hardcover
R2,463
Discovery Miles 24 630
Diverse Perspectives and…
Thomas M. Connolly, Petros Papadopoulos, …
Hardcover
R8,550
Discovery Miles 85 500
Pedagogy, Presence, and Motivation in…
Aaron Michael Perez, ?Enol Orakc?
Hardcover
R5,333
Discovery Miles 53 330
|