![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > General
A comprehensive one-year graduate (or advanced undergraduate)
course in mathematical logic and foundations of mathematics. No
previous knowledge of logic is required; the book is suitable for
self-study. Many exercises (with hints) are included.
Since its first volume in 1960, Advances in Computers has
presented detailed coverage of innovations in computer hardware,
software, theory, design, and applications. It has also provided
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles usually allow.
As a result, many articles have become standard references that
continue to be of sugnificant, lasting value in this rapidly
expanding field.
Modern optimization approaches have attracted an increasing number of scientists, decision makers, and researchers. As new issues in this field emerge, different optimization methodologies must be developed and implemented. Exploring Critical Approaches of Evolutionary Computation is a vital scholarly publication that explores the latest developments, methods, approaches, and applications of evolutionary models in a variety of fields. It also emphasizes evolutionary models of computation such as genetic algorithms, evolutionary strategies, classifier systems, evolutionary programming, genetic programming, and related fields such as swarm intelligence and other evolutionary computation techniques. Highlighting a range of pertinent topics such as neural networks, data mining, and data analytics, this book is designed for IT developers, IT theorists, computer engineers, researchers, practitioners, and upper-level students seeking current research on enhanced information exchange methods and practical aspects of computational systems.
The International Conference on Informatics and Management Science (IMS) 2012 will be held on November 16-19, 2012, in Chongqing, China, which is organized by Chongqing Normal University, Chongqing University, Shanghai Jiao Tong University, Nanyang Technological University, University of Michigan, Chongqing University of Arts and Sciences, and sponsored by National Natural Science Foundation of China (NSFC). The objective of IMS 2012 is to facilitate an exchange of information on best practices for the latest research advances in a range of areas. Informatics and Management Science contains over 600 contributions to suggest and inspire solutions and methods drawing from multiple disciplines including: Computer Science Communications and Electrical Engineering Management Science Service Science Business Intelligence
As a field, computer science occupies a unique scientific space, in that its subject matter can exist in both physical and abstract realms. An artifact such as software is both tangible and not, and must be classified as something in between, or "liminal." The study and production of liminal artifacts allows for creative possibilities that are, and have been, possible only in computer science. In It Began With Babbage, Subrata Dasgupta examines the unique history of computer science in terms of its creative innovations, spanning back to Charles Babbage in 1819. Since all artifacts of computer science are conceived with a use in mind, the computer scientist is not concerned with the natural laws that govern disciplines like physics or chemistry; the computer scientist is more concerned with the concept of purpose. This requirement lends itself to a type of creative thinking that, as Dasgupta shows us, has exhibited itself throughout the history of computer science. From Babbage's Difference Engine, through the Second World War, to the establishment of the term "Computer Science" in 1956, It Began With Babbage traces a lively and complete history of computer science.
Augmented reality is not a technology.Augmented reality is a medium. Likewise, a book on augmented reality that only addresses the technology that is required to support the medium of augmented reality falls far short of providing the background that is needed to produce, or critically consume augmented reality applications.One "reads" a book.One "watches" a movie.One "experiences" augmented reality."Understanding Augmented Reality" addresses the elements that are required to create "compelling "augmented reality experiences. The technology that supports augmented reality will come and go, evolve and change.The underlying principles for creating exciting, useful augmented reality experiences are timeless. Augmented reality designed from a purely technological perspective will lead to an AR experience that is novel and fun for one-time consumption-but is no more than a toy. Imagine a filmmaking book that discussed cameras and special effects software, but ignored cinematography and storytelling In order to create compelling augmented reality experiences that stand the test of time and cause the participant in the AR experience to focus on the "content" of the experience - rather than the technology - one must consider how to maximally exploit the affordances of the medium. "Understanding Augmented Reality" addresses core conceptual issues regarding the medium of augmented reality as well as the technology required to support compelling augmented reality. By addressing AR as a medium at the conceptual level in addition to the technological level, the reader will learn to conceive of AR applications that are not limited by today s technology. At the same time, ample examples are provided that show what is possible with current technology. Explore the different techniques, technologies and approaches
used in developing AR applications. This book helps untangle the
seemingly endless different approaches that are being taken in the
market today.
Software has long been perceived as complex, at least within
Software Engineering circles. We have been living in a recognised
state of crisis since the first NATO Software Engineering
conference in 1968. Time and again we have been proven unable to
engineer reliable software as easily/cheaply as we imagined. Cost
overruns and expensive failures are the norm.
A collection of papers from ISCIS 27th Annual Symposium.
This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26- 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
The biggest challenges faced by the software industry are cost control and schedule control. As such, effective strategies for process improvement must be researched and implemented. Analyzing the Role of Risk Mitigation and Monitoring in Software Development is a critical scholarly resource that explores software risk and development as organizations continue to implement more applications across multiple technologies and a multi-tiered environment. Featuring coverage on a broad range of topics such as quantitative risk assessment, threat analysis, and software vulnerability management, this book is a vital resource for engineers, academicians, professionals, and researchers seeking current research on the importance of risk management in software development.
Social networks have emerged as a major trend in computing and social paradigms in the past few years. The social network model helps to inform the study of community behavior, allowing qualitative and quantitative assessments of how people communicate and the rules that govern communication. Social Networking and Community Behavior Modeling: Qualitative and Quantitative Measures provides a clear and consolidated view of current social network models. This work explores new methods for modeling, characterizing, and constructing social networks. Chapters contained in this book study critical security issues confronting social networking, the emergence of new mobile social networking devices and applications, network robustness, and how social networks impact the business aspects of organizations.
M-commerce (mobile-commerce) refers to e-commerce activities carried out via a mobile terminal such as a phone or PDA. M-commerce applications for both individuals and organizations are expected to grow considerably over the next few years. Mobile Commerce: Technology, Theory and Applications addresses issues pertaining to the development, deployment, and use of these applications. The objective of this book is to provide a single source of up-to-date information about mobile commerce including the technology (hardware and software) involved, research on the expected impact of this technology on businesses and consumers, and case studies describing state-of-the-art m-commerce applications and lessons learned.
Whether by synergy or by synthesis, development and technology are becoming synonymous in every domain. Cases on Transnational Learning and Technologically Enabled Environments reports on national and international initiatives undertaken to adapt advancements in information and communication technology and successfully face the challenges posed by various social and economic forces. The international research in this book represents instances of institutions that are in transition as well as those that are readily using technology in education.
Decades of research have shown that student collaboration in groups doesn't just happen; rather it needs to be a deliberate process facilitated by the instructor. Promoting collaboration in virtual learning environments presents a variety of challenges. Computer-Supported Collaborative Learning: Best Practices & Principles for Instructors answers the demand for a thorough resource on techniques to facilitate effective collaborative learning in virtual environments. This book provides must-have information on the role of the instructor in computer-supported collaborative learning, real-world perspectives on virtual learning group collaboration, and supporting learning group motivation.
In this new edition of IBM i Security Administration and Compliance, Carol Woodbury provides readers with everything they need to know about IBM i security. The definitive IBM i security reference, this Third Edition expands on the examples in previous editions to provide readers with clear, detailed explanations of current IBM i security features and explains how to implement and audit them. The Third Edition includes a new chapter dedicated to auditors to help them more effectively audit an IBM i (formerly AS/400 and iSeries). It also includes a new chapter containing practical examples of using the Authority Collection feature added in V7R3 and enhanced in V7R4. This new edition provides techniques for using security-related SQL views, guidance for determining what should be sent to your SIEM, methods to determine whether your IBM i has been breached, tips for avoiding malware on your IBM i, and updated examples throughout. Useful for security officers, security and system administrators, compliance officers, and internal and external auditors, the resources available in this book help organizations reduce the risk to the data residing on their IBM i systems and avoid business disruption by helping them protect systems and data from unauthorized access and modification.
The Turing/von Neumann model of computing is dominant today but is by no means the only one. This textbook explores an important subset of alternatives, including those such as quantum and neuromorphic, which receive daily news attention. The models are organized into distinct groups. After a review of the Turing/von Neumann model to set the stage, the author discusses those that have their roots in the Turing/von Neumann model but perform potentially large numbers of computations in parallel; models that do away with the preplanned nature of the classical model and compute from just a statement of the problem; others that are simply mathematically different, such as probabilistic and reversible computation; models based on physical phenomena such as neurons; and finally those that leverage unique physical phenomena directly, such as quantum, optical, and DNA-based computing. Suggested readings provide a jumping-off point for deeper learning. A supplemental website contains chapters that did not make it into the book, as well as exercises, projects, and additional resources that will be useful for more in-depth investigations. The Zen of Exotic Computing is intended for computer science students interested in understanding alternative models of computing. It will also be of interest to researchers and practitioners interested in emerging technology such as quantum computing, machine learning, and AI.
"Advances in Imaging and Electron Physics "merges two long-running
serials--"Advances in Electronics and Electron Physics" and
"Advances in Optical and Electron Microscopy." * Contributions from leading authorities * Informs and updates on all the latest developments in the field
This book addresses the question of how to achieve social coordination in Socio-Cognitive Technical Systems (SCTS). SCTS are a class of Socio-Technical Systems that are complex, open, systems where several humans and digital entities interact in order to achieve some collective endeavour. The book approaches the question from the conceptual background of regulated open multiagent systems, with the question being motivated by their design and construction requirements. The book captures the collective effort of eight groups from leading research centres and universities, each of which has developed a conceptual framework for the design of regulated multiagent systems and most have also developed technological artefacts that support the processes from specification to implementation of that type of systems. The first, introductory part of the book describes the challenge of developing frameworks for SCTS and articulates the premises and the main concepts involved in those frameworks. The second part discusses the eight frameworks and contrasts their main components. The final part maps the new field by discussing the types of activities in which SCTS are likely to be used, the features that such uses will exhibit, and the challenges that will drive the evolution of this field.
Scheduling theory has received a growing interest since its origins in the second half of the 20th century. Developed initially for the study of scheduling problems with a single objective, the theory has been recently extended to problems involving multiple criteria. However, this extension has still left a gap between the classical multi-criteria approaches and some real-life problems in which not all jobs contribute to the evaluation of each criterion. In this book, we close this gap by presenting and developing multi-agent scheduling models in which subsets of jobs sharing the same resources are evaluated by different criteria. Several scenarios are introduced, depending on the definition and the intersection structure of the job subsets. Complexity results, approximation schemes, heuristics and exact algorithms are discussed for single-machine and parallel-machine scheduling environments. Definitions and algorithms are illustrated with the help of examples and figures.
'Rough Computing' explores the application of rough set theory, which has attracted attention because of the ability to enhance databases by allowing for the management of uncertainty, a comparative analysis between rough sets, and other intelligent data analysis. |
You may like...
Discovering Computers - Digital…
Misty Vermaat, Mark Ciampa, …
Paperback
Computer-Graphic Facial Reconstruction
John G. Clement, Murray K. Marks
Hardcover
R2,327
Discovery Miles 23 270
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Natural Language Processing (NLP) and…
Florentina Hristea, Cornelia Caragea
Hardcover
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
R1,136
Discovery Miles 11 360
|