![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet
With contributions by leading scientists in the field, this book gives the first comprehensive overview of the results of the seminal SmartKom project - one of the most advanced multimodal dialogue systems worldwide.
The SGML FAQ Book: Understanding the Foundation of HTML and XML is similar, but not quite the same kind of thing as an online FAQ or Frequently Asked Questions' list. It addresses questions from people who already actually use SGML in some way (including HTML authors), and people who are about to use it. It deals mainly with issues that arise when using SGML in practice. A very brief introduction to SGML is included as Appendix A. The questions discussed in The SGML FAQ Book are repeatedly heard by people who make their living serving the SGML community. SGML experts spend many hours teaching these details, sometimes repeatedly because some questions do not seem important - until you run into them. So one benefit of this book is learning more of the art of document creation and management, both by general reading before questions arise and by specific reference when a question arises. For the latter use, the appendices, glossary, and index are particularly important. A second benefit of this book is that it provides a common theme to its answers that you can apply in your use of SGML, HTML and related languages in general. The fundamental answer to many of the questions boils down to simplify': many questions do not show up if you use the simple, elegant core of SGML without worrying about optional features. The credo of this book is simply, SGML doesn't need to be complicated'. SGML has the potential for complexity at certain points. But much of the complexity comes from optional parts and can be avoided. SGML methodology and its primary benefits suffer no loss even if you skip many features, which speaks well for the quality of SGML's overall design. Many of the questions discussedinvolve those optional parts, and therefore can be avoided by judicious designers and authors. The two key goals of the book are (1) to answer questions that you may actually encounter as an SGML user, and to help you get unstuck' and be as productive as possible in using the language and (2) to show proactive ways you can simplify your use of SGML, and get its very substantial benefits with minimal complexity.
With the increasing proliferation of information-technology and, especially, Web-based approaches to the implementation of systems and services, researchers, educators, and practitioners worldwide are experiencing a rising need for authoritative references to enhance their understanding of the most current and effective engineering practices leading to robust and successful solutions.""Integrated Approaches in Information Technology and Web Engineering: Advancing Organizational Knowledge Sharing"" presents comprehensive, research-driven insights into the field of Web engineering. This book collects over 30 authoritative articles from distinguished international researchers in information technology and Web engineering, creating an invaluable resource for library reference collections that will equip researchers and practitioners in academia and industry alike with the knowledge base to drive the next generation of innovations.
'Boldly reactionary... What looks like feast, Carr argues, may be closer to famine' Sunday Times 'Chilling' The Economist In this ground-breaking and compelling book, Nicholas Carr argues that not since Gutenberg invented printing has humanity been exposed to such a mind-altering technology. The Shallows draws on the latest research to show that the Net is literally re-wiring our brains inducing only superficial understanding. As a consequence there are profound changes in the way we live and communicate, remember and socialise - even in our very conception of ourselves. By moving from the depths of thought to the shallows of distraction, the web, it seems, is actually fostering ignorance. The Shallows is not a manifesto for luddites, nor does it seek to turn back the clock. Rather it is a revelatory reminder of how far the Internet has become enmeshed in our daily existence and is affecting the way we think. This landmark book compels us all to look anew at our dependence on this all-pervasive technology. This 10th-anniversary edition includes a new afterword that brings the story up to date, with a deep examination of the cognitive and behavioural effects of smartphones and social media.
Unit Integration Testing (UIT) had been a challenge because there was no tool that could help in XHR programming and unit integration validations in an efficient way until Cypress arrived. Cypress started releasing versions in 2015 and became popular in 2018 with version 2.0.0. This book explores Cypress scripts that help implement 'shift left testing', which is a dream come true for many software testers. Shift left occurs in the majority of testing projects, but could not be implemented fully because tools were unavailable and knowledge was lacking about the possibilities of testing early in the life cycle. Shift left is a key testing strategy to help testing teams focus less on defect identifications and more on developing practices to prevent defects. Cypress scripts can help front-end developers and quality engineers to work together to find defects soon after web components are built. These components can be tested immediately after they are built with Cypress Test Driven Development (TDD) scripts. Thus, defects can be fixed straight away during the development stage. Testing teams do not have to worry about finding these same defects in a later development stage because Cypress tests keep verifying components in the later stages. Defect fixing has become much cheaper with Cypress than when other tools are used. The book also covers Behaviour Driven Development (BDD)-based Gherkin scripts and the Cypress Cucumber preprocessor, which can improve test scenario coverage. Automated Software Testing with Cypress is written to fulfil the BDD and TDD needs of testing teams. Two distinct open source repositories are provided in Github to help start running Cypress tests in no time!
This book investigates the characteristics of simple versus complex systems, and what the properties of a cyber-physical system design are that contribute to an effective implementation and make the system understandable, simple to use, and easy to maintain. The targeted audience is engineers, managers and advanced students who are involved in the design of cyber-physical systems and are willing to spend some time outside the silo of their daily work in order to widen their background and appreciation for the pervasive problems of system complexity. In the past, design of a process-control system (now called cyber-physical systems) was more of an art than an engineering endeavor. The software technology of that time was concerned primarily with functional correctness and did not pay much attention to the temporal dimension of program execution, which is as important as functional correctness when a physical process must be controlled. In the ensuing years, many problems in the design of cyber-physical systems were simplified. But with an increase in the functional requirements and system size, the complexity problems have appeared again in a different disguise. A sound understanding of the complexity problem requires some insight in cognition, human problem solving, psychology, and parts of philosophy. This book presents the essence of the author's thinking about complexity, accumulated over the past forty years.
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. "Quantum Attacks on Public-Key Cryptosystems" presemts almost allknown quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.
This book presents cutting-edge work on real-time modelling and processing, a highly active research field in both the research and industrial domains. Going beyond conventional real-time systems, major efforts are required to develop accurate and computational efficient real-time modelling algorithms and design automation tools that reflect the technological advances in high-speed and ultra-low-power transceiver communication architectures based on nanoscale devices. The book addresses basic and more advanced topics, such as I/O buffer circuits for ensuring reliable chip-to-chip communication, I/O buffer behavioural modelling, multiport empirical models for memory interfaces, compact behavioural modelling for memristive devices, and resource reservation modelling for distributed embedded systems. The respective chapters detail new research findings, new models, algorithms, implementations and simulations of the above-mentioned topics. As such, the book will help both graduate students and researchers understand the latest research into real-time modelling and processing.
Towards a Digital Renaissance traces the excitement and optimism of the early internet, the outsider cyberpunk ethic and open access. But it also monitors the more complex but ultimately more commercialised online world of today, a world dominated by corporate business in which many feel that surveillance has become overwhelming. Jeremy Silver's involvement in various start-ups, both as CEO and investor, led to his leadership of Digital Catapult. Towards a Digital Renaissance examines the interplay between state and private financing in the digital sector. It also argues for the internet's potential to transition from a 'medieval' world of the GAFA big four (Google, Amazon, Facebook and Apple), closed and walled up like medieval city states, to a 'digital renaissance' based on the free exchange of ideas and an enabling metaverse made up of virtual reality and artificial intelligence that deepens our experience of reality rather than restricting or monitoring it.
The Internet has redefined how maps are used. No longer restricted to paper, maps are now transmitted almost instantly and delivered to the user in a fraction of the time required to distribute maps on paper. They are viewed in a more timely fashion. The Internet presents the map user with both a faster method of map distribution and different forms of mapping. This book provides an international perspective on this growing area of information dissemination.
Web search engines are not just indispensable tools for finding and accessing information online, but have become a defining component of the human condition and can be conceptualized as a complex behavior embedded within an individual's everyday social, cultural, political, and information-seeking activities. This book investigates Web search from the non-technical perspective, bringing together chapters that represent a range of multidisciplinary theories, models, and ideas.
What the international phenomenon of The Rules did for conventional dating, The Rules for Online Dating does for the search for love on the Internet. You'll never hit the "reply" button the same way again. Millions of women around the world are meeting men on the Internet, or they've met in person and are corresponding by e-mail. But though e-mail and Net-based dating services have revolutionized the dating landscape, they've created their own pitfalls and challenges. Women need new strategies that will improve their chances of capturing Mr. Right. Boasting the same time-tested formula and romantic spirit that made The Rules an international bestseller and launched thousands of women down the path to committed relationships, The Rules for Online Dating shows all women -- regardless of age, status, or computer savvy -- how to use electronic communication to relate to men in a way that maintains self-esteem and leads to a healthy relationship. Here is a comprehensive list of dos and don'ts that will help every woman conduct an e-courtship safely and successfully; find and keep the interest of suitable mates; and save time, energy, and potential heartache by weeding out dead wood. The Rules for Online Dating takes women through the process -- step by step, Rule by Rule -- to the ultimate goal: a relationship based on mutual attraction, interest, and respect.
IT changes everyday's life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its special tracks.
Get the latest information about online GIS using ArcGIS apps and functionality. Capabilities of Web GIS keep expanding, and Getting to Know Web GIS, fifth edition, describes some of the most cutting-edge and exciting innovations. From publishing data as services and configuring engaging web and mobile apps to automation, scripting, and real-world applications, this book shares how to use the most current software and apps for using ArcGIS in the cloud. In the newest edition of Getting to Know Web GIS, you can work with the latest releases of ArcGIS Online, ArcGIS Pro, ArcGIS StoryMaps , and ArcGIS mobile apps. You can experience ArcGIS Experience Builder, ArcGIS Field Maps, ArcGIS Instant Apps, ArcGIS Image for ArcGIS Online, ArcGIS Mission, and the latest advances in artificial intelligence, virtual reality, and tools for spatial data science. No programming is required, but you can learn more about Web GIS programming in this book using JavaScript, webhooks, and ArcGIS Arcade. Use the fifth edition to: improve your online visual storytelling, work with 2D smart mapping and 3D web scenes, create informative web experiences and dashboards, support field operations and data collection using mobile apps, use new data science tools for spatial analysis and geoprocessing, detect objects using deep learning packages, program a triggered notification using a visual interface, and more. GIS expert, instructor, and author Pinde Fu provides lecture slides and additional resources in an online story using ArcGIS StoryMaps. Today's modern GIS is Web GIS-get onboard with one of the most interesting and creative areas of GIS
This volume explores the nature of the Internet's impact on civil society, addressing the following central questions: is the Internet qualitatively different from the more traditional forms of the media? has the Internet demonstrated real potential to improve civil society through a wider provision of information, an enhancement of communication between government and citizen, or via better state transparency? does the Internet pose a threat to the coherence of civil society as people are encouraged to abandon shared media experiences and pursue narrow interests? in authoritarian states, does the Internet function as a beacon for free speech or as another tool for propaganda?
Java is an exciting new object-oriented technology. Hardware for supporting objects and other features of Java such as multithreading, dynamic linking and loading is the focus of this book. The impact of Java's features on micro-architectural resources and issues in the design of Java-specific architectures are interesting topics that require the immediate attention of the research community. While Java has become an important part of desktop applications, it is now being used widely in high-end server markets, and will soon be widespread in low-end embedded computing. Java Microarchitectures contains a collection of papers providing a snapshot of the state of the art in hardware support for Java. The book covers the behavior of Java applications, embedded processors for Java, memory system design, and high-performance single-chip architectures designed to execute Java applications efficiently.
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
The book provides complete coverage of fundamental IP networking in Java. It introduces the concepts behind TCP/IP and UDP and their intended use and purpose; gives complete coverage of Java networking APIs, includes an extended discussion of advanced server design, so that the various design principles and tradeoffs concerned are discussed and equips the reader with analytic queuing-theory tools to evaluate design alternatives; covers UDP multicasting, and covers multi-homed hosts, leading the reader to understand the extra programming steps and design considerations required in such environments. After reading this book the reader will have an advanced knowledge of fundamental network design and programming concepts in the Java language, enabling them to design and implement distributed applications with advanced features and to predict their performance. Special emphasis is given to the scalable I/O facilities of Java 1.4 as well as complete treatments of multi-homing and UDP both unicast and multicast. |
You may like...
Towards A Semantic Web - Connecting…
Bill Cope, Mary Kalantzis, …
Paperback
News Search, Blogs and Feeds - A Toolkit
Lars Vage, Lars Iselid
Paperback
R1,332
Discovery Miles 13 320
Responsive Web Design with HTML 5 & CSS
Jessica Minnick
Paperback
|