|
|
Books > Computing & IT > Internet
This book provides graduate students and practitioners with
knowledge of the CORBA standard and practical experience of
implementing distributed systems with CORBA's Java mapping. With
tested code examples that will run immediately!
Design is an art form in which the designer selects from a myriad
of alternatives to bring an "optimum" choice to a user. In many
complex of "optimum" is difficult to define. Indeed, the users
systems the notion themselves will not agree, so the "best" system
is simply the one in which the designer and the user have a
congruent viewpoint. Compounding the design problem are tradeoffs
that span a variety of technologies and user requirements. The
electronic business system is a classically complex system whose
tradeoff criteria and user views are constantly changing with
rapidly developing underlying technology. Professor Milutinovic has
chosen this area for his capstone contribution to the computer
systems design. This book completes his trilogy on design issue in
computer systems. His first work, "Surviving the Design of a 200
MHz RISC Microprocessor" (1997) focused on the tradeoffs and design
issues within a processor. His second work, "Surviving the Design
of Microprocessor and Multiprocessor Systems" (2000) considers the
design issues involved with assembling a number of processors into
a coherent system. Finally, this book generalizes the system design
problem to electronic commerce on the Internet, a global system of
immense consequence.
'Is private regulation of the Internet over? Have states taken
over?' This book examines the function of self-regulation in
cyberspace. It argues that contrary to what is often supposed in
the literature, self-regulation is still an indispensable part of
regulation of the Internet and will arguably remain so. It is
intricately woven into the mesh of rules that governs the Internet
today. Private regulation fills substantive or procedural gaps
where no state regulation exists or where it is incomplete or
ineffective, thus complementing the reach of state regulation.
Simultaneously, states supply legal (and financial) frameworks that
enable or complement self-regulation. In practice, often unknown to
users, their behaviour is regulated by intertwined rules coming
from both states and private groups. While each source of rules
retains its identity and regulatory strengths, it is dependent on
and complementary to the rules and processes of the other to
effectively regulate Internet activities. Dr. Jeanne P. Mifsud
Bonnici is a Senior Lecturer at the Centre for Law, Information and
Converging Technologies, University of Central Lancashire, Preston,
UK. This is Volume 16 in the Information Technology and Law
(IT&Law) Series
As part of the best-selling Pocket Primer series, this book is
designed to provide an introduction to Python tools which are used
by data scientists. It includes coverage of fundamental aspects of
NumPy and Pandas, how to write regular expressions, and how to
perform data cleaning tasks. The first chapter contains a quick
tour of basic Python, followed by a chapter introducing NumPy, and
a chapter on Pandas. Chapter 4 provides a high-level view of
Sklearn and SciPy. Chapter 5 contains an assortment of data
cleaning tasks that are solved via Python and the awk programming
language. Chapter 6 delves into data visualization with Matplotlib,
Seaborn, and Bokeh. Next, one appendix explores issues that can
arise with data, followed by an appendix on awk. Numerous code
samples are used to illustrate concepts. Companion files with
source code are available for downloading from the publisher.
FEATURES: Introduces Python, NumPy, Sklearn, SciPy, and awk. Covers
data cleaning tasks and data visualization. Features numerous code
samples throughout. Includes companion files with source code .
This book introduces wireless personal communications from the
point of view of wireless communication system researchers.
Existing sources on wireless communications put more emphasis on
simulation and fundamental principles of how to build a study
model. In this volume, the aim is to pass on to readers as much
knowledge as is essential for completing model building of wireless
communications, focusing on wireless personal area networks
(WPANs). This book is the first of its kind that gives step-by-step
details on how to build the WPANs simulation model. It is most
helpful for readers to get a clear picture of the whole wireless
simulation model by being presented with many study models. The
book is also the first treatise on wireless communication that
gives a comprehensive introduction to data-length complexity and
the computational complexity of the processed data and the error
control schemes. This volume is useful for all academic and
technical staff in the fields of telecommunications and wireless
communications, as it presents many scenarios for enhancing
techniques for weak error control performance and other scenarios
for complexity reduction of the wireless data and image
transmission. Many examples are given to help readers to understand
the material covered in the book. Additional resources such as the
MATLAB codes for some of the examples also are presented.
Mobile Intention Recognition addresses problems of practical
relevance for mobile system engineers: how can we make mobile
assistance systems more intelligent? How can we model and recognize
patterns of human behavior which span more than a limited spatial
context? This text provides an overview on plan and intention
recognition, ranging from the late 1970s to very recent approaches.
This overview is unique as it discusses approaches with respect to
the specificities of mobile intention recognition. This book covers
problems from research on mobile assistance systems using methods
from artificial intelligence and natural language processing. It
thus addresses an extraordinary interdisciplinary audience.
This research book presents some specific multimedia systems that
have been developed and applied in practice. More specifically, it
consists of an editorial, an introductory chapter and six chapters
as below. * Use of Multi-attribute Decision Making for Combining
Audio-Lingual and Visual-Facial Modalities in Emotion Recognition.
. Cooperative Learning assisted by Automatic Classification within
Social Networking Services. . Improving Peer-to-Peer Communication
in e-Learning by Development of an Advanced Messaging System. *
Fuzzy-based Digital Video Stabilization in Static Scenes. *
Development of Architecture, Information Archive and Multimedia
Formats for Digital e-Libraries. * Layered Ontological Image for
Intelligent Interaction to extend User Capabilities on Multimedia
Systems in a Folksonomy Driven Environment.
'I loved her then, I love her now. Annie's back and she's better
than ever! Fun, feel good and feisty - Annie Valentine is the woman
you want to share a cocktail with!' Portia MacIntosh Can she get
her life back online?Tired of being underestimated, Annie Valentine
is determined to prove to everyone that she can make her life a
success. Her job as a personal shopper is brilliant, but she's now
intent on setting up a shoe and handbag empire of her own. To get
there, she'll do anything and go anywhere - the handbag factories
of Italy are calling! But what started out as a fun after hours
project is getting slightly out of hand. Because Annie is working
around the clock to bag the perfect bargain, and her family life
and relationship with adorable Ed is feeling the strain. Annie
knows she is getting in too deep, but the more she tries to pull
back, the more risks she takes. Soon, everything Annie loves is on
the line and perhaps the only way to have it all is to step into
the real world again.... Fans of Sophie Kinsella, Lindsey Kelk and
Paige Toon will love this laugh-out-loud romantic comedy from
bestselling author Carmen Reid. What readers are saying! "If you
love shopping as much as you love a great read, try this.
Wonderful." Bestselling author, Katie Fforde "Annie Valentine is a
wonderful character - I want her to burst into my life and sort out
my wardrobe for me!" Bestselling author, Jill Mansell "You will
enjoy getting to know Annie Valentine; laughing with her and crying
with her. You may even fall in love with her . . . I have! A
fantastic read!" Reader review "Fantastic read, couldn't put it
down" Reader review "Can't wait to read the next one!" Reader
review
As the IoT market is booming, several issues are delaying the full
realization of the technology. IoT devices, in cybersecurity terms,
greatly increase security risk. This means that any scientific work
that offers cybersecurity strategies will excite security experts
who will be glad to expand their knowledge base on IoT
cybersecurity. As a result of the booming of the IoT market,
business competitors are jockeying for a piece of the market. This
means that solutions from researchers that address compatibility
issues will be greatly welcomed by IoT technology developers.
Connectivity providers are likely to embrace solutions to
challenges of bandwidth since a growing IoT market must be followed
up by bandwidth-intensive IoT applications which tend to jostle for
space on the current client-server model. Overpromising followed by
underdelivering, has been the current approach by many innovators
and the mismatch results in losses in production, orphaned
technologies accompanied by frequent system failures. Solutions
that address IoT performance issues are likely to excite many
start-ups. Solutions to challenges of fragmentation presented by
thousands of devices from different manufacturers operating on
proprietary ecosystems are likely to be warmly embraced by many IoT
brands developers. As such, a publication that specifically
addresses the challenges faced in the rolling out of IoT
technologies is sorely needed.
With the purpose of building upon standard web technologies, open
linked data serves as a useful way to connect previously unrelated
data and to publish structured data on the web. The application of
these elements leads to the creation of data commons called
semantic web. Cases on Open-Linked Data and Semantic Web
Applications brings together new theories, research findings and
case studies which cover the recent developments and approaches
towards applied open linked data and semantic web in the context of
information systems. By enhancing the understanding of open linked
data in business, science and information technologies, this
reference source aims to be useful for academics, researchers, and
practitioners. With the purpose of building upon standard web
technologies, open linked data serves as a useful way to connect
previously unrelated data and to publish structured data on the
web. The application of these elements leads to the creation of
data commons called semantic web.
Enterprise IT infrastructure is getting increasingly complex. With
the increase in complexity has arisen the need to manage it.
Management in general can be seen as the process of assuring that a
managed entity meets its expectations in a controlled and
predictable manner. Examples of managed entities are not only
components, entire systems, processes, but also people such as
employees, developers, or operators, and entire organizations.
Traditional management has addressed some of these issues in varied
manner. The emergence of Web services has added a new complexity to
the management problem and poses a new set of problems. But it also
adds to the mix a set of technologies that will make the task of
management simpler. Management of Web services will be critical as
businesses come to rely on them as a substantial source of their
revenue. The book tries to cover the broad area of web services,
the concepts, implications for the enterprise, issues involved in
their management and how they are being used for management
themselves. The book is intended as a reference for current
practice and future directions for web services and their
management. The book is directed at: * Computing professionals,
academicians and students to learn about the important concepts
behind the web services paradigm and how it impacts the enterprise
in general and how it affects traditional application, network and
system management.
Under Quality of Service (QoS) routing, paths for flows are
selected based upon the knowledge of resource availability at
network nodes and the QoS requirements of flows. QoS routing
schemes proposed differ in the way they gather information about
the network state and select paths based on this information. We
broadly categorize these schemes into best-path routing and
proportional routing. The best-path routing schemes gather global
network state information and always select the best path for an
incoming flow based on this global view. On the other hand,
proportional routing schemes proportion incoming flows among a set
of candidate paths. We have shown that it is possible to compute
near-optimal proportions using only locally collected information.
Furthermore, a few good candidate paths can be selected using
infrequently exchanged global information and thus with minimal
communication overhead.
Localized Quality Of Service Routing For The Internet, describes
these schemes in detail demonstrating that proportional routing
schemes can achieve higher throughput with lower overhead than
best-path routing schemes. It first addresses the issue of finding
near-optimal proportions for a given set of candidate paths based
on locally collected flow statistics. This book will also look into
the selection of a few good candidate paths based on infrequently
exchanged global information. The final phase of this book will
describe extensions to proportional routing approach to provide
hierarchical routing across multiple areas in a large network.
Localized Quality Of Service Routing For The Internet is
designed for researchers and practitioners in industry, and is
suitable for graduatelevel students in computer science as a
secondary text.
Social Media Abyss plunges into the paradoxical condition of the
new digital normal versus a lived state of emergency. There is a
heightened, post-Snowden awareness; we know we are under
surveillance but we click, share, rank and remix with a perverse
indifference to technologies of capture and cultures of fear.
Despite the incursion into privacy by companies like Facebook,
Google and Amazon, social media use continues to be a daily habit
with shrinking gadgets now an integral part of our busy lives. We
are thrown between addiction anxiety and subliminal, obsessive use.
Where does art, culture and criticism venture when the digital
vanishes into the background? Geert Lovink strides into the
frenzied social media debate with Social Media Abyss - the fifth
volume of his ongoing investigation into critical internet culture.
He examines the symbiotic yet problematic relation between networks
and social movements, and further develops the notion of organized
networks. Lovink doesn't just submit to the empty soul of 24/7
communication but rather provides the reader with radical
alternatives. Selfie culture is one of many Lovink's topics, along
with the internet obsession of American writer Jonathan Franzen,
the internet in Uganda, the aesthetics of Anonymous and an anatomy
of the Bitcoin religion. Will monetization through cybercurrencies
and crowdfunding contribute to a redistribution of wealth or
further widen the gap between rich and poor? In this age of the
free, how a revenue model of the 99% be collectively designed?
Welcome back to the Social Question.
 |
Advances in Production Management Systems: New Challenges, New Approaches
- International IFIP WG 5.7 Conference, APMS 2009, Bordeaux, France, September 21-23, 2009, Revised Selected Papers
(Hardcover, 2010 ed.)
Bruno Vallespir, Thecle Alix
|
R2,787
Discovery Miles 27 870
|
Ships in 18 - 22 working days
|
|
|
The present economic and social environment has given rise to new
situations within which companies must operate. As a first example,
the globalization of the economy and the need for performance has
led companies to outsource and then to operate inside networks of
enterprises such as supply chains or virtual enterprises. A second
instance is related to environmental issues. The statement about
the impact of ind- trial activities on the environment has led
companies to revise processes, to save - ergy, to optimize
transportation.... A last example relates to knowledge. Knowledge
is considered today to be one of the main assets of a company. How
to capitalize, to manage, to reuse it for the benefit of the
company is an important current issue. The three examples above
have no direct links. However, each of them constitutes a challenge
that companies have to face today. This book brings together the
opinions of several leading researchers from all around the world.
Together they try to develop new approaches and find answers to
those challenges. Through the individual ch- ters of this book, the
authors present their understanding of the different challenges,
the concepts on which they are working, the approaches they are
developing and the tools they propose. The book is composed of six
parts; each one focuses on a specific theme and is subdivided into
subtopics.
The Semantic Web, which is intended to establish a
machine-understandable Web, is currently changing from being an
emerging trend to a technology used in complex real-world
applications. A number of standards and techniques have been
developed by the World Wide Web Consortium (W3C), e.g., the
Resource Description Framework (RDF), which provides a general
method for conceptual descriptions for Web resources, and SPARQL,
an RDF querying language. Recent examples of large RDF data with
billions of facts include the UniProt comprehensive catalog of
protein sequence, function and annotation data, the RDF data
extracted from Wikipedia, and Princeton University's WordNet.
Clearly, querying performance has become a key issue for Semantic
Web applications. In his book, Groppe details various aspects of
high-performance Semantic Web data management and query processing.
His presentation fills the gap between Semantic Web and database
books, which either fail to take into account the performance
issues of large-scale data management or fail to exploit the
special properties of Semantic Web data models and queries. After a
general introduction to the relevant Semantic Web standards, he
presents specialized indexing and sorting algorithms, adapted
approaches for logical and physical query optimization,
optimization possibilities when using the parallel database
technologies of today's multicore processors, and visual and
embedded query languages. Groppe primarily targets researchers,
students, and developers of large-scale Semantic Web applications.
On the complementary book webpage readers will find additional
material, such as an online demonstration of a query engine, and
exercises, and their solutions, that challenge their comprehension
of the topics presented.
The advances in sensor design have decreased the size, weight, and
cost of sensors by orders of magnitude, yet with the increase of
higher spatial and temporal re- lution and accuracy. With the fast
progress of sensors design and communications technique, sensor
networks have also been quickly evolving in both research and
practical domains in the last decade. More and more sensor networks
have been - ployed in real-world to gather information for our
daily life. Applications of sensor networks can be found in
battle?eld surveillance, environmental monitoring, b- logical
detection, smart spaces, industrial diagnostics, etc. Although the
technique of sensor networks has a very promising future, many
challenges are still deserving lots of research efforts for its
successful applications.
Thisbookisdevotedtocoveragecontrol,oneofthemostfundamentalandimportant
research issues in sensor networks. The aim of the book is to
provide tutorial-like and up-to-date reference resources on various
coverage control problems in sensor networks, a hot topic that has
been intensively researched in recent years. Due to some unique
characteristics of sensor networks such as energy constraint and -
hoc topology, the coverage problems in sensor networks have many
new scenarios and features that entitle them an important research
issue in recent years. I have done my best to include in the book
the most recent advances, techniques, protocols, results, and
?ndings in this ?eld.
Managing (e)Business Transformation comprises text and cases
designed to show students how a business can be transformed into an
internetworked enterprise where IT infrastructures are used to link
customers, suppliers, partners and employees to create superior
economic value. The book is written based on the premise that
integrating internet technologies throughout the value chain is
crucial to building and managing customer relationships.
Importantly, it underscores the centrality of basic business and
economic principles within the context of a networked environment.
The book builds on established business and economic theories,
concepts and fundamentals to show that 'e-business' will soon be
synonymous with 'business'. The book takes a strong managerial
perspective, especially popular with MBA students, to argue that
the internet is simply an enabling technology, which allows firms
to build the infrastructure needed to operate in an evolving
business world. The application of theory/concepts is emphasized
throughout and contains a range of international case studies
enhance the learning experience. This book is a must for all
students studying e-business strategy at undergraduate, MBA and
postgraduate level. Also available is a companion website with
extra features to accompany the text, please take a look by
clicking below -
http://www.palgrave.com/business/farhoomand/index.asp
The World Wide Web has become a ubiquitous global tool, used for
finding infor mation, communicating ideas, carrying out distributed
computation and conducting business, learning and science. The Web
is highly dynamic in both the content and quantity of the
information that it encompasses. In order to fully exploit its
enormous potential as a global repository of information, we need
to understand how its size, topology and content are evolv ing.
This then allows the development of new techniques for locating and
retrieving information that are better able to adapt and scale to
its change and growth. The Web's users are highly diverse and can
access the Web from a variety of devices and interfaces, at
different places and times, and for varying purposes. We thus also
need techniques for personalising the presentation and content of
Web based information depending on how it is being accessed and on
the specific user's requirements. As well as being accessed by
human users, the Web is also accessed by appli cations. New
applications in areas such as e-business, sensor networks, and
mobile and ubiquitous computing need to be able to detect and react
quickly to events and changes in Web-based information. Traditional
approaches using query-based 'pull' of information to find out if
events or changes of interest have occurred may not be able to
scale to the quantity and frequency of events and changes being
generated, and new 'push' -based techniques are needed."
|
|