Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
This book constitutes the refereed proceedings of the 13th International Conference on Augmented Cognition, AC 2019, held as part of the 21st International Conference on Human-Computer Interaction, HCII 2019, in Orlando, FL, USA in July, 2019. The 1274 full papers and 209 posters presented at the HCII 2019 conferences were carefully reviewed and selected from 5029 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: cognitive modeling, perception, emotion and interaction; human cognition and behavior in complex tasks and environments; brain-computer interfaces and electroencephalography; and augmented learning.
This book constitutes the refereed conference proceedings of the 7th Annual Privacy Forum, APF 2019, held in Rome, Italy, in June 2019. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers present original work on the themes of data protection and privacy and their repercussions on technology, business, government, law, society, policy and law enforcement bridging the gap between research, business models, and policy. They are organized in topical sections on transparency, users' rights, risk assessment, and applications.
This book constitutes the proceedings of the 21th International Conference on Coordination Models and Languages, COORDINATION 2019, held in Kongens Lyngby, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 15 full papers included in this volume were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections named: computational models; tools; exploring new frontiers; and coordination patterns.
This book contains revised selected and invited papers presented at the International Workshop on Massively Multi-Agent Systems, MMAS 2018, held in Stockholm, Sweden, in July 2018. The 7 revised full papers presented were carefully reviewed and selected for inclusion in this volume. Also included are 3 post-workshop papers. The papers discuss enabling technologies, new architectures, promising applications, and challenges of massively multi-agent systems in the era of IoT. They are organized in the following topical sections: multi-agent systems and Internet of Things; architectures for massively multi-agent systems; and applications of massively multi-agent systems.
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.
This book constitutes the proceedings of the 15th IFIP International Conference on Network and Parallel Computing, NPC 2018, held in Muroran, Japan, in November/December 2018. The 22 full and 12 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The papers cover traditional areas of network and parallel computing, including parallel applications, distributed algorithms, parallel architectures, software environments, and distributed tools.
If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you. Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing. Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include: * Key problems with networking * Network interface card (NIC) device drivers * System initialization * Layer 2 (link-layer) tasks and implementation * Layer 3 (IPv4) tasks and implementation * Neighbor infrastructure and protocols (ARP) * Bridging * Routing * ICMP Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.
Explore how to use ARKit to create iOS apps and learn the basics of augmented reality while diving into ARKit specific topics. This book reveals how augmented reality allows you to view the screen on an iOS device, aim the camera at a nearby scene, and view both the real items in that scene as well as a graphic image overlaid on to that scene. You'll start by accessing the camera and teaching your app to track the world around its device. You'll then see how to position nodes and create augmented reality shapes and textures. Next you'll have your creations interact with their environment by programming workable physics, detecting planes, measuring distance, and applying virtual force. Finally you'll learn how to hit test and troubleshoot your applications to ensure they interact with the real world around them seamlessly. ARKit is Apple's software framework for creating augmented reality apps on iOS devices such as the iPhone and iPad. Unlike virtual reality that creates an entirely artificial world for the user to view and explore, Beginning ARKit for iPhone and iPad will show you how augmented reality places artificial items in an actual scene displayed by an iOS device's camera. What You'll Learn Access the camera Use ARKit's hit testing for tracked geometry Apply and combine real world and virtual physics Who This Book Is For Programmers familiar with the basics of Swift programming who want to dive into developing iOS applications with Swift.
This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: Microservices; Services and Processes; Service Trust and Security; Business Services and Processes; Edge + IoT Services; Social and Interactive Services; Recommendation; Service Analytics; Quality of Service; Service Engineering; Service Applications; Service Management.
This book constitutes the refereed post-conference proceedings of the 25th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2018, held in Ma'ale HaHamisha, Israel, in June 2018. The 23 full papers and 8 short papers presented were carefully reviewed and selected from 47 submissions. They are devoted to the study of the interplay between structural knowledge, communications, and computing in decentralized systems of multiple communicating entities and cover a large range of topics.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018. The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.
This book constitutes the refereed proceedings of the 12th Annual Conference on Advanced Computer Architecture, ACA 2018, held in Yingkou, China, in August 2018. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The papers of this volume are organized in topical sections on: accelerators; new design explorations; towards efficient ML/AI; parallel computing system.
Learn how computer vision works, how augmented reality renders digital graphics into the physical world via an iPhone's camera, and how to incorporate these technologies into your own apps. This book shows you how to take full advantage of computer vision technologies. Interacting with other people online usually involves user-generated images and videos; whether it be "memes", short videos, or heavily-modified images. Before smart phones, generating this content required a professional using high-level image and video editing software. Not any more. This book will teach you to use computer vision in the most popular ways, such as for facial recognition, image to text analysis and, of course, recording a video of a dancing hot dog in your living room. Starting with the history of computer vision, image and video processing fundamentals, and an introduction to developing augmented reality applications, you'll learn to incorporate computer vision both in the content you create and the apps you develop for end users. Computer Vision and Augmented Reality in iOS reveals how every user with access to the Internet and a smart phone can easily generate heavily-modified images and videos. What You'll Learn Incorporate mathematics related to computer vision into your apps Host computer vision models remotely for mobile use Implement visual-inertial state estimation algorithms for mobile augmented reality Who This Book Is For Professionals or post graduate students in software development or engineering who have a basic understanding of how software development works and are interested in implementing computer vision into their development. It's recommended that readers already have a working knowledge of C++ and Swift.
This book constitutes the refereed proceedings of the 13th Colombian Conference on Computing, CCC 2018, held in Cartagena, Colombia, in September 2018. The 46 revised full papers presented were carefully reviewed and selected from 194 submissions. The papers deal with the following topics: information and knowledge management, software engineering and IT architectures, educational informatics, intelligent systems and robotics, human-computer interaction, distributed systems and large-scale architectures, image processing, computer vision and multimedia, security of the information, formal methods, computational logic, and theory of computation.
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing. Chapter "Deploying Search Based Software Engineering with Sapienz at Facebook" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Using cloud and hybrid cloud computing services, you can transform your data center to serve dynamic, highly-changeable workloads, process and analyze soaring data loads, and deliver greater flexibility at lower cost. Modernizing the Data Center with Windows Server and Hybrid Cloud is the definitive guide to using Windows Server, Microsoft Azure, and related Microsoft technologies to achieve this transformation in your own environment. Three world-renowned experts in Microsoft data center technology show how to effectively leverage your current legacy systems as you incorporate your optimal mix of private and public cloud services. Drawing on extensive experience implementing Microsoft hybrid cloud solutions, they offer approachable, step-by-step coverage of your entire transition, from strategy through implementation, security and identity protection, management, and scripting for automation. The authors conclude with full chapters on maximizing data center efficiency, and on supporting innovation going forward.
Starting an app development company is one of the most rewarding things you'll ever do. Or it sends you into bankruptcy and despair. If only there was a guide out there, to help you along the way. This book is your guide to starting, running, expanding, buying, and selling a development consulting firm. But not just any consulting firm, one with a focus on Apple. Apple has been gaining adoption in businesses ranging from traditional 5 person start ups to some of the largest companies in the world. Author Charles Edge has been there since the days that the Mac was a dying breed in business, then saw the advent of the iPhone and iPad, and has consulted for environments ranging from the home user to the largest Apple deployments in the world. Now there are well over 10,000 shops out there consulting on Apple in business and more appearing every day.Build, Run, and Sell Your Apple Consulting Practice takes you through the journey, from just an idea to start a company all the way through mergers and finally into selling your successful and growing Apple development business. What You'll Learn Create and deploy grassroots as well as more traditional marketing plans Engage in the community of developers and companies that will hire you and vice versa Effecively buy and sell your time and talents to grow your business while remaining agile Who This Book Is For Business owners looking to grow and diversify their companies as well as developers, engineers, and designers working on Apple apps who would like to branch out into starting their own consulting business.
This book covers the basic concepts and principles of operating systems, showing how to apply them to the design and implementation of complete operating systems for embedded and real-time systems. It includes all the foundational and background information on ARM architecture, ARM instructions and programming, toolchain for developing programs, virtual machines for software implementation and testing, program execution image, function call conventions, run-time stack usage and link C programs with assembly code. It describes the design and implementation of a complete OS for embedded systems in incremental steps, explaining the design principles and implementation techniques. For Symmetric Multiprocessing (SMP) embedded systems, the author examines the ARM MPcore processors, which include the SCU and GIC for interrupts routing and interprocessor communication and synchronization by Software Generated Interrupts (SGIs).Throughout the book, complete working sample systems demonstrate the design principles and implementation techniques. The content is suitable for advanced-level and graduate students working in software engineering, programming, and systems theory.
Unique selling point: * This book proposes several approaches for dynamic Android malware detection based on system calls which do not have the limitations of existing mechanisms. * This book will be useful for researchers, students, developers and security analysts to know how malware behavior represented in the form of system call graphs can effectively detect Android malware. * The malware detection mechanisms in this book can be integrated with commercial antivirus softwares to detect Android malware including obfuscated variants.
This book constitutes the refereed proceedings of the 12th International Conference on Parallel Computational Technologies, PCT 2018, held in Rostov-on-Don, Russia, in April 2018.The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
This book offers a comprehensive and systematic introduction to the latest research on hesitant fuzzy decision-making theory. It includes six parts: the hesitant fuzzy set and its extensions, novel hesitant fuzzy measures, hesitant fuzzy hybrid weighted aggregation operators, hesitant fuzzy multiple-criteria decision-making with incomplete weights, hesitant fuzzy multiple criteria decision-making with complete weights information, and the hesitant fuzzy preference relation based decision-making theory. These methodologies are implemented in various fields such as decision-making, medical diagnosis, cluster analysis, service quality management, e-learning management and environmental management. A valuable resource for engineers, technicians, and researchers in the fields of fuzzy mathematics, operations research, information science, management science and engineering, it can also be used as a textbook for postgraduate and senior undergraduate students.
Learn the basics of reactive programming and how it makes apps more responsive. This book shows you how to incorporate reactive programming into existing development products and cycles using RXSwift and RXCocoa on iOS and Mac. As we move away from the traditional paradigm of typing or touching one step at a time to interact with programs, users expect apps to adapt and not need constant hand-holding. People today expect their devices to do much more than just follow commands. They expect devices to react and adapt. Reactive programming, a new term for asynchronous processing, requires new app architectures, and you'll learn how these are already built into iOS and macOS in many places. As part of this more complex environment, you'll move beyond Cocoa and Cocoa Touch to incorporate data from Amazon Web Services (AWS), JavaScript Object Notation (JSON), and other formats, and standards. Together with the concepts of reactive programming and RxSwift, these tools help you build more powerful and useful apps that have wide appeal and use. What You'll Learn Work with tools such as Darwin microkernel, RxSwift, and RxCocoa Use Git repositiories and other resoucrces to get into coding Create apps that adapt to gestures and UI interaction as well as what's happening in and around the environment of the app itself. Who This Book Is For This book is for Swift programmers interested in learning to create reactive apps with RxSwift.
This book constitutes the refereed proceedings of the 15th National Conference on Embedded Systems Technology, ESTC 2017, held in Shenyang, China, in November 2017. The 18 revised full papers presented were carefully reviewed and selected from 45 papers. The topics cover a broad range of fields focusing on the theme "embedded systems and intelligent computing," such as context aware computing, scheduling, cyber physical system, high performance embedded computing, embedded system and applications, and education and surveys.
This book constitutes the refereed proceedings of the 11th International Conference on Model Transformation, ICMT 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 9 full papers were carefully reviewed and selected from 24 submissions. This book also presents 1 invited paper. The papers include research, application, and tool demonstration papers presented in the context of four sessions on verification of model transformations, model transformation tools, transformation reuse and graph transformations. |
You may like...
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek
Hardcover
R1,498
Discovery Miles 14 980
CompTIA A+ Certification All-in-One Exam…
Mike Meyers, Travis Everett, …
Hardcover
R1,276
Discovery Miles 12 760
|