Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer programming > Software engineering
With the rapid growth of technology in society, communication networks have become a heavily researched topic. Implementing these advanced systems is a challenge, however, due to the abundance of optimization problems within these networks. The use of meta-heuristic algorithms and nature-inspired computing has become a prevalent technique among researchers for solving these complex problems within communication networks. Despite its popularity, this specific computing technique lacks the appropriate amount of research that is needed for professionals to grasp a definite understanding. Nature-Inspired Computing Applications in Advanced Communication Networks is a collection of innovative research on the methods and applications of natural computation techniques and algorithms within communication systems such as wireless sensor networks, vehicular adhoc networks, and internet of things. While highlighting topics including mobile sensor deployment, routing optimization, and sleep scheduling, this book is ideally designed for researchers, network professionals, computer scientists, mathematicians, developers, scholars, educators, and students seeking to enhance their understanding of nature-inspired computing and its solutions within various advanced communication networks.
The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas. The Second International Conference on Computer Science, Engineering & Applications (ICCSEA-2012), held in Delhi, India, during May 25-27, 2012 attracted many local and international delegates, presenting a balanced mixture of intellect and research both from the East and from the West. Upon a strenuous peer-review process the best submissions were selected leading to an exciting, rich and a high quality technical conference program, which featured high-impact presentations in the latest developments of various areas of computer science, engineering and applications research.
Despite being an intimate part of our lives, most of us know almost nothing about the "computer on a chip." As a result, we are constantly making crucial business, political and personal decisions based on the future of the microprocessor, while intellectually standing in the dark. If we can understand how the microprocessor came into being, the state it is in today and where its future lies, we can learn a whole lot more about where we are now and where we are going. Now, for the very first time, Michael S. Malone tells the complete story of this amazing invention in his well-known and witty style. However, this is anything but an electronics textbook. Rather, it is a riveting and incisive adventure story about extraordinary people and the legendary companies they have built. It is a tale of huge success and devastating failure, steadfast partnerships and bitter rivalries - plus a liberal sprinkling of greed and wealth. Malone closes with a tantalising look into the future: emerging technologies, new software, and even speculation about what might lie beyond the microprocessor era.
Model checking is a prominent technique used in the hardware and software industries for automatic verification. While it is very successful in finding subtle bugs in distributed systems, it faces the state explosion problem - the number of reachable states grows exponentially in the number of concurrent components. In this book the authors introduce unfoldings, an approach to model checking which alleviates the state explosion problem by means of concurrency theory. They offer a gentle introduction to the basics of the method, and in particular they detail an unfolding-based algorithm for model checking concurrent systems against properties specified as formulas of linear temporal logic (LTL). Self-contained chapters cover transition systems and their products; unfolding products; search procedures for basic verification problems, such as reachability and livelocks; and model checking LTL. The final chapter summarizes the results of the book, and points the reader to tools and case studies. The book will be of value to researchers and graduate students engaged in automatic verification and concurrency theory.
This book constitutes the refereed proceedings of the 9th International Symposium on From Data Models and Back, DataMod 2020, held virtually, in October 2020. The 11 full papers and 3 short papers presented in this book were selected from 19 submissions. The papers are grouped in these topical sections: machine learning; simulation-based approaches, and data mining and processing related approaches.
This book covers both theory and applications in the automation of software testing tools and techniques for various types of software (e.g. object-oriented, aspect-oriented, and web-based software). When software fails, it is most often due to lack of proper and thorough testing, an aspect that is even more acute for object-oriented, aspect-oriented, and web-based software. Further, since it is more difficult to test distributed and service-oriented architecture-based applications, there is a pressing need to discuss the latest developments in automated software testing. This book discusses the most relevant issues, models, tools, challenges, and applications in automated software testing. Further, it brings together academic researchers, scientists, and engineers from a wide range of industrial application areas, who present their latest findings and identify future challenges in this fledging research area.
This book discusses enterprise hierarchies, which view a target system with varying degrees of abstraction. These requirement refinement hierarchies can be represented by goal models. It is important to verify that such hierarchies capture the same set of rationales and intentions and are in mutual agreement with the requirements of the system being designed. The book also explores how hierarchies manifest themselves in the real world by undertaking a data mining exercise and observing the interactions within an enterprise. The inherent sequence-agnostic property of goal models prevents requirement analysts from performing compliance checks in this phase as compliance rules are generally embedded with temporal information. The studies discussed here seek to extract finite state models corresponding to goal models with the help of model transformation. The i*ToNuSMV tool implements one such algorithm to perform model checking on i* models. In turn, the AFSR framework provides a new goal model nomenclature that associates semantics with individual goals. It also provides a reconciliation machinery that detects entailment or consistency conflicts within goal models and suggests corrective measures to resolve such conflicts. The authors also discuss how the goal maintenance problem can be mapped to the state-space search problem, and how A* search can be used to identify an optimal goal model configuration that is free from all conflicts. In conclusion, the authors discuss how the proposed research frameworks can be extended and applied in new research directions. The GRL2APK framework presents an initiative to develop mobile applications from goal models using reusable code component repositories.
This book constitutes the revised selected papers of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2019, held in Vienna, Austria, in September 2019.The 25 full papers presented were carefully reviewed and selected from 220 submissions. The papers are organized in topical sections on knowledge discovery and information retrieval; knowledge engineering and ontology development; and knowledge management and information systems.
Create and implement AI-based features in your Swift apps for iOS, macOS, tvOS, and watchOS. With this practical book, programmers and developers of all kinds will find a one-stop shop for AI and machine learning with Swift. Taking a task-based approach, you'll learn how to build features that use powerful AI features to identify images, make predictions, generate content, recommend things, and more. AI is increasingly essential for every developer-and you don't need to be a data scientist or mathematician to take advantage of it in your apps. Explore Swift-based AI and ML techniques for building applications. Learn where and how AI-driven features make sense. Inspect tools such as Apple's Python-powered Turi Create and Google's Swift for TensorFlow to train and build models. I: Fundamentals and Tools-Learn AI basics, our task-based approach, and discover how to build or find a dataset. II: Task Based AI-Build vision, audio, text, motion, and augmentation-related features; learn how to convert preexisting models. III: Beyond-Discover the theory behind task-based practice, explore AI and ML methods, and learn how you can build it all from scratch... if you want to
This book focuses on the development and implementation of cloud-based, complex software that allows parallelism, fast processing, and real-time connectivity. Software engineering (SE) is the design, development, testing, and implementation of software applications, and this discipline is as well developed as the practice is well established whereas the Cloud Software Engineering (CSE) is the design, development, testing, and continuous delivery of service-oriented software systems and applications (Software as a Service Paradigm). However, with the emergence of the highly attractive cloud computing (CC) paradigm, the tools and techniques for SE are changing. CC provides the latest software development environments and the necessary platforms relatively easily and inexpensively. It also allows the provision of software applications equally easily and on a pay-as-you-go basis. Business requirements for the use of software are also changing and there is a need for applications in big data analytics, parallel computing, AI, natural language processing, and biometrics, etc. These require huge amounts of computing power and sophisticated data management mechanisms, as well as device connectivity for Internet of Things (IoT) environments. In terms of hardware, software, communication, and storage, CC is highly attractive for developing complex software that is rapidly becoming essential for all sectors of life, including commerce, health, education, and transportation. The book fills a gap in the SE literature by providing scientific contributions from researchers and practitioners, focusing on frameworks, methodologies, applications, benefits and inherent challenges/barriers to engineering software using the CC paradigm.
This two-volume set constitutes the refereed proceedings of the 16th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020, held in Shanghai, China, in October 2020.The 61 full papers and 16 short papers presented were carefully reviewed and selected from 211 submissions. The papers reflect the conference sessions as follows: Collaborative Applications for Network and E-Commerce; Optimization for Collaborate System; Cloud and Edge Computing; Artificial Intelligence; AI Application and Optimization; Classification and Recommendation; Internet of Things; Collaborative Robotics and Autonomous Systems; Smart Transportation.
This book constitutes the revised selected papers of the 17th Smoky Mountains Computational Sciences and Engineering Conference, SMC 2020, held in Oak Ridge, TN, USA*, in August 2020.The 36 full papers and 1 short paper presented were carefully reviewed and selected from a total of 94 submissions. The papers are organized in topical sections of computational applications: converged HPC and artificial intelligence; system software: data infrastructure and life cycle; experimental/observational applications: use cases that drive requirements for AI and HPC convergence; deploying computation: on the road to a converged ecosystem; scientific data challenges. *The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of the 4th Computational Methods in Systems and Software 2020 (CoMeSySo 2020) proceedings. Software engineering, computer science and artificial intelligence are crucial topics for the research within an intelligent systems problem domain. The CoMeSySo 2020 conference is breaking the barriers, being held online. CoMeSySo 2020 intends to provide an international forum for the discussion of the latest high-quality research results.
This is the third book in a series devoted to gear design and production. Comprising papers by scientists and gear experts from around the globe, it covers recent developments in practically all spheres of mechanical engineering related to gears and transmissions. It describes advanced approaches to research, design, testing and production of various kinds of gears for a vast range of applications, with a particular focuses on advanced computer-aided approaches for gear analysis, simulation and design, the application of new materials and tribological issues.
This book constitutes the refereed proceedings of the 4th Computational Methods in Systems and Software 2020 (CoMeSySo 2020) proceedings. Software engineering, computer science and artificial intelligence are crucial topics for the research within an intelligent systems problem domain. The CoMeSySo 2020 conference is breaking the barriers, being held online. CoMeSySo 2020 intends to provide an international forum for the discussion of the latest high-quality research results.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the Second Interdisciplinary Workshop on Logic, Language, and Meaning, TLLM 2020, held in Tsinghua, China, in December 2020. The 12 full papers together presented were fully reviewed and selected from 40 submissions. Due to COVID-19 the workshop will be held online. The workshop covers a wide range of topics where monotonicity is discussed in the context of logic, causality, belief revision, quantification, polarity, syntax, comparatives, and various semantic phenomena in particular languages.
Although the use of cloud computing platforms and applications
has expanded rapidly, most books on the subject focus on high-level
concepts. There has long been a need for a book that provides
detailed guidance on how to develop secure clouds.
This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.
This best-selling software testing title is the only official textbook of the ISTQB-BCS Certified Tester Foundation Level. This fourth edition includes examples and exercises reflecting current technology and applications. It is ideal for those with a little experience of software testing who wish to cement their knowledge with industry-recognised techniques and theory.
This book discusses various open issues in software engineering, such as the efficiency of automated testing techniques, predictions for cost estimation, data processing, and automatic code generation. Many traditional techniques are available for addressing these problems. But, with the rapid changes in software development, they often prove to be outdated or incapable of handling the software's complexity. Hence, many previously used methods are proving insufficient to solve the problems now arising in software development. The book highlights a number of unique problems and effective solutions that reflect the state-of-the-art in software engineering. Deep learning is the latest computing technique, and is now gaining popularity in various fields of software engineering. This book explores new trends and experiments that have yielded promising solutions to current challenges in software engineering. As such, it offers a valuable reference guide for a broad audience including systems analysts, software engineers, researchers, graduate students and professors engaged in teaching software engineering.
This book constitutes the refereed proceedings of the 23rd International Conference on Distributed and Computer and Communication Networks, DCCN 2020, held in Moscow, Russia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 43 papers were carefully reviewed and selected from 167 submissions.The papers are organized in the following topical sections: computer and communication networks and technologies; analytical modeling of distributed systems, and distributed systems applications.
Achieve streamlined, rapid production with enterprise-level DevOps The DevOps Adoption Playbook provides practical, actionable, real-world guidance on implementing DevOps at enterprise scale. Author Sanjeev Sharma heads the DevOps practice for IBM; in this book, he provides unique guidance and insight on implementing DevOps at large organizations. Most DevOps literature is aimed at startups, but enterprises have unique needs, capabilities, limitations, and challenges; "DevOps for startups" doesn't work at this scale, but the DevOps paradigm can revolutionize enterprise IT. Deliver high-value applications and systems with velocity and agility by adopting the necessary practices, automation tools, and organizational and cultural changes that lead to innovation through rapid experimentation. Speed is an advantage in the face of competition, but it must never come at the expense of quality; DevOps allows your organization to keep both by intersecting development, quality assurance, and operations. Enterprise-level DevOps comes with its own set of challenges, but this book shows you just how easily they are overcome. With a slight shift in perspective, your organization can stay ahead of the competition while keeping costs, risks, and quality under control. * Grasp the full extent of the DevOps impact on IT organizations * Achieve high-value innovation and optimization with low cost and risk * Exceed traditional business goals with higher product release efficiency * Implement DevOps in large-scale enterprise IT environments DevOps has been one of IT's hottest trends for the past decade, and plenty of success stories testify to its effectiveness in organizations of any size, industry, or level of IT maturity, all around the world. The DevOps Adoption Playbook shows you how to get your organization on board so you can slip production into the fast lane and innovate your way to the top.
This book constitutes the thoroughly refereed post conference papers of the Second International Conference on Blockchain and Trustworthy Systems, Blocksys 2020, held in Dali, China*, in August 2020. The 42 full papers and the 11 short papers were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections: theories and algorithms for blockchain, performance optimization of blockchain, blockchain security and privacy, blockchain and cloud computing, blockchain and internet of things, blockchain and mobile edge computing, blockchain and smart contracts, blockchain and data mining, blockchain services and applications, trustworthy system development. *The conference was held virtually due to the COVID-19 pandemic.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection XIII describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues; Infrastructure Protection; Vehicle Infrastructure Security; Telecommunications Infrastructure Security; Cyber-Physical Systems Security; and Industrial Control Systems Security. This book is the thirteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Thirteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2019. Critical Infrastructure Protection XIII is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. |
You may like...
Principles of Security and Trust - 7th…
Lujo Bauer, Ralf Kusters
Hardcover
R1,620
Discovery Miles 16 200
Writing Better Requirements - Writing…
Ian Alexander, Richard Stevens
Paperback
R1,248
Discovery Miles 12 480
|