Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer programming > Software engineering
This book provides readers with an in-depth discussion of circuit simulation, combining basic electrical engineering circuit theory with Python programming. It fills an information gap by describing the development of Python Power Electronics, an open-source software for simulating circuits, and demonstrating its use in a sample circuit. Unlike typical books on circuit theory that describe how circuits can be solved mathematically, followed by examples of simulating circuits using specific, commercial software, this book has a different approach and focus. The author begins by describing every aspect of the open-source software, in the context of non-linear power electronic circuits, as a foundation for aspiring or practicing engineers to embark on further development of open source software for different purposes. By demonstrating explicitly the operation of the software through algorithms, this book brings together the fields of electrical engineering and software technology.
The six volume set LNCS 11361-11366 constitutes the proceedings of the 14th Asian Conference on Computer Vision, ACCV 2018, held in Perth, Australia, in December 2018. The total of 274 contributions was carefully reviewed and selected from 979 submissions during two rounds of reviewing and improvement. The papers focus on motion and tracking, segmentation and grouping, image-based modeling, dep learning, object recognition object recognition, object detection and categorization, vision and language, video analysis and event recognition, face and gesture analysis, statistical methods and learning, performance evaluation, medical image analysis, document analysis, optimization methods, RGBD and depth camera processing, robotic vision, applications of computer vision.
This book contains the refereed proceedings of the 14th International Symposium on Mathematical Morphology, ISMM 2019, held in Saarbrucken, Germany, in July 2019. The 40 revised full papers presented together with one invited talk were carefully reviewed and selected from 54 submissions. The papers are organized in topical sections on Theory, Discrete Topology and Tomography, Trees and Hierarchies, Multivariate Morphology, Computational Morphology, Machine Learning, Segmentation, Applications in Engineering, and Applications in (Bio)medical Imaging.
This book constitutes the refereed proceedings of the 19th International Conference on Innovations for Community Services, I4CS 2019, held in Wolfsburg, Germany, in June 2019. The 16 revised full papers presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on communication systems; teaching and collaboration; smart cities; innovations and digital transformation; data analytics and models; community and quality.
This book constitutes the proceedings of the 40th International Conference on Application and Theory of Petri Nets and Concurrency, PETRI NETS 2019, held in Aachen, Germany, , in June 2018. Petri Nets 2019 is co-located with the 19th International Conference on Application of Concurrency to System Design, ACSD 2019. The 23 regular and 3 invited papers presented together in this volume were carefully reviewed and selected from 41 submissions. The focus of the conference is on following topics: Models, Tools, Synthesis, Semantics, Concurrent Processes, Algorithmic Aspects, Parametrics and Combinatorics, and Models with Extensions.
Refinement is one of the cornerstones of a formal approach to software engineering. Refinement is all about turning an abstract description (of a soft or hardware system) into something closer to implementation. It provides that essential bridge between higher level requirements and an implementation of those requirements. This book provides a comprehensive introduction to refinement for the researcher or graduate student. It introduces refinement in different semantic models, and shows how refinement is defined and used within some of the major formal methods and languages in use today. It (1) introduces the reader to different ways of looking at refinement, relating refinement to observations(2) shows how these are realised in different semantic models (3) shows how different formal methods use different models of refinement, and (4) how these models of refinement are related.
This book constitutes the proceedings of the 39th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2019, held in Copenhagen, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 15 full and 3 short papers presented were carefully reviewed and selected from 42 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.
This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Technology and Innovation in Learning, Teaching and Education, TECH-EDU 2018, held in Thessaloniki, Greece, on June 20-22, 2018. The 30 revised full papers along with 18 short papers presented were carefully reviewed and selected from 80 submissions.The papers are organized in topical sections on new technologies and teaching approaches to promote the strategies of self and co-regulation learning (new-TECH to SCRL); eLearning 2.0: trends, challenges and innovative perspectives; building critical thinking in higher education: meeting the challenge; digital tools in S and T learning; exploratory potentialities of emerging technologies in education; learning technologies; digital technologies and instructional design; big data in education and learning analytics.
This book constitutes the refereed proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, held in Christchurch, New Zealand, in July 2019. The 32 revised full papers and 8 short papers presented were carefully revised and selected from 129 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as encryption; post-quantum security; cryptocurrency related; foundations; system and network security; and symmetric cryptography.
This book constitutes revised selected papers from the 24th Argentine Congress on Computer Science, CACIC 2018, held in Tandil, Argentina, in October 2018. The 26 papers presented in this volume were carefully reviewed and selected from a total of 155 submissions. They were organized in topical sections named: Agents and Systems; Distributed and Parallel Processing; Technology Applied to Education; Graphic Computation, Images and Visualization; Software Engineering; Databases and Data Mining; Hardware Architectures, Networks, and Operating Systems; Innovation in Software Systems; Signal Processing and Real-Time Systems; Computer Security; Innovation in Computer Science Education; and Digital Governance and Smart Cities.
The two-volume set LNBIP 353 and 354 constitutes the proceedings of the 22nd International Conference on Business Information Systems, BIS 2019, held in Seville, Spain, in June 2019. The theme of the BIS 2019 was "Data Science for Business Information Systems", inspiring researchers to share theoretical and practical knowledge of the different aspects related to Data Science in enterprises. The 67 papers presented in these proceedings were carefully reviewed and selected from 223 submissions. The contributions were organized in topical sections as follows: Part I: Big Data and Data Science; Artificial Intelligence; ICT Project Management; and Smart Infrastructure. Part II: Social Media and Web-based Systems; and Applications, Evaluations and Experiences.
The two-volume set LNBIP 353 and 354 constitutes the proceedings of the 22nd International Conference on Business Information Systems, BIS 2019, held in Seville, Spain, in June 2019. The theme of the BIS 2019 was "Data Science for Business Information Systems", inspiring researchers to share theoretical and practical knowledge of the different aspects related to Data Science in enterprises. The 67 papers presented in these proceedings were carefully reviewed and selected from 223 submissions. The contributions were organized in topical sections as follows: Part I: Big Data and Data Science; Artificial Intelligence; ICT Project Management; and Smart Infrastructure. Part II: Social Media and Web-based Systems; and Applications, Evaluations and Experiences.
This book constitutes the proceedings of the 11th Mexican Conference on Pattern Recognition, MCPR 2019, held in Queretaro, Mexico, in June 2019. The 40 papers presented in this volume were carefully reviewed and selected from 86 submissions. They were organized in topical sections named: artificial intelligence techniques and recognition; computer vision; industrial and medical applications of pattern recognition; image processing and analysis; pattern recognition techniques; signal processing and analysis; natural language, and processing and recognition.
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributions authored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.
This book constitutes the refereed proceedings of the 19th International Conference on Web Engineering, ICWE 2019, held in Daejeon, South Korea, in June 2019. The 26 full research papers and 9 short papers presented were carefully reviewed and selected from 106 submissions. Additionally, two demonstrations, four posters, and four contributions to the PhD symposium as well as five tutorials are included in this volume. The papers cover research areas such as Web mining and knowledge extraction, Web big data and Web data analytics, social Web applications and crowdsourcing, Web user interfaces, Web security and privacy, Web programming, Web services and computing, Semantic Web and linked open data applications, and Web application modeling and engineering.
This book provides a comprehensive coverage of hybrid high-order methods for computational mechanics. The first three chapters offer a gentle introduction to the method and its mathematical foundations for the diffusion problem. The next four chapters address applications of increasing complexity in the field of computational mechanics: linear elasticity, hyperelasticity, wave propagation, contact, friction, and plasticity. The last chapter provides an overview of the main implementation aspects including some examples of Matlab code. The book is primarily intended for graduate students, researchers, and engineers working in related fields of application, and it can also be used as a support for graduate and doctoral lectures.
This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. The 16 full papers, 1 short paper, 1 position paper and 2 invited papers presented in this book, were carefully reviewed and selected from 51 submissions. They cover a range of topics including mobile security; cloud security and big data; IoT security; software security, malware analysis, and vulnerability detection; cryptography; cyber physical security and hardware security; and access control.
This open access book constitutes the proceedings of the 28th European Symposium on Programming, ESOP 2019, which took place in Prague, Czech Republic, in April 2019, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019.
This book is a comprehensive explanation of graph and model transformation. It contains a detailed introduction, including basic results and applications of the algebraic theory of graph transformations, and references to the historical context. Then in the main part the book contains detailed chapters on M-adhesive categories, M-adhesive transformation systems, and multi-amalgamated transformations, and model transformation based on triple graph grammars. In the final part of the book the authors examine application of the techniques in various domains, including chapters on case studies and tool support. The book will be of interest to researchers and practitioners in the areas of theoretical computer science, software engineering, concurrent and distributed systems, and visual modelling.
Genetic programming (GP) is a popular heuristic methodology of program synthesis with origins in evolutionary computation. In this generate-and-test approach, candidate programs are iteratively produced and evaluated. The latter involves running programs on tests, where they exhibit complex behaviors reflected in changes of variables, registers, or memory. That behavior not only ultimately determines program output, but may also reveal its `hidden qualities' and important characteristics of the considered synthesis problem. However, the conventional GP is oblivious to most of that information and usually cares only about the number of tests passed by a program. This `evaluation bottleneck' leaves search algorithm underinformed about the actual and potential qualities of candidate programs. This book proposes behavioral program synthesis, a conceptual framework that opens GP to detailed information on program behavior in order to make program synthesis more efficient. Several existing and novel mechanisms subscribing to that perspective to varying extent are presented and discussed, including implicit fitness sharing, semantic GP, co-solvability, trace convergence analysis, pattern-guided program synthesis, and behavioral archives of subprograms. The framework involves several concepts that are new to GP, including execution record, combined trace, and search driver, a generalization of objective function. Empirical evidence gathered in several presented experiments clearly demonstrates the usefulness of behavioral approach. The book contains also an extensive discussion of implications of the behavioral perspective for program synthesis and beyond.
This book explores how agile development practices, in particular pair programming, code review and automated testing, help software development teams to perform better. Agile software engineering has become the standard software development paradigm over the last decade, and the insights provided here are taken from a large-scale survey of 80 professional software development teams working at SAP SE in Germany. In addition, the book introduces a novel measurement tool for assessing the performance of software development teams. No previous study has researched this topic with a similar data set comprising insights from more than 450 professional software engineers.
This book constitutes the proceedings of the 5th OpenSHMEM Workshop, held in Baltimore, MD, USA, in August 2018. The 14 full papers presented in this book were carefully reviewed and selected for inclusion in this volume. The papers discuss a variety of ideas for extending the OpenSHMEM specification and discuss a variety of concepts, including interesting use of OpenSHMEM in HOOVER - a distributed, flexible, and scalable streaming graph processor and scaling OpenSHMEM to handle massively parallel processor arrays. The papers are organized in the following topical sections: OpenSHMEM library extensions and implementations; OpenSHMEM use and applications; and OpenSHMEM simulators, tools, and benchmarks.
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. The authors first show how the system software interacts with the hardware to tolerate faults. They analyze and further develop the theory of fault tolerance to understand the different ways to increase the reliability of a system, with special attention on the role of system software in this process. They further develop the general algorithm of fault tolerance (GAFT) with its three main processes: hardware checking, preparation for recovery, and the recovery procedure. For each of the three processes, they analyze the requirements and properties theoretically and give possible implementation scenarios and system software support required. Based on the theoretical results, the authors derive an Oberon-based programming language with direct support of the three processes of GAFT. In the last part of this book, they introduce a simulator, using it as a proof of concept implementation of a novel fault tolerant processor architecture (ERRIC) and its newly developed runtime system feature-wise and performance-wise. The content applies to industries such as military, aviation, intensive health care, industrial control, space exploration, etc.
This book presents high-quality original contributions on new software engineering models, approaches, methods, and tools and their evaluation in the context of defence and security applications. In addition, important business and economic aspects are discussed, with a particular focus on cost/benefit analysis, new business models, organizational evolution, and business intelligence systems. The contents are based on presentations delivered at SEDA 2018, the 6th International Conference in Software Engineering for Defence Applications, which was held in Rome, Italy, in June 2018. This conference series represents a targeted response to the growing need for research that reports and debates the practical implications of software engineering within the defence environment and also for software performance evaluation in real settings through controlled experiments as well as case and field studies. The book will appeal to all with an interest in modeling, managing, and implementing defence-related software development products and processes in a structured and supportable way. |
You may like...
The Garbage Collection Handbook - The…
Richard Jones, Antony Hosking, …
Hardcover
R1,922
Discovery Miles 19 220
|