![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Systems analysis & design
This, the 38th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of six papers selected from the 68 contributions presented at the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, in September 2016. Topics covered include query personalization in databases, data anonymization, similarity search, computational methods for entity resolution, array-based computations in big data analysis, and pattern mining.
This book presents state-of-the-art solutions to the theoretical and practical challenges stemming from the leverage of big data and its computational intelligence in supporting smart network operation, management, and optimization. In particular, the technical focus covers the comprehensive understanding of network big data, efficient collection and management of network big data, distributed and scalable online analytics for network big data, and emerging applications of network big data for computational intelligence.
This book constitutes the refereed proceedings of the 12th Annual Conference on Advanced Computer Architecture, ACA 2018, held in Yingkou, China, in August 2018. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The papers of this volume are organized in topical sections on: accelerators; new design explorations; towards efficient ML/AI; parallel computing system.
This double volumes LNCS 11229-11230 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2018, Ontologies, Databases, and Applications of Semantics, ODBASE 2018, and Cloud and Trusted Computing, C&TC, held as part of OTM 2018 in October 2018 in Valletta, Malta. The 64 full papers presented together with 22 short papers were carefully reviewed and selected from 173 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, informationsystems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
This book constitutes the proceedings of the 12th International Conference on Verification and Evaluation of Computer and Communication Systems ( VECoS 2018) held at Grenoble, France, in September 2018. The 11 full papers in this volume, presented together with one abstract and two invited papers, were carefully reviewed and selected from 23 submissions. The aim of the VECoS conference is to bring together researchers and practitioners in the areas of verification, control, performance, and dependability evaluation in order to discuss state of the art and challenges in modern computer and communication systems in which functional and extra-functional properties are strongly interrelated. Thus, the main motivation for VECoS is to encourage the cross-fertilization between various formal verification and evaluation approaches, methods and techniques, and especially those developed for concurrent and distributed hardware/software systems.
This volume constitutes the proceedings of the 6th CCF Conference, Big Data 2018, held in Xi'an, China, in October 2018. The 32 revised full papers presented in this volume were carefully reviewed and selected from 880 submissions. The papers are organized in topical sections on natural language processing and text mining; big data analytics and smart computing; big data applications; the application of big data in machine learning; social networks and recommendation systems; parallel computing and storage of big data; data quality control and data governance; big data system and management.
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
This book discusses risk management as it applies to problem-solving for simple, complex and wicked problems faced by policy creators and implementors, project managers and systems engineers in the context of policies, large engineering projects (LEPs), projects and systems. When applying systems thinking to risk management, it can be seen that risk management applies to almost every action taken in daily life. This book: Introduces the systems approach of integrating risk management into policy creation and implementation, project management and systems engineering, such as the risk framework and the Firm Fixed Price (FFP) contract with penalties and bonuses. Introduces a number of out-of-the box concepts building on the application of the systems thinking tools in the system thinker's toolbox. Points out that integrating risk management into policy and project management and systems engineering is just good management and engineering practice. Discusses the flow of risk in a policy from creation through implementation via LEPs and simpler projects, identifying where risks arise and where they should be dealt with. Presents the risks in the relationship between policy creation, implementation, project management and systems engineering. Discusses risks throughout the policy implementation process and shows how the nature of risks changes from political to financial to technological as implementation proceeds. Discusses managing complexity and specifies the minimum number of elements in a system for it to be defined as, and managed as, complex. Points out that in most instances the traditionally ignored major implementation risk is that of poor performance by personnel. Shows how to proactively incorporate prevention into planning in order to prevent risks, as well as how to mitigate them when they occur.
This book (CCIS 899) constitutes the refereed proceedings of the First International Conference on Applications of Computing and Communication Technologies, ICACCT 2018, held in Delhi, India, in March 2018. The 30 full papers were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on communication and system technologies, computing and network technologies, application and services.
This book constitutes the proceedings of the 39th IFIP WG 6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2019, held in Copenhagen, Denmark, in June 2019, as part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019. The 15 full and 3 short papers presented were carefully reviewed and selected from 42 submissions. The conference is dedicated to fundamental research on theory, models, tools, and applications for distributed systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Joint Conference on Software Technologies, ICSOFT 2017, held in Madrid, Spain, in July 2017. The 17 revised full papers and 24 short papers presented were carefully reviewed and selected from 85 submissions. The topics covered in the papers include: software quality and metrics; software testing and maintenance; development methods and models; systems security; dynamic software updates; systems integration; business process modelling; intelligent problem solving; multi-agent systems; and solutions involving big data, the Internet of Things and business intelligence.
This book constitutes the refereed proceedings of the 33rd International Conference, ISC High Performance 2018, held in Frankfurt, Germany, in June 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 81 submissions. The papers cover the following topics: Resource Management and Energy Efficiency; Performance Analysis and Tools; Exascale Networks; Parallel Algorithms.
This book discusses reliability applications for power systems, renewable energy and smart grids and highlights trends in reliable communication, fault-tolerant systems, VLSI system design and embedded systems. Further, it includes chapters on software reliability and other computer engineering and software management-related disciplines, and also examines areas such as big data analytics and ubiquitous computing. Outlining novel, innovative concepts in applied areas of reliability in electrical, electronics and computer engineering disciplines, it is a valuable resource for researchers and practitioners of reliability theory in circuit-based engineering domains.
This book constitutes the refereed proceedings of the 7th Workshop on New Frontiers in Quantitative Methods in Informatics, InfQ 2017, held in Venice, Italy, in December 2017. The 11 revised full papers and the one revised short paper presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on networking and mobile applications; applications of quantitative modeling; big data processing and IoT; theory, methods and tools for quantitative analysis.
This book contains extended versions of the best papers presented at the 13th International Conference on Information and Communication Technologies in Education, Research, and Industrial Applications, ICTERI 2017, held in Kyiv, Ukraine, in May 2017. The 11 revised full papers included in this volume were carefully reviewed and selected from 151 initial submissions during several rounds of reviewing. The papers are organized in the following topical sections: modeling and theoretical frameworks; ICT in teaching, learning, and education management; and ICT evaluation and applications.
The two-volume set LNICST 236-237 constitutes the post-conference proceedings of the 12th EAI International Conference on Communications and Networking, ChinaCom 2017, held in Xi'an, China, in September 2017. The total of 112 contributions presented in these volumes are carefully reviewed and selected from 178 submissions. Aside from the technical paper sessions the book is organized in topical sections on wireless communications and networking, satellite and space communications and networking, big data network track, multimedia communications and smart networking, signal processing and communications, network and information security, advances and trends of V2X networks.
This book constitutes the proceedings of the 18th International Conference on Software and Systems Reuse, ICSR 2019, held in Cincinnati, Ohio, USA in June 2019. The 13 research papers included in this book were carefully reviewed and selected from 32 submissions. In addition, 3 industry innovation papers are included. The papers were organized in topical sections named: software reuse practice; software product line and requirements reuse; reuse and design and evolution; intelligent software reuse; and domain-specific software development.
This book constitutes the refereed proceedings of the 11th International Andrei P. Ershov Informatics Conference, PSI 2017, held in Moscow, Russia, in June 2017. The 31 full papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers cover various topics related to the foundations of program and system development and analysis, programming methodology and software engineering and information technologies.
This book constitutes the refereed proceedings of the 4th International Conference on Tools and Methods for Program Analysis, TMPA 2017, Moscow, Russia, March 3-4, 2017. The 12 revised full papers and 5 revised short papers presented together with three abstracts of keynote talks were carefully reviewed and selected from 51 submissions. The papers deal with topics such as software test automation, static program analysis, verification, dynamic methods of program analysis, testing and analysis of parallel and distributed systems, testing and analysis of high-load and high-availability systems, analysis and verification of hardware and software systems, methods of building quality software, tools for software analysis, testing and verification.
This volume contains a record of some of the lectures and seminars delivered at the Third International School on Engineering Trustworthy Software Systems (SETSS 2017), held in April 2017 at Southwest University in Chongqing, China. The six contributions included in this volume provide an overview of leading-edge research in methods and tools for use in computer system engineering. They have been distilled from six original courses delivered at the school on topics such as: rely/guarantee thinking; Hoare-style specification and verification of object-oriented programs with JML; logic, specification, verification, and interactive proof; software model checking with Automizer; writing programs and proofs; engineering self-adaptive software-intensive systems; and with an additional contribution on the challenges for formal semantic description. The material is useful for postgraduate students, researchers, academics, and industrial engineers, who are interested in the theory and practice of methods and tools for the design and programming of trustworthy software systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Annual Privacy Forum, APF 2018, held in Barcelona, Spain, in June 2018. The 11 revised full papers were carefully reviewed and selected from 49 submissions. The papers are grouped in topical sections named: technical analysis and techniques; privacy implementation; compliance; and legal aspects.
This book constitutes the proceedings of the 15th Asian Symposium on Programming Languages and Systems, APLAS 2017, held in Suzhou, China, in November 2017. The 24 papers presented in this volume were carefully reviewed and selected from 56 submissions. They were organized in topical sections named: security; heap and equivalence reasoning; concurrency and verification; domain-specific languages; semantics; and numerical reasoning. The volume also contains two invited talks in full-paper length.
This book constitutes the proceedings of the 16th International Conference on Information Technologies and Mathematical Modelling, ITMM 2017, held in Kazan, Russia, in September/October 2017. The 31 papers presented in this volume were carefully reviewed and selected from 85 submissions. The conference covers various aspects of mathematical modeling and information technologies, focusing on probabilistic methods and models, queueing theory and communication networks.
This book constitutes the refereed proceedings of the 11th International Conference on Parallel Computational Technologies, PCT 2017, held in Kazan, Russia, in April 2017. The 24 revised full papers presented were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on high performance architectures, tools and technologies; parallel numerical algorithms; supercomputer simulation.
Recognized as an "Optional" title by Choice for their January 2021 issue. Choice is a publishing unit at the Association of College & Research Libraries (ACR&L), a division of the American Library Association. Choice has been the acknowledged leader in the provision of objective, high-quality evaluations of nonfiction academic writing. Success is driven through collaboration. The field of Industrial and Systems Engineering has evolved as a major engineering field with interdisciplinary strength drawn from effective utilization, process improvement, optimization, design, and management of complex systems. It is a broad discipline that is important to nearly every attempt to solve problems facing the needs of society and the welfare of humanity. In order to carry this forward, successful collaborations are needed between industry, government, and academia. This book brings together an international group of distinguished practitioners and academics in manufacturing, healthcare, logistics, and energy sectors to examine what enables successful collaborations. The book is divided into two key parts: 1) partnerships, frameworks, and leadership; and 2) engineering applications and case studies. Part I highlights some of the ways partnerships emerge between those seeking to innovate and educate in industrial and systems engineering, some useful frameworks and methodologies, as well as some of the ideas and practices that undergird leadership in the profession. Part II provides case studies and applications to illustrate the power of the partnerships between academia and practice in industrial and systems engineering. Features Examines the success from multiple industries Provides frameworks for building teams and avoiding pitfalls Contains international perspectives of success Uses collaborative approaches from industry, government, and academia Includes real world case studies illustrating the enabling factors Offers engineering education and student-centric takeaways |
You may like...
Advances in Non-volatile Memory and…
Yoshio Nishi, Blanka Magyari-Kope
Paperback
R4,593
Discovery Miles 45 930
Handbook of Research on 5G Networks and…
Augustine O Nwajana, Isibor Kennedy Ihianle
Hardcover
R7,962
Discovery Miles 79 620
Cases on Lean Thinking Applications in…
Eduardo Guilherme Satolo, Robisom Damasceno Calado
Hardcover
R5,991
Discovery Miles 59 910
Implementing Data Analytics and…
Chintan Bhatt, Neeraj Kumar, …
Hardcover
R5,931
Discovery Miles 59 310
|