Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > General theory of computing > Systems analysis & design
This book constitutes the tutorial lectures of the 5th European Business Intelligence Summer School, eBISS 2015, held in Barcelona, Spain, in July 2015. The tutorials presented here in an extended and refined format were given by renowned experts and cover topics including schema evolution for databases and data warehouses, publishing OLAP cubes on the Semantic Web, design issues in social business intelligence projects, context-aware business intelligence, and key performance indicators in data warehouses.
Written in a unique style, this book is a valuable resource for faculty, graduate students, and researchers in the communications and networking area whose work interfaces with optimization. It teaches you how various optimization methods can be applied to solve complex problems in wireless networks. Each chapter reviews a specific optimization method and then demonstrates how to apply the theory in practice through a detailed case study taken from state-of-the-art research. You will learn various tips and step-by-step instructions for developing optimization models, reformulations, and transformations, particularly in the context of cross-layer optimization problems in wireless networks involving flow routing (network layer), scheduling (link layer), and power control (physical layer). Throughout, a combination of techniques from both operations research and computer science disciplines provides a holistic treatment of optimization methods and their applications. Each chapter includes homework exercises, with PowerPoint slides and a solutions manual for instructors available online.
Best-selling author Wallace Wang teaches you how to use El Capitan, the latest version of the Mac operating system, in everyday situations. This book shows you, the beginner Mac user, how to get up and running, operate, and work day-to-day on your Mac. You will learn how to run applications, manage windows and files, work with the internet, and more. You will even learn how to use your Mac with an iPhone and an Apple watch. If you've ever felt that you couldn't learn how to use a Mac, this is your opportunity to give it a go. What you'll learn How to get up and running with Mac OS X El Capitan How to navigate and manage views How to manage your files What entertainment options are available to you, and how to use them How to maintain your Mac How to work with iPhone and Apple watch. Who This Book Is For Anyone who wants to learn how to use OS X El Capitan. No previous experience is required.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th TPC Technology Conference on Performance Evaluation and Benchmarking, TPSTC 2015, held in conjunction with the 40th International Conference on Very Large Databases (VLDB 2015) in Kohala Coast, Hawaii, USA, in August/September 2015. The 8 papers presented together with 1 keynote, and 1 vision paper were carefully reviewed and selected from 24 submissions. Many buyers use TPC benchmark results as points of comparison when purchasing new computing systems. The information technology landscape is evolving at a rapid pace, challenging industry experts and researchers to develop innovative techniques for evaluation, measurement and characterization of complex systems. The TPC remains committed to developing new benchmark standards to keep pace, and one vehicle for achieving this objective is the sponsorship of the Technology Conference on Performance Evaluation and Benchmarking (TPCTC).
This book constitutes the proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. The 44 full papers presented in this volume were carefully reviewed and selected from 175 submissions. They were organized in topical sections named: abstraction and verification; probabilistic and stochastic systems; synthesis; tool papers; concurrency; tool demos; languages and automata; security; optimization; and competition on software verification - SV-COMP.
New manufacturing technologies have made possible the integration of entire systems on a single chip. This new design paradigm, termed system-on-chip (SOC), together with its associated manufacturing problems, represents a real challenge for designers. SOC is also reshaping approaches to test and validation activities. These are beginning to migrate from the traditional register-transfer or gate levels of abstraction to the system level. Until now, test and validation have not been supported by system-level design tools so designers have lacked the infrastructure to exploit all the benefits stemming from the adoption of the system level of abstraction. Research efforts are already addressing this issue. This monograph provides a state-of-the-art overview of the current validation and test techniques by covering all aspects of the subject including:
This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.
This work presents link prediction similarity measures for social networks that exploit the degree distribution of the networks. In the context of link prediction in dense networks, the text proposes similarity measures based on Markov inequality degree thresholding (MIDTs), which only consider nodes whose degree is above a threshold for a possible link. Also presented are similarity measures based on cliques (CNC, AAC, RAC), which assign extra weight between nodes sharing a greater number of cliques. Additionally, a locally adaptive (LA) similarity measure is proposed that assigns different weights to common nodes based on the degree distribution of the local neighborhood and the degree distribution of the network. In the context of link prediction in dense networks, the text introduces a novel two-phase framework that adds edges to the sparse graph to forma boost graph.
Understand the concepts, processes and technologies that will aid in your professional development as a new system administrator. While every information technology culture is specific to its parent organization, there are commonalities that apply to all organizations. The Accidental SysAdmin Handbook, Second Edition looks at those commonalities and provides a general introduction to critical aspects associated with system administration. It further acts to provide definitions and patterns for common computer terms and acronyms. What You Will Learn Build and manage home networking and plan more complex network environments Manage the network layer and service architectures as well as network support plans Develop a server hardware strategy and understand the physical vs. virtual server ecosystem Handle data storage, data strategies and directory services, and central account management Work with DNS, DHCP, IP v4 and IP v6 Deploy workstations and printers Manage and use antivirus and security management software Build, manage and work with intranets and Internet support services Who This Book Is For It is assumed that the reader has little to no experience in a professional information technology environment.
This book constitutes the refereed proceedings of the 18th International Conference on Distributed and Computer and Communication Networks, DCCN 2015, held in Moscow, Russia, in October 2015. The 38 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS evaluation in wireless networks; modeling and simulation of network protocols; queuing and reliability theory; wireless IEEE 802.11, IEEE 802.15, IEEE 802.16, and UMTS (LTE) networks; FRID technology and its application in intellectual transportation networks; protocols design (MAC, Routing) for centimeter and millimeter wave mesh networks; internet and web applications and services; application integration in distributed information systems; big data in communication networks.
This book constitutes the post-proceedings of the 7th International Conference on Mobile Networks and Management, MONAMI 2015, held in Santander, Spain, in September 2015. The 16 full papers were carefully reviewed and selected from 24 submissions. In addition there appears one short and 5 invited papers. These are organized thematically in five parts starting with Cellular Network Management and Self-Organizing Networks in Part I. Radio Resource Management in LTE and 5G Networks aspects are discussed in Part II. Part III presents novel Techniques and Algorithms for Wireless Networks, while Part IV deals with Video Streaming over Wireless Networks. Part V includes papers presenting avant-garde research on applications and services and, finally, Part VI features two papers introducing novel architectural approaches for Wireless Sensor Networks.
This book constitutes the proceedings of the First International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2015, held in Ohrid, Republic of Macedonia, in September 2015. The 39 revised papers cover the broad areas of future wireless networks, ambient and assisted living, smart infrastructures and security and reflect the fast developing and vibrant penetration of IoT technologies in diverse areas of human live.
Global surveys from McKinsey, BCG, Gartner, and others show that less than 30% of digital transformation programs succeed in their missions to improve a company's performance and employee productivity. This is due to the fact that IT efforts within the company do not center around the employee. This book will provide concrete steps to allow both IT professionals and business leaders to transform the way they deliver IT to employees - with the employee (the human) centered in their transformation. The concepts, models, checklists, and playbook you'll review are based on the author's many years of experience, lessons learned, and proven outcomes. IT organizations want to improve their employee experience but don't know how and this is the "must have" book for those who don't know where to start. More than two-thirds of today's jobs require good digital and IT skills from employees. The expectations of management, who invest in these big digital transformations, is that the employees will become more productive, effective and help the bottom line. However, this can only happen through active and proactive change of IT operations and transformations that center the employee, rather than technology or senior management. This book reveals the benefit of moving towards an approach where employees gain technology aptitude, are up for technology change, and are willing to learn more for their benefit and even provide feedback on ways to improve these tools, trainings and support. You'll see how employee engagement and experience research, concepts, and implementations are growing rapidly across many organizations and taking a key role in their global strategies. Employee-centric IT will transform employees to own their digital literacy and development, and this in turn reduces or even eliminates the shadow IT need and allows the organization to drive and implement successful digital transformation. What You'll Learn Understand the value of being employee-centric in IT departments versus current models Take steps to win IT team's acceptance of the changes needed to achieve employee-centricity Be proactive in providing training & information on digital & productivity tools Who This Book Is ForBusiness leaders, IT and digital leaders as well as IT employees who would like to transform their current IT and Digital teams to be more employee centric and drive highest level of value, adoption and satisfaction for their IT/digital programs, transformations and investment.
Introductory textbook covering all the main features of the 'web programming' languages PHP and MySQL together with detailed examples that will enable readers (whether students on a taught course or independent learners) to use them to create their own applications or understand existing ones. A particular focus is the use of PHP to generate MySQL commands from a script as it is executed. Each chapter includes aims, a summary and practical exercises (with solutions) to support learning. Chapters are designed to stand alone as far as possible, so that they can be studied independently of the rest of the text by those with some previous knowledge of the languages. There is a comprehensive glossary of technical terms, together with extensive appendices for quick reference of language features.
This book constitutes the refereed proceedings fo the 14th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2015, held in Anzhero-Sudzhensk, Russia, in November 2015. The 35 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.
Systems Analysis and Synthesis: Bridging Computer Science and Information Technology presents several new graph-theoretical methods that relate system design to core computer science concepts, and enable correct systems to be synthesized from specifications. Based on material refined in the author's university courses, the book has immediate applicability for working system engineers or recent graduates who understand computer technology, but have the unfamiliar task of applying their knowledge to a real business problem. Starting with a comparison of synthesis and analysis, the book explains the fundamental building blocks of systems-atoms and events-and takes a graph-theoretical approach to database design to encourage a well-designed schema. The author explains how database systems work-useful both when working with a commercial database management system and when hand-crafting data structures-and how events control the way data flows through a system. Later chapters deal with system dynamics and modelling, rule-based systems, user psychology, and project management, to round out readers' ability to understand and solve business problems.
This volume presents selected papers from the International Conference on Reliability, Safety, and Hazard. It presents the latest developments in reliability engineering and probabilistic safety assessment, and brings together contributions from a diverse international community and covers all aspects of safety, reliability, and hazard assessment across a host of interdisciplinary applications. This book will be of interest to researchers in both academia and the industry.
This book describes a model-based development approach for globally-asynchronous locally-synchronous distributed embedded controllers. This approach uses Petri nets as modeling formalism to create platform and network independent models supporting the use of design automation tools. To support this development approach, the Petri nets class in use is extended with time-domains and asynchronous-channels. The authors' approach uses models not only providing a better understanding of the distributed controller and improving the communication among the stakeholders, but also to be ready to support the entire lifecycle, including the simulation, the verification (using model-checking tools), the implementation (relying on automatic code generators), and the deployment of the distributed controller into specific platforms. Uses a graphical and intuitive modeling formalism supported by design automation tools; Enables verification, ensuring that the distributed controller was correctly specified; Provides flexibility in the implementation and maintenance phases to achieve desired constraints (high performance, low power consumption, reduced costs), enabling porting to different platforms using different communication nodes, without changing the underlying behavioral model.
Systems for Online Transaction Processing (OLTP) and Online Analytical Processing (OLAP) are currently separate. The potential of the latest technologies and changes in operational and analytical applications over the last decade have given rise to the unification of these systems, which can be of benefit for both workloads. Research and industry have reacted and prototypes of hybrid database systems are now appearing. Benchmarks are the standard method for evaluating, comparing and supporting the development of new database systems. Because of the separation of OLTP and OLAP systems, existing benchmarks are only focused on one or the other. With the rise of hybrid database systems, benchmarks to assess these systems will be needed as well. Based on the examination of existing benchmarks, a new benchmark for hybrid database systems is introduced in this book. It is furthermore used to determine the effect of adding OLAP to an OLTP workload and is applied to analyze the impact of typically used optimizations in the historically separate OLTP and OLAP domains in mixed-workload scenarios.
Practical Programming in the Cell Broadband Engine offers a unique programming guide for the Cell Broadband Engine, demonstrating a large number of real-life programs to identify and solve problems in engineering, logic design, VLSI CAD, number-theory, graph-theory, computational geometry, image processing, and other subjects. Key features include: Numerous diagrams, mnemonics, tables, charts, code samples for making program development on the CBE as accessible as possible Comprehensive reading list for introductory material to the subject matter A website providing all source codes and sample-data for examples presented in this text.
Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be much broader than that of scientific computing, up to now the main application area for parallel computing. Rauber and Runger take up these recent developments in processor architecture by giving detailed descriptions of parallel programming techniques that are necessary for developing efficient programs for multicore processors as well as for parallel cluster systems and supercomputers. Their book is structured in three main parts, covering all areas of parallel computing: the architecture of parallel systems, parallel programming models and environments, and the implementation of efficient application algorithms. The emphasis lies on parallel programming techniques needed for different architectures. For this second edition, all chapters have been carefully revised. The chapter on architecture of parallel systems has been updated considerably, with a greater emphasis on the architecture of multicore systems and adding new material on the latest developments in computer architecture. Lastly, a completely new chapter on general-purpose GPUs and the corresponding programming techniques has been added. The main goal of the book is to present parallel programming techniques that can be used in many situations for a broad range of application areas and which enable the reader to develop correct and efficient parallel programs. Many examples and exercises are provided to show how to apply the techniques. The book can be used as both a textbook for students and a reference book for professionals. The material presented has been used for courses in parallel programming at different universities for many years.
This book constitutes the refereed proceedings of the 30th International Conference, ISC High Performance 2015, [formerly known as the International Supercomputing Conference] held in Frankfurt, Germany, in July 2015. The 27 revised full papers presented together with 10 short papers were carefully reviewed and selected from 67 submissions. The papers cover the following topics: cost-efficient data centers, scalable applications, advances in algorithms, scientific libraries, programming models, architectures, performance models and analysis, automatic performance optimization, parallel I/O and energy efficiency.
This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book will be of interest to researchers, practitioners, and students to better understand the QoS requirements of CPS, especially for healthcare applications.
Community structure is a salient structural characteristic of many real-world networks. Communities are generally hierarchical, overlapping, multi-scale and coexist with other types of structural regularities of networks. This poses major challenges for conventional methods of community detection. This book will comprehensively introduce the latest advances in community detection, especially the detection of overlapping and hierarchical community structures, the detection of multi-scale communities in heterogeneous networks, and the exploration of multiple types of structural regularities. These advances have been successfully applied to analyze large-scale online social networks, such as Facebook and Twitter. This book provides readers a convenient way to grasp the cutting edge of community detection in complex networks. The thesis on which this book is based was honored with the "Top 100 Excellent Doctoral Dissertations Award" from the Chinese Academy of Sciences and was nominated as the "Outstanding Doctoral Dissertation" by the Chinese Computer Federation.
This proceedings set contains 85 selected full papers presentedat the 3rd International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences - MCO 2015, held on May 11-13, 2015 at Lorraine University, France. The present part II of the 2 volume set includes articles devoted to Data analysis and Data mining, Heuristic / Meta heuristic methods for operational research applications, Optimization applied to surveillance and threat detection, Maintenance and Scheduling, Post Crises banking and eco-finance modelling, Transportation, as well as Technologies and methods for multi-stakeholder decision analysis in public settings. |
You may like...
Handbook of Research on 5G Networks and…
Augustine O Nwajana, Isibor Kennedy Ihianle
Hardcover
R8,415
Discovery Miles 84 150
Computer Systems and Software…
Information Reso Management Association
Hardcover
R9,444
Discovery Miles 94 440
Implementing Data Analytics and…
Chintan Bhatt, Neeraj Kumar, …
Hardcover
R6,256
Discovery Miles 62 560
Cases on Lean Thinking Applications in…
Eduardo Guilherme Satolo, Robisom Damasceno Calado
Hardcover
R6,281
Discovery Miles 62 810
|