0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
Status
Brand

Showing 1 - 25 of 25 matches in All Departments

Distributed System Design (Paperback): Jie Wu Distributed System Design (Paperback)
Jie Wu
R1,928 Discovery Miles 19 280 Ships in 12 - 17 working days

Future requirements for computing speed, system reliability, and cost-effectiveness entail the development of alternative computers to replace the traditional von Neumann organization. As computing networks come into being, one of the latest dreams is now possible - distributed computing. Distributed computing brings transparent access to as much computer power and data as the user needs for accomplishing any given task - simultaneously achieving high performance and reliability. The subject of distributed computing is diverse, and many researchers are investigating various issues concerning the structure of hardware and the design of distributed software. Distributed System Design defines a distributed system as one that looks to its users like an ordinary system, but runs on a set of autonomous processing elements (PEs) where each PE has a separate physical memory space and the message transmission delay is not negligible. With close cooperation among these PEs, the system supports an arbitrary number of processes and dynamic extensions. Distributed System Design outlines the main motivations for building a distributed system, including: inherently distributed applications performance/cost resource sharing flexibility and extendibility availability and fault tolerance scalability Presenting basic concepts, problems, and possible solutions, this reference serves graduate students in distributed system design as well as computer professionals analyzing and designing distributed/open/parallel systems. Chapters discuss: the scope of distributed computing systems general distributed programming languages and a CSP-like distributed control description language (DCDL) expressing parallelism, interprocess communication and synchronization, and fault-tolerant design two approaches describing a distributed system: the time-space view and the interleaving view mutual exclusion and related issues, including election, bidding, and self-stabilization prevention and detection of deadlock reliability, safety, and security as well as various methods of handling node, communication, Byzantine, and software faults efficient interprocessor communication mechanisms as well as these mechanisms without specific constraints, such as adaptiveness, deadlock-freedom, and fault-tolerance virtual channels and virtual networks load distribution problems synchronization of access to shared data while supporting a high degree of concurrency

Mobile Crowdsourcing - From Theory to Practice (1st ed. 2023): Jie Wu, En Wang Mobile Crowdsourcing - From Theory to Practice (1st ed. 2023)
Jie Wu, En Wang
R5,336 Discovery Miles 53 360 Ships in 10 - 15 working days

This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization.  Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computation tasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book.  Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.

Distributed System Design (Hardcover): Jie Wu Distributed System Design (Hardcover)
Jie Wu
R4,630 Discovery Miles 46 300 Ships in 12 - 17 working days

Future requirements for computing speed, system reliability, and cost-effectiveness entail the development of alternative computers to replace the traditional von Neumann organization. As computing networks come into being, one of the latest dreams is now possible - distributed computing.
Distributed computing brings transparent access to as much computer power and data as the user needs for accomplishing any given task - simultaneously achieving high performance and reliability.
The subject of distributed computing is diverse, and many researchers are investigating various issues concerning the structure of hardware and the design of distributed software. Distributed System Design defines a distributed system as one that looks to its users like an ordinary system, but runs on a set of autonomous processing elements (PEs) where each PE has a separate physical memory space and the message transmission delay is not negligible. With close cooperation among these PEs, the system supports an arbitrary number of processes and dynamic extensions.
Distributed System Design outlines the main motivations for building a distributed system, including:
inherently distributed applications
performance/cost
resource sharing
flexibility and extendibility
availability and fault tolerance
scalability
Presenting basic concepts, problems, and possible solutions, this reference serves graduate students in distributed system design as well as computer professionals analyzing and designing distributed/open/parallel systems.
Chapters discuss:
the scope of distributed computing systems
general distributed programming languages and a CSP-like distributed control description language (DCDL)
expressing parallelism, interprocess communication and synchronization, and fault-tolerant design
two approaches describing a distributed system: the time-space view and the interleaving view
mutual exclusion and related issues, including election, bidding, and self-stabilization
prevention and detection of deadlock
reliability, safety, and security as well as various methods of handling node, communication, Byzantine, and software faults
efficient interprocessor communication mechanisms as well as these mechanisms without specific constraints, such as adaptiveness, deadlock-freedom, and fault-tolerance
virtual channels and virtual networks
load distribution problems
synchronization of access to shared data while supporting a high degree of concurrency

Opportunistic Mobile Social Networks (Hardcover): Jie Wu, Yunsheng Wang Opportunistic Mobile Social Networks (Hardcover)
Jie Wu, Yunsheng Wang
R4,041 Discovery Miles 40 410 Ships in 12 - 17 working days

The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support.
The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research.

  • Supplies a systematic study of the constrained information flow problem
  • Reviews the recent literature on social influence in complex social networks
  • Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks
  • Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications
  • Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs

Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange.
The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that involve both node mobility and wireless communication.

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Hardcover): Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Hardcover)
Jie Wu
R5,289 Discovery Miles 52 890 Ships in 12 - 17 working days

The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.

Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021)
Wei Chang, Jie Wu
R4,527 Discovery Miles 45 270 Ships in 10 - 15 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Business Innovation with New ICT in the Asia-Pacific: Case Studies (Paperback, 1st ed. 2021): Michitaka Kosaka, Jie Wu, Ke... Business Innovation with New ICT in the Asia-Pacific: Case Studies (Paperback, 1st ed. 2021)
Michitaka Kosaka, Jie Wu, Ke Xing, Shiyong Zhang
R3,763 Discovery Miles 37 630 Ships in 10 - 15 working days

This book clarifies the direction of business innovation using new ICT such as the Internet of things (IoT), artificial intelligence (AI), smartphones, and cloud computing through a series of case studies on successful trials and advanced businesses in the Asia-Pacific where many industry sectors have been growing successfully in the 21st century. ICT has been playing an important role in value creation for customers and in profit generation for providers, contributing to various service innovation and business innovation. Now, digitalization using IoT and AI provides solutions to address various issues in the human society, which is transforming services and businesses in the 21st century. "What is the direction of the business innovation using new ICT?" is a highly concerned question for business researchers and practitioners. Aiming to answer the question, this book conducts a number of cases studies in the Asia-Pacific region, including the Mainland China, Taiwan, Japan, Malaysia, Vietnam, as well as Australia. Among the studies, there are 4 cases from ICT providers, 4 cases from traditional and services, and 6 cases from new ICT applications and businesses. Each case analyzes social needs and human desires, new value created, roles of new technologies, processes and difficulties in developing new businesses, the relationship among customers, providers, and stakeholders, value chain co-creation and optimization, factors of success, and business models. Finally, the direction of business innovation with new ICT in the Asia-Pacific is suggested by summarizing the findings from the case studies through the lens of the theoretical analysis in service science.

Business Innovation with New ICT in the Asia-Pacific: Case Studies (Hardcover, 1st ed. 2021): Michitaka Kosaka, Jie Wu, Ke... Business Innovation with New ICT in the Asia-Pacific: Case Studies (Hardcover, 1st ed. 2021)
Michitaka Kosaka, Jie Wu, Ke Xing, Shiyong Zhang
R3,795 Discovery Miles 37 950 Ships in 10 - 15 working days

This book clarifies the direction of business innovation using new ICT such as the Internet of things (IoT), artificial intelligence (AI), smartphones, and cloud computing through a series of case studies on successful trials and advanced businesses in the Asia-Pacific where many industry sectors have been growing successfully in the 21st century. ICT has been playing an important role in value creation for customers and in profit generation for providers, contributing to various service innovation and business innovation. Now, digitalization using IoT and AI provides solutions to address various issues in the human society, which is transforming services and businesses in the 21st century. "What is the direction of the business innovation using new ICT?" is a highly concerned question for business researchers and practitioners. Aiming to answer the question, this book conducts a number of cases studies in the Asia-Pacific region, including the Mainland China, Taiwan, Japan, Malaysia, Vietnam, as well as Australia. Among the studies, there are 4 cases from ICT providers, 4 cases from traditional and services, and 6 cases from new ICT applications and businesses. Each case analyzes social needs and human desires, new value created, roles of new technologies, processes and difficulties in developing new businesses, the relationship among customers, providers, and stakeholders, value chain co-creation and optimization, factors of success, and business models. Finally, the direction of business innovation with new ICT in the Asia-Pacific is suggested by summarizing the findings from the case studies through the lens of the theoretical analysis in service science.

Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Paperback): Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (Paperback)
Jie Wu
R1,896 Discovery Miles 18 960 Ships in 12 - 17 working days

The availability of cheaper, faster, and more reliable electronic components has stimulated important advances in computing and communication technologies. Theoretical and algorithmic approaches that address key issues in sensor networks, ad hoc wireless networks, and peer-to-peer networks play a central role in the development of emerging network paradigms. Filling the need for a comprehensive reference on recent developments, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks explores two questions: What are the central technical issues in these SAP networks? What are the possible solutions/tools available to address these issues? The editor brings together information from different research disciplines to initiate a comprehensive technical discussion on theoretical and algorithmic approaches to three related fields: sensor networks, ad hoc wireless networks, and peer-to-peer networks. With chapters written by authorities from Motorola, Bell Lab, and Honeywell, the book examines the theoretical and algorithmic aspects of recent developments and highlights future research challenges. The book's coverage includes theoretical and algorithmic methods and tools such as optimization, computational geometry, graph theory, and combinatorics. Although many books have emerged recently in this area, none of them address all three fields in terms of common issues.

Sulfur Dioxide Insertion Reactions for Organic Synthesis (Paperback, 1st ed. 2017): Danqing Zheng, Jie Wu Sulfur Dioxide Insertion Reactions for Organic Synthesis (Paperback, 1st ed. 2017)
Danqing Zheng, Jie Wu
R1,773 Discovery Miles 17 730 Ships in 10 - 15 working days

This brief summarizes the most commonly used sulfur dioxide surrogates and also shows the diverse reactivities to highlight the advances made in the development of synthetic methods through the insertion of sulfur dioxide. Depending on the nature of the transformation, these reactions are classified into four types: (i) pericyclic reactions; (ii) nucleophilic addition with organometallic reagents; (iii) transition metal catalysis; and (iv) free radical reactions. Highlighting recent advances in the insertion of sulfur dioxide, providing detailed descriptions of the experimental procedures for these valuable reactions, and discussing the remaining challenges in this field, the brief offers an appealing and highly useful guide for a wide readership in organic chemistry and medicinal chemistry from both academia and industry.

Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014,... Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Shiyong Zhang, Ke Xu, Mingwei Xu, Jie Wu, Chengrong Wu, …
R1,511 Discovery Miles 15 110 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third CCF Internet Conference of China, ICoC 2014, held in Shanghai, China, in July 2014. The 10 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers address issues such as software defined network, network security, future Internet architecture, Internet application, network management, network protocols and models, wireless and sensor networks.

Energy-aware Scheduling on Multiprocessor Platforms (Paperback, 2013 ed.): Dawei Li, Jie Wu Energy-aware Scheduling on Multiprocessor Platforms (Paperback, 2013 ed.)
Dawei Li, Jie Wu
R1,711 Discovery Miles 17 110 Ships in 10 - 15 working days

Multiprocessor platforms play important roles in modern computing systems, and appear in various applications, ranging from energy-limited hand-held devices to large data centers. As the performance requirements increase, energy-consumption in these systems also increases significantly. Dynamic Voltage and Frequency Scaling (DVFS), which allows processors to dynamically adjust the supply voltage and the clock frequency to operate on different power/energy levels, is considered an effective way to achieve the goal of energy-saving. This book surveys existing works that have been on energy-aware task scheduling on DVFS multiprocessor platforms. Energy-aware scheduling problems are intrinsically optimization problems, the formulations of which greatly depend on the platform and task models under consideration. Thus, Energy-aware Scheduling on Multiprocessor Platforms covers current research on this topic and classifies existing works according to two key standards, namely, homogeneity/heterogeneity of multi processor platforms and the task types considered. Under this classification, other sub-issues are also included, such as, slack reclamation, fixed/dynamic priority sched uling, partition-based/global scheduling, and application-specific power consumption, etc.

Opportunistic Mobile Social Networks (Paperback): Jie Wu, Yunsheng Wang Opportunistic Mobile Social Networks (Paperback)
Jie Wu, Yunsheng Wang
R1,921 Discovery Miles 19 210 Ships in 12 - 17 working days

The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that

Distributed Computing and Networking - 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010,... Distributed Computing and Networking - 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010, Proceedings (Paperback, Edition.)
Krishna Kant, Sriram V. Pemmaraju, Krishna M. Sivalingam, Jie Wu
R3,036 Discovery Miles 30 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Networking, ICDCN 2010, held in Kolkata, India, during January 3-6, 2010.

There were 169 submissions, 96 to the networking track and 73 to the distributed computing track. After review the committee selected 23 papers for the networking and 21 for the distributed computing track. The topics addressed are network protocol and applications, fault-tolerance and security, sensor networks, distributed algorithms and optimization, peer-to-peer networks and network tracing, parallel and distributed systems, wireless networks, applications and distributed systems, optical, cellular and mobile ad hoc networks, and theory of distributed systems.

Mobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings... Mobile Ad-hoc and Sensor Networks - First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings (Paperback, 2005 ed.)
Xiaohua Jia, Jie Wu, Yanxiang He
R5,133 Discovery Miles 51 330 Ships in 10 - 15 working days

MSN 2005, the First International Conference on Mobile Ad-hoc and Sensor Networks, was held during 13-15 December 2005, in Wuhan, China. The conference provided a forum for researchers and practitioners to exchange research results and share development experiences. MSN 2005 attracted 512 submissions (including the submissions to the Modeling and Security in Next Generation Mobile Information Systems (MSNG) workshop), among which 100 papers were accepted for the conf- ence and 12 papers were accepted for the workshop. We would like to thank the International Program Committee for their valuable time and effort in reviewing the papers. Special thanks go to the conference PC Vi- chairs, Ivan Stojmenovic, Jang-Ping Sheu and Jianzhong Li for their help in ass- bling the International PC and coordinating the review process. We would also like to thank the Workshop Chair, Dongchun Lee, for organizing the workshop. We would like to express our gratitude to the invited speakers, Laxmi Bhuya, Lionel Ni and Taieb Znati, for their insightful speeches. Finally, we would like to thank the Local Organization Chair, Chuanhe Huang, for making all the local - rangements for the conference. December 2005 Xiaohua Jia Jie Wu Yanxiang He Organization Steering Co-chairs Lionel Ni, Hong Kong University of Science and Technology, HKSAR Jinnan Liu, Wuhan University, PRC General Co-chairs Taieb Znati, University of Pittsburgh, USA Yanxiang He, Wuhan University, PRC Program Co-chairs Jie Wu, Florida Atlantic University, USA Xiaohua Jia, City University of Hong Kong, HKSAR Program Vice Chairs

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R3,734 Discovery Miles 37 340 Ships in 12 - 17 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Creating Autonomous Vehicle Systems, Second Edition (Paperback, 2nd Revised edition): Liu Shaoshan, Li Li-yun, Tang Jie, Wu... Creating Autonomous Vehicle Systems, Second Edition (Paperback, 2nd Revised edition)
Liu Shaoshan, Li Li-yun, Tang Jie, Wu Shuang, Gaudiot Jean-Luc
R1,814 Discovery Miles 18 140 Ships in 10 - 15 working days

This book is one of the first technical overviews of autonomous vehicles written for a general computing and engineering audience. The authors share their practical experiences designing autonomous vehicle systems. These systems are complex, consisting of three major subsystems: (1) algorithms for localization, perception, and planning and control; (2) client systems, such as the robotics operating system and hardware platform; and (3) the cloud platform, which includes data storage, simulation, high-definition (HD) mapping, and deep learning model training. The algorithm subsystem extracts meaningful information from sensor raw data to understand its environment and make decisions as to its future actions. The client subsystem integrates these algorithms to meet real-time and reliability requirements. The cloud platform provides offline computing and storage capabilities for autonomous vehicles. Using the cloud platform, new algorithms can be tested so as to update the HD map-in addition to training better recognition, tracking, and decision models. Since the first edition of this book was released, many universities have adopted it in their autonomous driving classes, and the authors received many helpful comments and feedback from readers. Based on this, the second edition was improved by extending and rewriting multiple chapters and adding two commercial test case studies. In addition, a new section entitled "Teaching and Learning from this Book" was added to help instructors better utilize this book in their classes. The second edition captures the latest advances in autonomous driving and that it also presents usable real-world case studies to help readers better understand how to utilize their lessons in commercial autonomous driving projects. This book should be useful to students, researchers, and practitioners alike. Whether you are an undergraduate or a graduate student interested in autonomous driving, you will find herein a comprehensive overview of the whole autonomous vehicle technology stack. If you are an autonomous driving practitioner, the many practical techniques introduced in this book will be of interest to you. Researchers will also find extensive references for an effective, deeper exploration of the various technologies.

New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Paperback): Jie Wu New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Paperback)
Jie Wu
R4,631 Discovery Miles 46 310 Ships in 10 - 15 working days

The methodologies of aesthetic thought have always had a deep, historic foundation and serve as a staple of philosophy. Researchers have begun re-examining the structure and levels of aesthetics by tracing the history of this practice and studying European and Asian traditions. This systematic perspective is an emerging topic of exploration yet requires an appropriate level of research that further investigates the recent discoveries of systemic aesthetics in today's modern world. New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy is an essential reference source that discusses the organic connection between philosophy, mathematics, and aesthetics, as well as its application to other fields of human sciences. This book analyzes the history of aesthetics and studies the contemporary laws and function of beauty and nature. Featuring research on topics such as fundamental principles, mathematical methods, and humanistic logic, this book is ideally designed for philosophers, physicians, scientific researchers, mathematicians, systems engineers, complexity professionals, anthropologists, art designers, academicians, and students seeking coverage on the structure of artistic beauty through a systematic approach.

The New Progress in Cancer Treatment (Paperback): Xu Xu Bin Ze Jie Wu The New Progress in Cancer Treatment (Paperback)
Xu Xu Bin Ze Jie Wu
R965 Discovery Miles 9 650 Ships in 10 - 15 working days
Condense Wisdom and Conquer Cancer for the Benefit of Mankind (Paperback): Xu Xu Bin Ze Jie Wu Condense Wisdom and Conquer Cancer for the Benefit of Mankind (Paperback)
Xu Xu Bin Ze Jie Wu
R1,228 Discovery Miles 12 280 Ships in 10 - 15 working days
Swim to That Dream! (Paperback): Jie Wu Swim to That Dream! (Paperback)
Jie Wu
R364 Discovery Miles 3 640 Ships in 10 - 15 working days
Improve Customer Satisfaction in a Structural Way (Paperback): Jie Wu Improve Customer Satisfaction in a Structural Way (Paperback)
Jie Wu
R1,292 Discovery Miles 12 920 Ships in 10 - 15 working days

Business excellence is all about enabling the organization to give the customer what he wants when he wants it, everywhere, every time, but profitably. Customer service intelligence is supporting this business to transform the company into more efficient and effective regarding all areas of operational and process intelligence on the way to "Most Highly Regarded Service Company." These challenges are ahead of the service company. Based on extensive research and rich with vivid example of T-Mobile Netherlands, this book helps company identify the true customer needs and what the customer really values, putting the right measures behind it, and executing against these measures in excellence. It also makes management aware of the complexity of measuring customer satisfaction and tremendous impact due to the key performance indicators. This leads to an introduction of a brand new performance planning tool that is very likely to benefit mobile phone companies in after-sales activities, or any corporation that may be considering engaging the customer experience in a continuous-improvement process for marketing efforts.

Combinatorial And Toric Homotopy: Introductory Lectures (Hardcover): Alastair Darby, Jelena Grbic, Zhi Lu, Jie Wu Combinatorial And Toric Homotopy: Introductory Lectures (Hardcover)
Alastair Darby, Jelena Grbic, Zhi Lu, Jie Wu
R4,470 Discovery Miles 44 700 Ships in 10 - 15 working days

This volume consists of introductory lectures on the topics in the new and rapidly developing area of toric homotopy theory, and its applications to the current research in configuration spaces and braids, as well as to more applicable mathematics such as fr-codes and robot motion planning.The book starts intertwining homotopy theoretical and combinatorial ideas within the remits of toric topology and illustrates an attempt to classify in a combinatorial way polytopes known as fullerenes, which are important objects in quantum physics, quantum chemistry and nanotechnology. Toric homotopy theory is then introduced as a further development of toric topology, which describes properties of Davis-Januszkiewicz spaces, moment-angle complexes and their generalizations to polyhedral products. The book also displays the current research on configuration spaces, braids, the theory of limits over the category of presentations and the theory of fr-codes. As an application to robotics, the book surveys topological problems relevant to the motion planning problem of robotics and includes new results and constructions, which enrich the emerging area of topological robotics.The book is at research entry level addressing the core components in homotopy theory and their important applications in the sciences and thus suitable for advanced undergraduate and graduate students.

Braids: Introductory Lectures On Braids, Configurations And Their Applications (Hardcover): A. Jon Berrick, Fred Cohen,... Braids: Introductory Lectures On Braids, Configurations And Their Applications (Hardcover)
A. Jon Berrick, Fred Cohen, Elizabeth Hanbury, Yan-Loi Wong, Jie Wu
R4,031 Discovery Miles 40 310 Ships in 10 - 15 working days

This book is an indispensable guide for anyone seeking to familarize themselves with research in braid groups, configuration spaces and their applications. Starting at the beginning, and assuming only basic topology and group theory, the volume's noted expositors take the reader through the fundamental theory and on to current research and applications in fields as varied as astrophysics, cryptography and robotics. As leading researchers themselves, the authors write enthusiastically about their topics, and include many striking illustrations. The chapters have their origins in tutorials given at a Summer School on Braids, at the National University of Singapore's Institute for Mathematical Sciences in June 2007, to an audience of more than thirty international graduate students.

New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Hardcover): Jie Wu New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy (Hardcover)
Jie Wu
R5,966 Discovery Miles 59 660 Ships in 10 - 15 working days

The methodologies of aesthetic thought have always had a deep, historic foundation and serve as a staple of philosophy. Researchers have begun re-examining the structure and levels of aesthetics by tracing the history of this practice and studying European and Asian traditions. This systematic perspective is an emerging topic of exploration yet requires an appropriate level of research that further investigates the recent discoveries of systemic aesthetics in today's modern world. New Aesthetic Thought, Methodology, and Structure of Systemic Philosophy is an essential reference source that discusses the organic connection between philosophy, mathematics, and aesthetics, as well as its application to other fields of human sciences. This book analyzes the history of aesthetics and studies the contemporary laws and function of beauty and nature. Featuring research on topics such as fundamental principles, mathematical methods, and humanistic logic, this book is ideally designed for philosophers, physicians, scientific researchers, mathematicians, systems engineers, complexity professionals, anthropologists, art designers, academicians, and students seeking coverage on the structure of artistic beauty through a systematic approach.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Seven Worlds, One Planet
David Attenborough DVD R66 Discovery Miles 660
Baby Dove Body Wash 400ml
R87 Discovery Miles 870
Nuovo All-In-One Car Seat (Black)
R3,599 R3,020 Discovery Miles 30 200
Kendall Office Chair (Green)
 (1)
R1,699 R1,346 Discovery Miles 13 460
Multi Colour Jungle Stripe Neckerchief
R119 Discovery Miles 1 190
Bibby's - More Good Food
Dianne Bibby Hardcover R480 R340 Discovery Miles 3 400
Bantex A4 PVC Heavy Duty Opaque Slip-On…
R9 R5 Discovery Miles 50
Professor Snape Wizard Wand - In…
 (8)
R832 Discovery Miles 8 320
Dare To Believe - Why I Could Not Stay…
Mmusi Maimane Paperback R350 R249 Discovery Miles 2 490
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300

 

Partners