Filter
(found 1235 products)
Book cover image
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations ...
People Over Process: Leadership for Agility
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations in creating successful lean and agile development environments. But, beyond the principles of facilitative leadership for agility, People over Process provides tips and demonstrative scenes for the more important and common software meetings: architecture simulations, project planning, team configurations, retrospectives, and more. The author fully illustrates the principles and shares proven techniques for the most important leadership events in agile projects. While this book focuses on facilitating extraordinarily well-prepared meetings, it serves as a metaphor for leadership more broadly. The leader's obligation to help their team make rigorous fact-based decisions; to gain broad input and have participants aligned on the outcomes and next steps; and to do so in an efficient way that respects the time of the participants is as relevant to every-day leadership activity as it is to conducting meetings. The author mixes background and explanation with demonstration -- in this case, the story of an agile project at the fictitious Pacifica Bank. The scenario constructed at Pacifica illustrates the concepts of effective leadership and productive workplace environments. The book concentrates on the flow of software from understanding what is needed through design, development, testing, and deployment. Essentially, the author provides a simple and powerful model of leadership, examples, and tips. This is not a cookbook on how to lead -- It is a set of principles and examples. All leaders must find their own way for their team, their organization, and their unique challenges.
https://magrudy-assets.storage.googleapis.com/9780367341886.jpg
50.19 USD

People Over Process: Leadership for Agility

by Michael K. Levine
Paperback / softback
Book cover image
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to ...
Intelligent Technologies for Web Applications
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to focus on providing vital fundamental and advanced guidance in the area of Web intelligence for beginners and researchers. The book covers techniques from diverse areas of research, including: Natural language processing Information extraction, retrieval, and filtering Knowledge representation and management Machine learning Databases Data, web, and text mining Human-computer interaction Semantic web technologies To develop effective and intelligent web applications and services, it is critical to discover useful knowledge through analyzing large amounts of content, hidden content structures, or usage patterns of web data resources. Intended to improve and reinforce problem-solving methods in this area, this book delves into the hybridization of artificial intelligence (AI) and web technologies to help simplify complex Web operations. It introduces readers to the state-of-the art development of web intelligence techniques and teaches how to apply these techniques to develop the next generation of intelligent Web applications. The book lays out presented projects, case studies, and innovative ideas, which readers can explore independently as standalone research projects. This material facilitates experimentation with the book's content by including fundamental tools, research directions, practice questions, and additional reading.
https://magrudy-assets.storage.googleapis.com/9780367381363.jpg
78.700000 USD

Intelligent Technologies for Web Applications

by Rajendra Akerkar, Priti Srinivas Sajja
Paperback / softback
Book cover image
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia ...
Advances in Mobile Cloud Computing Systems
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chapters from leading experts in this field cover different aspects of modeling, analysis, design, optimization, and architecture of mobile cloud computing systems. Advances in Mobile Cloud Computing Systems begins by discussing the background, features, and available service models of mobile cloud computing. It goes on to describe a mobile cloud computing system with several third party cloud mobile media (CMM) services that offers its services to a telecom operator. In this scenario, the telecom operator acts as broker that can mix and interchange the resources offered by the different CMM service providers. Subsequent contributed chapters discuss such key research areas as Energy-efficient task execution that reduces the energy consumption in both mobile devices and the cloud Design and architecture of a Proximity Cloud that delivers low-latency, bandwidth-efficient end-user services with a global footprint Virtual mobile networks in clouds that enable resource sharing between multiple mobile network operators Software piracy control framework in mobile cloud computing systems designed to prevent mobile application piracy Dynamic configuration of cloud radio access networks (C-RANs) to improve end-to-end TCP throughput performance in next generation wireless networks The book includes many supporting illustrations and tables along with
https://magrudy-assets.storage.googleapis.com/9780367377182.jpg
78.700000 USD

Advances in Mobile Cloud Computing Systems

Paperback / softback
Book cover image
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to ...
Project Management Tools and Techniques for Success
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to project management that compares and contrasts the stages of poor management with those of effective management. Because change is inherent in virtually all projects, the text outlines the human effects of change and suggests ways to mitigate these effects. It addresses team dynamics, sourcing alternatives, motivating the team, managing expectations, assessing risk, and defining and prioritizing project requirements. The book translates difficult concepts into practical applications with a case study that examines the merger of two companies, along with the subsequent development of a new corporate headquarters. By adding a layer of statistical methods and tools to the front-end of a project, Design for Six Sigma (DFSS) augments standard Six Sigma processes to help ensure project results meet customers' needs and that delays caused by new requirements or rework after implementation are eliminated or reduced. The book explains how to effectively incorporate DFSS tools to reduce the possibility of failure in your next project. Clearly illustrating effective project management practices, the book includes a listing of commonly used acronyms, suggestions for additional reading, along with instructions on how to create four of the most important tools discussed in the book.
https://magrudy-assets.storage.googleapis.com/9780367384036.jpg
78.700000 USD
Paperback / softback
Book cover image
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and ...
Digital Afterlife: Death Matters in a Digital Age
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and the wide-ranging issues that relate to this. The book covers a variety of matters which have been neglected in other research texts, for example: The legal, ethical and philosophical conundrums of digital afterlife. The ways digital media are currently being used to expand the possibilities of commemorating the dead and managing the grief of those left behind. Our lives are shaped by and shape the creation of our Digital Afterlife as the digital has become a taken for granted aspect of human experience. This book will be of interest to undergraduates from computing, theology, business studies, philosophy, psychology, sociology and education from all types of institutions. Secondary audiences include researchers and postgraduate researchers with an interest in the digital. At a practical level, cost of data storage, changing data storage systems mitigate the likelihood of our digital presence existing in perpetuity. Whether we create accidental or intentional digital memories this has psychological consequences for ourselves and for society. Essentially the foreverness of forever is in question. Maggi Savin-Baden is Professor of Higher Education Research at the University of Worcester. She has a strong publication record of over 50 research publications and 17 books. Victoria Mason-Robbie is a Chartered Psychologist and an experienced lecturer having worked in the Higher Education sector for over 15 years. Her current research focuses on evaluating web-based avatars, pedagogical agents, and virtual humans. For more information, please visit the author's website.
70.65 USD

Digital Afterlife: Death Matters in a Digital Age

Paperback / softback
Book cover image
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a ...
Embedded Software Development for Safety-Critical Systems, Second Edition
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a product that must satisfy one or more of the international standards relating to safety-critical applications, including IEC 61508, ISO 26262, EN 50128, EN 50657, IEC 62304, or related standards. Of the first edition, Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com said, I highly recommend Mr. Hobbs' book.
https://magrudy-assets.storage.googleapis.com/9780367338855.jpg
115.28 USD

Embedded Software Development for Safety-Critical Systems, Second Edition

by Chris Hobbs
Paperback / softback
Book cover image
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages ...
Introduction to Software for Chemical Engineers, Second Edition
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages for chemical engineering applications. It covers a range of software applications from Excel and general mathematical packages such as MATLAB and MathCAD to process simulators, CHEMCAD and ASPEN, equation-based modeling languages, gProms, optimization software such as GAMS and AIMS, and specialized software like CFD or DEM codes. The different packages are introduced and applied to solve typical problems in fluid mechanics, heat and mass transfer, mass and energy balances, unit operations, reactor engineering, process and equipment design and control. This new edition offers a wider view of packages including open source software such as R, Python and Julia. It also includes complete examples in ASPEN Plus, adds ANSYS Fluent to CFD codes, Lingo to the optimization packages, and discusses Engineering Equation Solver. It offers a global idea of the capabilities of the software used in the chemical engineering field and provides examples for solving real-world problems. Written by leading experts, this book is a must-have reference for chemical engineers looking to grow in their careers through the use of new and improving computer software. Its user-friendly approach to simulation and optimization as well as its example-based presentation of the software, makes it a perfect teaching tool for both undergraduate and master levels.
https://magrudy-assets.storage.googleapis.com/9781138324213.jpg
139.46 USD

Introduction to Software for Chemical Engineers, Second Edition

Paperback / softback
Book cover image
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous ...
Anonymous Communication Networks: Protecting Privacy on the Web
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities. The book explores various anonymous communication networks as possible solutions to Internet privacy concerns-making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks. Details helpful tips for optimizing onion routing Defines and classifies mixed networks Illustrates the application of a mixed network to e-voting with a case study Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
https://magrudy-assets.storage.googleapis.com/9780367378738.jpg
78.700000 USD
Paperback / softback
Book cover image
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of ...
Enhancing Computer Security with Smart Technology
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.
https://magrudy-assets.storage.googleapis.com/9780367391720.jpg
78.700000 USD
Paperback / softback
Book cover image
This unique text/reference reviews the key principles and techniques in conceptual modelling which are of relevance to specialists in the field of cultural heritage. Information modelling tasks are a vital aspect of work and study in such disciplines as archaeology, anthropology, history, and architecture. Yet the concepts and methods behind ...
Information Modelling for Archaeology and Anthropology: Software Engineering Principles for Cultural Heritage
This unique text/reference reviews the key principles and techniques in conceptual modelling which are of relevance to specialists in the field of cultural heritage. Information modelling tasks are a vital aspect of work and study in such disciplines as archaeology, anthropology, history, and architecture. Yet the concepts and methods behind information modelling are rarely covered by the training in cultural heritage-related fields. With the increasing popularity of the digital humanities, and the rapidly growing need to manage large and complex datasets, the importance of information modelling in cultural heritage is greater than ever before. To address this need, this book serves in the place of a course on software engineering, assuming no previous knowledge of the field. Topics and features: Presents a general philosophical introduction to conceptual modelling Introduces the basics of conceptual modelling, using the ConML language as an infrastructure Reviews advanced modelling techniques relating to issues of vagueness, temporality and subjectivity, in addition to such topics as metainformation and feature redefinition Proposes an ontology for cultural heritage supported by the Cultural Heritage Abstract Reference Model (CHARM), to enable the easy construction of conceptual models Describes various usage scenarios and applications of cultural heritage modelling, offering practical tips on how to use different techniques to solve real-world problems This interdisciplinary work is an essential primer for tutors and students (at both undergraduate and graduate level) in any area related to cultural heritage, including archaeology, anthropology, art, history, architecture, or literature. Cultural heritage managers, researchers, and professionals will also find this to be a valuable reference, as will anyone involved in database design, data management, or the conceptualization of cultural heritage in general. Dr. Cesar Gonzalez-Perez is a Staff Scientist at the Institute of Heritage Sciences (Incipit), within the Spanish National Research Council (CSIC), Santiago de Compostela, Spain.
https://magrudy-assets.storage.googleapis.com/9783319891934.jpg
73.490000 USD

Information Modelling for Archaeology and Anthropology: Software Engineering Principles for Cultural Heritage

by Cesar Gonzalez-Perez
Paperback / softback
Book cover image
Software maintenance work is often considered a dauntingly rigid activity - this book proves the opposite: it demands high levels of creativity and thinking outside the box. Highlighting the creative aspects of software maintenance and combining analytical and systems thinking in a holistic manner, the book motivates readers not to ...
Unraveling Software Maintenance and Evolution: Thinking Outside the Box
Software maintenance work is often considered a dauntingly rigid activity - this book proves the opposite: it demands high levels of creativity and thinking outside the box. Highlighting the creative aspects of software maintenance and combining analytical and systems thinking in a holistic manner, the book motivates readers not to blithely follow the beaten tracks of technical rationality . It delivers the content in a pragmatic fashion using case studies which are woven into long running story lines. The book is organized in four parts, which can be read in any order, except for the first chapter, which introduces software maintenance and evolution and presents a number of case studies of software failures. The Introduction to Key Concepts briefly introduces the major elements of software maintenance by highlighting various core concepts that are vital in order to see the forest for the trees. Each such concept is illustrated with a worked example. Next, the Forward Engineering part debunks the myth that being fast and successful during initial development is all that matters. To this end, two categories of forward engineering are considered: an inept initial project with a multitude of hard evolutionary phases and an effective initial project with multiple straightforward future increments. Reengineering and Reverse Engineering shows the difficulties of dealing with a typical legacy system, and tackles tasks such as retrofitting tests, documenting a system, restructuring a system to make it amenable for further improvements, etc. Lastly, the DevOps section focuses on the importance and benefits of crossing the development versus operation chasm and demonstrates how the DevOps paradigm can turn a loosely coupled design into a loosely deployable solution. The book is a valuable resource for readers familiar with the Java programming language, and with a basic understanding and/or experience of software construction and testing. Packed with examples for every elaborated concept, it offers complementary material for existing courses and is useful for students and professionals alike.
https://magrudy-assets.storage.googleapis.com/9783319890609.jpg
57.740000 USD

Unraveling Software Maintenance and Evolution: Thinking Outside the Box

by Ervin Varga
Paperback / softback
Book cover image
This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, ...
String Analysis for Software Verification and Security
This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis. String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.
https://magrudy-assets.storage.googleapis.com/9783319886374.jpg
78.740000 USD

String Analysis for Software Verification and Security

by Abdulbaki Aydin, Muath Alkhalaf, Fang Yu, Tevfik Bultan
Paperback / softback
Book cover image
This book is written for anyone who is interested in how a field of research evolves and the fundamental role of understanding uncertainties involved in different levels of analysis, ranging from macroscopic views to meso- and microscopic ones. We introduce a series of computational and visual analytic techniques, from research ...
Representing Scientific Knowledge: The Role of Uncertainty
This book is written for anyone who is interested in how a field of research evolves and the fundamental role of understanding uncertainties involved in different levels of analysis, ranging from macroscopic views to meso- and microscopic ones. We introduce a series of computational and visual analytic techniques, from research areas such as text mining, deep learning, information visualization and science mapping, such that readers can apply these tools to the study of a subject matter of their choice. In addition, we set the diverse set of methods in an integrative context, that draws upon insights from philosophical, sociological, and evolutionary theories of what drives the advances of science, such that the readers of the book can guide their own research with their enriched theoretical foundations. Scientific knowledge is complex. A subject matter is typically built on its own set of concepts, theories, methodologies and findings, discovered by generations of researchers and practitioners. Scientific knowledge, as known to the scientific community as a whole, experiences constant changes. Some changes are long-lasting, whereas others may be short lived. How can we keep abreast of the state of the art as science advances? How can we effectively and precisely convey the status of the current science to the general public as well as scientists across different disciplines? The study of scientific knowledge in general has been overwhelmingly focused on scientific knowledge per se. In contrast, the status of scientific knowledge at various levels of granularity has been largely overlooked. This book aims to highlight the role of uncertainties, in developing a better understanding of the status of scientific knowledge at a particular time, and how its status evolves over the course of the development of research. Furthermore, we demonstrate how the knowledge of the types of uncertainties associated with scientific claims serves as an integral and critical part of our domain expertise.
https://magrudy-assets.storage.googleapis.com/9783319873367.jpg
83.990000 USD

Representing Scientific Knowledge: The Role of Uncertainty

by Min Song, Chaomei Chen
Paperback / softback
Book cover image
The safety case (SC) is one of the railway industry's most important deliverables for creating confidence in their systems. This is the first book on how to write an SC, based on the standard EN 50129:2003. Experience has shown that preparing and understanding an SC is difficult and time consuming, ...
The Agile Safety Case
The safety case (SC) is one of the railway industry's most important deliverables for creating confidence in their systems. This is the first book on how to write an SC, based on the standard EN 50129:2003. Experience has shown that preparing and understanding an SC is difficult and time consuming, and as such the book provides insights that enhance the training for writing an SC. The book discusses both regular safety cases and agile safety cases, which avoid too much documentation, improve communication between the stakeholders, allow quicker approval of the system, and which are important in the light of rapidly changing technology. In addition, it discusses the necessity of frequently updating software due to market requirements, changes in requirements and increased cyber-security threats. After a general introduction to SCs and agile thinking in chapter 1, chapter 2 describes the majority of the roles that are relevant when developing railway-signaling systems. Next, chapter 3 provides information related to the assessment of signaling systems, to certifications based on IEC 61508 and to the authorization of signaling systems. Chapter 4 then explains how an agile safety plan satisfying the requirements given in EN 50126-1:1999 can be developed, while chapter 5 provides a brief introduction to safety case patterns and notations. Lastly, chapter 6 combines all this and describes how an (agile) SC can be developed and what it should include. To ensure that infrastructure managers, suppliers, consultants and others can take full advantage of the agile mind-set, the book includes concrete examples and presents relevant agile practices. Although the scope of the book is limited to signaling systems, the basic foundations for (agile) SCs are clearly described so that they can also be applied in other cases.
https://magrudy-assets.storage.googleapis.com/9783319889122.jpg
57.740000 USD

The Agile Safety Case

by Tor Stalhane, Thor Myklebust
Paperback / softback
Book cover image
This book provides readers with an in-depth discussion of circuit simulation, combining basic electrical engineering circuit theory with Python programming. It fills an information gap by describing the development of Python Power Electronics, an open-source software for simulating circuits, and demonstrating its use in a sample circuit. Unlike typical books ...
Simulating Nonlinear Circuits with Python Power Electronics: An Open-Source Simulator, Based on Python (TM)
This book provides readers with an in-depth discussion of circuit simulation, combining basic electrical engineering circuit theory with Python programming. It fills an information gap by describing the development of Python Power Electronics, an open-source software for simulating circuits, and demonstrating its use in a sample circuit. Unlike typical books on circuit theory that describe how circuits can be solved mathematically, followed by examples of simulating circuits using specific, commercial software, this book has a different approach and focus. The author begins by describing every aspect of the open-source software, in the context of non-linear power electronic circuits, as a foundation for aspiring or practicing engineers to embark on further development of open source software for different purposes. By demonstrating explicitly the operation of the software through algorithms, this book brings together the fields of electrical engineering and software technology.
https://magrudy-assets.storage.googleapis.com/9783319892658.jpg
146.990000 USD

Simulating Nonlinear Circuits with Python Power Electronics: An Open-Source Simulator, Based on Python (TM)

by Shivkumar V. Iyer
Paperback / softback
Book cover image
Genetic programming (GP) is a popular heuristic methodology of program synthesis with origins in evolutionary computation. In this generate-and-test approach, candidate programs are iteratively produced and evaluated. The latter involves running programs on tests, where they exhibit complex behaviors reflected in changes of variables, registers, or memory. That behavior not ...
Behavioral Program Synthesis with Genetic Programming
Genetic programming (GP) is a popular heuristic methodology of program synthesis with origins in evolutionary computation. In this generate-and-test approach, candidate programs are iteratively produced and evaluated. The latter involves running programs on tests, where they exhibit complex behaviors reflected in changes of variables, registers, or memory. That behavior not only ultimately determines program output, but may also reveal its `hidden qualities' and important characteristics of the considered synthesis problem. However, the conventional GP is oblivious to most of that information and usually cares only about the number of tests passed by a program. This `evaluation bottleneck' leaves search algorithm underinformed about the actual and potential qualities of candidate programs. This book proposes behavioral program synthesis, a conceptual framework that opens GP to detailed information on program behavior in order to make program synthesis more efficient. Several existing and novel mechanisms subscribing to that perspective to varying extent are presented and discussed, including implicit fitness sharing, semantic GP, co-solvability, trace convergence analysis, pattern-guided program synthesis, and behavioral archives of subprograms. The framework involves several concepts that are new to GP, including execution record, combined trace, and search driver, a generalization of objective function. Empirical evidence gathered in several presented experiments clearly demonstrates the usefulness of behavioral approach. The book contains also an extensive discussion of implications of the behavioral perspective for program synthesis and beyond.
https://magrudy-assets.storage.googleapis.com/9783319801711.jpg
157.490000 USD

Behavioral Program Synthesis with Genetic Programming

by Krzysztof Krawiec
Paperback / softback
Book cover image
This book explores how agile development practices, in particular pair programming, code review and automated testing, help software development teams to perform better. Agile software engineering has become the standard software development paradigm over the last decade, and the insights provided here are taken from a large-scale survey of 80 ...
Agile Software Development Teams
This book explores how agile development practices, in particular pair programming, code review and automated testing, help software development teams to perform better. Agile software engineering has become the standard software development paradigm over the last decade, and the insights provided here are taken from a large-scale survey of 80 professional software development teams working at SAP SE in Germany. In addition, the book introduces a novel measurement tool for assessing the performance of software development teams. No previous study has researched this topic with a similar data set comprising insights from more than 450 professional software engineers.
https://magrudy-assets.storage.googleapis.com/9783319798851.jpg
125.990000 USD

Agile Software Development Teams

by Christoph Schmidt
Paperback / softback
Book cover image
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes ...
Project Management of Large Software-Intensive Systems
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes people, policies, constraints, regulations, and a myriad of other factors. It focuses on how to seamlessly integrate systems, satisfy the customer's requirements, and deliver within the budget and on time. The guide is essentially a shopping list of all the activities that could be conducted with tailoring guidelines to meet the needs of each project.
https://magrudy-assets.storage.googleapis.com/9780367136710.jpg
139.46 USD

Project Management of Large Software-Intensive Systems

by Marvin Gechman
Paperback / softback
Book cover image
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. The authors first show how the system software interacts with the hardware to tolerate faults. They analyze and further develop the theory of ...
Software Design for Resilient Computer Systems
This book addresses the question of how system software should be designed to account for faults, and which fault tolerance features it should provide for highest reliability. The authors first show how the system software interacts with the hardware to tolerate faults. They analyze and further develop the theory of fault tolerance to understand the different ways to increase the reliability of a system, with special attention on the role of system software in this process. They further develop the general algorithm of fault tolerance (GAFT) with its three main processes: hardware checking, preparation for recovery, and the recovery procedure. For each of the three processes, they analyze the requirements and properties theoretically and give possible implementation scenarios and system software support required. Based on the theoretical results, the authors derive an Oberon-based programming language with direct support of the three processes of GAFT. In the last part of this book, they introduce a simulator, using it as a proof of concept implementation of a novel fault tolerant processor architecture (ERRIC) and its newly developed runtime system feature-wise and performance-wise. The content applies to industries such as military, aviation, intensive health care, industrial control, space exploration, etc.
https://magrudy-assets.storage.googleapis.com/9783319805795.jpg
157.490000 USD

Software Design for Resilient Computer Systems

by Kaegi Thomas, Igor Schagaev
Paperback / softback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
71.350000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
This book is an excellent, helpful and up-to-date resource for all candidates preparing for the ISTQB Foundation Level certification exam based on the new Foundation Level 2018 Syllabus. Although there are plenty of sample questions and information related to the Foundation Level exam on the web, there are two problems ...
A Study Guide to the ISTQB (R) Foundation Level 2018 Syllabus: Test Techniques and Sample Mock Exams
This book is an excellent, helpful and up-to-date resource for all candidates preparing for the ISTQB Foundation Level certification exam based on the new Foundation Level 2018 Syllabus. Although there are plenty of sample questions and information related to the Foundation Level exam on the web, there are two problems with these: Firstly, most of them will soon be outdated, as the old syllabus and exams are going to be retracted in June 2019. Secondly, much of what is available is of poor quality, since many of the sample questions do not follow the strict ISTQB examination rules. This book stands out from other ISTQB-related works through a number of special features: Topicality: The material complies with the latest version of the Foundation Level syllabus published in 2018. Quality and originality: The exam questions are original, not redundant, of high quality, fully aligned with the ISTQB exam requirements and have not been published before. Huge amount of material: It includes 5 full sample exams (200 questions in total) designed in accordance with the ISTQB exam rules, and with the appropriate distribution of questions regarding the learning objectives and K-levels. Well-thought-out sample questions: The questions not only appropriately cover the corresponding learning objectives (LOs), but also to show the typical pitfalls. Diversity: The questions from various sample exams related to the same LO are diversified, that is, each of them points out different aspects of a given LO. This is an excellent method for better and more effective learning and preparing for the exam. Comprehensive, intelligible explanations: All answers are justified and there are detailed and easy-to-understand explanations not only of why a given answer is correct, but also why all the others are wrong. A lot of bonus material: The book includes a great bonus pack: chapters that explain the white-box and black-box test techniques in a detailed way, a set of exercises on test techniques and the detailed solutions to them, and much more.
https://magrudy-assets.storage.googleapis.com/9783319987392.jpg
83.66 USD

A Study Guide to the ISTQB (R) Foundation Level 2018 Syllabus: Test Techniques and Sample Mock Exams

by Adam Roman
Paperback / softback
Book cover image
This brief provides a complete yet concise description of modern dive computers and their operations to date in one source with coupled applications for added understanding. Basic diving principles are detailed with practical computer implementations. Interrelated topics to diving protocols and operational procedures are included. Tests, statistics and correlations of ...
Understanding Modern Dive Computers and Operation: Protocols, Models, Tests, Data, Risk and Applications
This brief provides a complete yet concise description of modern dive computers and their operations to date in one source with coupled applications for added understanding. Basic diving principles are detailed with practical computer implementations. Interrelated topics to diving protocols and operational procedures are included. Tests, statistics and correlations of computer models with data are underscored. The exposition also links phase mechanics to dissolved gases in modern decompression theory with mathematical relationships and equations used in dive computer synthesis. Applications focus upon and mimic dive computer operations within model implementations for added understanding. This comprehensive resource includes a complete list of dive computers that are marketed and their staging models, as well as a complete list of diveware marketed and their staging algorithms, linkage of pertinent wet and dry tests to modern computer algorithms, a description of two basic computer models with all constants and parameters, mathematical ansatz of on-the-fly risk for surfacing at any dive depth, detailing of statistical techniques used to validate dive computers from data, and a description of profile Data Banks for computer dive model correlations. The book will find an audience amongst computer scientists, doctors, underwater researchers, engineers, physical and biosciences diving professionals, explorers, chamber technicians, physiologists and technical and recreational divers.
https://magrudy-assets.storage.googleapis.com/9783319940533.jpg
73.490000 USD

Understanding Modern Dive Computers and Operation: Protocols, Models, Tests, Data, Risk and Applications

by T. R. O'Leary, B R Wienke
Paperback / softback
Book cover image
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a ...
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.
https://magrudy-assets.storage.googleapis.com/9781138374539.jpg
77.650000 USD

Developing and Securing the Cloud

by Bhavani Thuraisingham
Paperback / softback
Book cover image
The book at hand gives an overview of the state of the art research in Computational Sustainability as well as case studies of different application scenarios. This covers topics such as renewable energy supply, energy storage and e-mobility, efficiency in data centers and networks, sustainable food and water supply, sustainable ...
Computational Sustainability
The book at hand gives an overview of the state of the art research in Computational Sustainability as well as case studies of different application scenarios. This covers topics such as renewable energy supply, energy storage and e-mobility, efficiency in data centers and networks, sustainable food and water supply, sustainable health, industrial production and quality, etc. The book describes computational methods and possible application scenarios.
https://magrudy-assets.storage.googleapis.com/9783319811383.jpg
146.990000 USD

Computational Sustainability

Paperback / softback
Book cover image
This book constitutes revised selected papers from the 12th International Workshop on Rewriting Logic and Its Applications, WRLA 2018, held in Thessaloniki, Greece, in June 2018. The 12 full papers presented in this volume were carefully reviewed and selected from 21 submissions. They deal with rewriting, a natural model of ...
Rewriting Logic and Its Applications: 12th International Workshop, WRLA 2018, Held as a Satellite Event of ETAPS, Thessaloniki, Greece, June 14-15, 2018, Proceedings
This book constitutes revised selected papers from the 12th International Workshop on Rewriting Logic and Its Applications, WRLA 2018, held in Thessaloniki, Greece, in June 2018. The 12 full papers presented in this volume were carefully reviewed and selected from 21 submissions. They deal with rewriting, a natural model of computation and an expressive semantic framework for concurrency, parallelism, communication, and interaction, and its applications.
https://magrudy-assets.storage.googleapis.com/9783319998398.jpg
73.490000 USD

Rewriting Logic and Its Applications: 12th International Workshop, WRLA 2018, Held as a Satellite Event of ETAPS, Thessaloniki, Greece, June 14-15, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 30th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2018, held in Cadiz, Spain, in October 2018. The 8 regular and 6 short papers presented were carefully reviewed and selected from 29 submissions. ICTSS is a series of international ...
Testing Software and Systems: 30th IFIP WG 6.1 International Conference, ICTSS 2018, Cadiz, Spain, October 1-3, 2018, Proceedings
This book constitutes the refereed proceedings of the 30th IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2018, held in Cadiz, Spain, in October 2018. The 8 regular and 6 short papers presented were carefully reviewed and selected from 29 submissions. ICTSS is a series of international conferences addressing the conceptual, theoretic, and practical problems of testing software systems, including communication protocols, services, distributed platforms, middleware, embedded- and cyber-physical-systems, and security infrastructures.
https://magrudy-assets.storage.googleapis.com/9783319999265.jpg
62.990000 USD

Testing Software and Systems: 30th IFIP WG 6.1 International Conference, ICTSS 2018, Cadiz, Spain, October 1-3, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the ...
Management Perspective for Transport Telematics: 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papers
This book constitutes the thoroughly refereed proceedings of the 18th International Conference on Transport Systems Telematics, TST 2018, held in Krakow, Poland in March 2018. The 36 full papers presented in this volume were carefully reviewed and selected from 128 submissions. They present and organize the knowledge from within the field of telematics in road transport, in rail transport, in marine transport, in air transport, in logistics.
https://magrudy-assets.storage.googleapis.com/9783319979540.jpg
115.490000 USD

Management Perspective for Transport Telematics: 18th International Conference on Transport System Telematics, TST 2018, Krakow, Poland, March 20-23, 2018, Selected Papers

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 7th International Provenance and Annotation Workshop, IPAW 2018, held in London, UK, in July 2018. The 12 revised full papers, 19 poster papers, and 2 demonstration papers presented were carefully reviewed and selected from 50 submissions. The papers feature a variety of ...
Provenance and Annotation of Data and Processes: 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings
This book constitutes the refereed proceedings of the 7th International Provenance and Annotation Workshop, IPAW 2018, held in London, UK, in July 2018. The 12 revised full papers, 19 poster papers, and 2 demonstration papers presented were carefully reviewed and selected from 50 submissions. The papers feature a variety of provenance-related topics ranging from the capture and inference of provenance to its use and application.They are organized in topical sections on reproducibility; modeling, simulating and capturing provenance; PROV extensions; scientific workflows; applications; and system demonstrations.
https://magrudy-assets.storage.googleapis.com/9783319983783.jpg
73.490000 USD

Provenance and Annotation of Data and Processes: 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the proceedings of the 17th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2018, held in Olomouc, Czech Republic, in September 2018. The 42 full papers presented together with 4 keynotes were carefully reviewed and selected from 69 submissions. The main topics covered by ...
Computer Information Systems and Industrial Management: 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings
This book constitutes the proceedings of the 17th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2018, held in Olomouc, Czech Republic, in September 2018. The 42 full papers presented together with 4 keynotes were carefully reviewed and selected from 69 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, and industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; and various aspects of computer security.
https://magrudy-assets.storage.googleapis.com/9783319999531.jpg
104.990000 USD

Computer Information Systems and Industrial Management: 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings

Paperback / softback
Book cover image
This book constitutes the refereed proceedings of the 16th International Conference on Computational Methods in Systems Biology, CMSB 2018, held in BRNO, Czech Republic, in September 2018. The 15 full and 7 short papers presented together with 5 invited talks were carefully reviewed and selected from 46 submissions. Topics of ...
Computational Methods in Systems Biology: 16th International Conference, CMSB 2018, Brno, Czech Republic, September 12-14, 2018, Proceedings
This book constitutes the refereed proceedings of the 16th International Conference on Computational Methods in Systems Biology, CMSB 2018, held in BRNO, Czech Republic, in September 2018. The 15 full and 7 short papers presented together with 5 invited talks were carefully reviewed and selected from 46 submissions. Topics of interest include formalisms for modeling biological processes; models and their biological applications; frameworks for model verification, validation, analysis, and simulation of biological systems; high-performance computational systems biology; parameter and model inference from experimental data; automated parameter and model synthesis; model integration and biological databases; multi-scale modeling and analysis methods; design, analysis, and verification methods for synthetic biology; methods for biomolecular computing and engineered molecular devices. Chapters 3, 9 and 10 are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
https://magrudy-assets.storage.googleapis.com/9783319994284.jpg
78.740000 USD

Computational Methods in Systems Biology: 16th International Conference, CMSB 2018, Brno, Czech Republic, September 12-14, 2018, Proceedings

Paperback / softback
Page 1 of 40