Filter
(found 608 products)
Book cover image
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations ...
People Over Process: Leadership for Agility
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations in creating successful lean and agile development environments. But, beyond the principles of facilitative leadership for agility, People over Process provides tips and demonstrative scenes for the more important and common software meetings: architecture simulations, project planning, team configurations, retrospectives, and more. The author fully illustrates the principles and shares proven techniques for the most important leadership events in agile projects. While this book focuses on facilitating extraordinarily well-prepared meetings, it serves as a metaphor for leadership more broadly. The leader's obligation to help their team make rigorous fact-based decisions; to gain broad input and have participants aligned on the outcomes and next steps; and to do so in an efficient way that respects the time of the participants is as relevant to every-day leadership activity as it is to conducting meetings. The author mixes background and explanation with demonstration -- in this case, the story of an agile project at the fictitious Pacifica Bank. The scenario constructed at Pacifica illustrates the concepts of effective leadership and productive workplace environments. The book concentrates on the flow of software from understanding what is needed through design, development, testing, and deployment. Essentially, the author provides a simple and powerful model of leadership, examples, and tips. This is not a cookbook on how to lead -- It is a set of principles and examples. All leaders must find their own way for their team, their organization, and their unique challenges.
https://magrudy-assets.storage.googleapis.com/9780367341886.jpg
50.19 USD

People Over Process: Leadership for Agility

by Michael K. Levine
Paperback / softback
Book cover image
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to ...
Intelligent Technologies for Web Applications
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to focus on providing vital fundamental and advanced guidance in the area of Web intelligence for beginners and researchers. The book covers techniques from diverse areas of research, including: Natural language processing Information extraction, retrieval, and filtering Knowledge representation and management Machine learning Databases Data, web, and text mining Human-computer interaction Semantic web technologies To develop effective and intelligent web applications and services, it is critical to discover useful knowledge through analyzing large amounts of content, hidden content structures, or usage patterns of web data resources. Intended to improve and reinforce problem-solving methods in this area, this book delves into the hybridization of artificial intelligence (AI) and web technologies to help simplify complex Web operations. It introduces readers to the state-of-the art development of web intelligence techniques and teaches how to apply these techniques to develop the next generation of intelligent Web applications. The book lays out presented projects, case studies, and innovative ideas, which readers can explore independently as standalone research projects. This material facilitates experimentation with the book's content by including fundamental tools, research directions, practice questions, and additional reading.
https://magrudy-assets.storage.googleapis.com/9780367381363.jpg
78.700000 USD

Intelligent Technologies for Web Applications

by Rajendra Akerkar, Priti Srinivas Sajja
Paperback / softback
Book cover image
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia ...
Advances in Mobile Cloud Computing Systems
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chapters from leading experts in this field cover different aspects of modeling, analysis, design, optimization, and architecture of mobile cloud computing systems. Advances in Mobile Cloud Computing Systems begins by discussing the background, features, and available service models of mobile cloud computing. It goes on to describe a mobile cloud computing system with several third party cloud mobile media (CMM) services that offers its services to a telecom operator. In this scenario, the telecom operator acts as broker that can mix and interchange the resources offered by the different CMM service providers. Subsequent contributed chapters discuss such key research areas as Energy-efficient task execution that reduces the energy consumption in both mobile devices and the cloud Design and architecture of a Proximity Cloud that delivers low-latency, bandwidth-efficient end-user services with a global footprint Virtual mobile networks in clouds that enable resource sharing between multiple mobile network operators Software piracy control framework in mobile cloud computing systems designed to prevent mobile application piracy Dynamic configuration of cloud radio access networks (C-RANs) to improve end-to-end TCP throughput performance in next generation wireless networks The book includes many supporting illustrations and tables along with
https://magrudy-assets.storage.googleapis.com/9780367377182.jpg
78.700000 USD

Advances in Mobile Cloud Computing Systems

Paperback / softback
Book cover image
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to ...
Project Management Tools and Techniques for Success
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to project management that compares and contrasts the stages of poor management with those of effective management. Because change is inherent in virtually all projects, the text outlines the human effects of change and suggests ways to mitigate these effects. It addresses team dynamics, sourcing alternatives, motivating the team, managing expectations, assessing risk, and defining and prioritizing project requirements. The book translates difficult concepts into practical applications with a case study that examines the merger of two companies, along with the subsequent development of a new corporate headquarters. By adding a layer of statistical methods and tools to the front-end of a project, Design for Six Sigma (DFSS) augments standard Six Sigma processes to help ensure project results meet customers' needs and that delays caused by new requirements or rework after implementation are eliminated or reduced. The book explains how to effectively incorporate DFSS tools to reduce the possibility of failure in your next project. Clearly illustrating effective project management practices, the book includes a listing of commonly used acronyms, suggestions for additional reading, along with instructions on how to create four of the most important tools discussed in the book.
https://magrudy-assets.storage.googleapis.com/9780367384036.jpg
78.700000 USD
Paperback / softback
Book cover image
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and ...
Digital Afterlife: Death Matters in a Digital Age
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and the wide-ranging issues that relate to this. The book covers a variety of matters which have been neglected in other research texts, for example: The legal, ethical and philosophical conundrums of digital afterlife. The ways digital media are currently being used to expand the possibilities of commemorating the dead and managing the grief of those left behind. Our lives are shaped by and shape the creation of our Digital Afterlife as the digital has become a taken for granted aspect of human experience. This book will be of interest to undergraduates from computing, theology, business studies, philosophy, psychology, sociology and education from all types of institutions. Secondary audiences include researchers and postgraduate researchers with an interest in the digital. At a practical level, cost of data storage, changing data storage systems mitigate the likelihood of our digital presence existing in perpetuity. Whether we create accidental or intentional digital memories this has psychological consequences for ourselves and for society. Essentially the foreverness of forever is in question. Maggi Savin-Baden is Professor of Higher Education Research at the University of Worcester. She has a strong publication record of over 50 research publications and 17 books. Victoria Mason-Robbie is a Chartered Psychologist and an experienced lecturer having worked in the Higher Education sector for over 15 years. Her current research focuses on evaluating web-based avatars, pedagogical agents, and virtual humans. For more information, please visit the author's website.
70.65 USD

Digital Afterlife: Death Matters in a Digital Age

Paperback / softback
Book cover image
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a ...
Embedded Software Development for Safety-Critical Systems, Second Edition
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a product that must satisfy one or more of the international standards relating to safety-critical applications, including IEC 61508, ISO 26262, EN 50128, EN 50657, IEC 62304, or related standards. Of the first edition, Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com said, I highly recommend Mr. Hobbs' book.
https://magrudy-assets.storage.googleapis.com/9780367338855.jpg
115.28 USD

Embedded Software Development for Safety-Critical Systems, Second Edition

by Chris Hobbs
Paperback / softback
Book cover image
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages ...
Introduction to Software for Chemical Engineers, Second Edition
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages for chemical engineering applications. It covers a range of software applications from Excel and general mathematical packages such as MATLAB and MathCAD to process simulators, CHEMCAD and ASPEN, equation-based modeling languages, gProms, optimization software such as GAMS and AIMS, and specialized software like CFD or DEM codes. The different packages are introduced and applied to solve typical problems in fluid mechanics, heat and mass transfer, mass and energy balances, unit operations, reactor engineering, process and equipment design and control. This new edition offers a wider view of packages including open source software such as R, Python and Julia. It also includes complete examples in ASPEN Plus, adds ANSYS Fluent to CFD codes, Lingo to the optimization packages, and discusses Engineering Equation Solver. It offers a global idea of the capabilities of the software used in the chemical engineering field and provides examples for solving real-world problems. Written by leading experts, this book is a must-have reference for chemical engineers looking to grow in their careers through the use of new and improving computer software. Its user-friendly approach to simulation and optimization as well as its example-based presentation of the software, makes it a perfect teaching tool for both undergraduate and master levels.
https://magrudy-assets.storage.googleapis.com/9781138324213.jpg
139.46 USD

Introduction to Software for Chemical Engineers, Second Edition

Paperback / softback
Book cover image
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous ...
Anonymous Communication Networks: Protecting Privacy on the Web
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities. The book explores various anonymous communication networks as possible solutions to Internet privacy concerns-making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks. Details helpful tips for optimizing onion routing Defines and classifies mixed networks Illustrates the application of a mixed network to e-voting with a case study Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
https://magrudy-assets.storage.googleapis.com/9780367378738.jpg
78.700000 USD
Paperback / softback
Book cover image
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of ...
Enhancing Computer Security with Smart Technology
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.
https://magrudy-assets.storage.googleapis.com/9780367391720.jpg
78.700000 USD
Paperback / softback
Book cover image
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes ...
Project Management of Large Software-Intensive Systems
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes people, policies, constraints, regulations, and a myriad of other factors. It focuses on how to seamlessly integrate systems, satisfy the customer's requirements, and deliver within the budget and on time. The guide is essentially a shopping list of all the activities that could be conducted with tailoring guidelines to meet the needs of each project.
https://magrudy-assets.storage.googleapis.com/9780367136710.jpg
139.46 USD

Project Management of Large Software-Intensive Systems

by Marvin Gechman
Paperback / softback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
71.350000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a ...
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.
https://magrudy-assets.storage.googleapis.com/9781138374539.jpg
77.650000 USD

Developing and Securing the Cloud

by Bhavani Thuraisingham
Paperback / softback
Book cover image
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy ...
Practical Guide for Oracle SQL, T-SQL and MySQL
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).
https://magrudy-assets.storage.googleapis.com/9781138347526.jpg
65.07 USD

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang
Paperback / softback
Book cover image
Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in ...
Distributed and Parallel Systems: From Cluster to Grid Computing
Distributed and Parallel Systems: From Cluster to Grid Computing, is an edited volume based on DAPSYS 2006, the 6th Austrian-Hungarian Workshop on Distributed and Parallel Systems, which is dedicated to all aspects of distributed and parallel computing. The workshop was held in conjunction with the 2nd Austrian Grid Symposium in Innsbruck, Austria in September 2006. This book is designed for a professional audience composed of practitioners and researchers in industry. It is also suitable for advanced-level students in computer science.
https://magrudy-assets.storage.googleapis.com/9781441943484.jpg
229.950000 USD

Distributed and Parallel Systems: From Cluster to Grid Computing

Paperback / softback
Book cover image
Mapping Biology Knowledge addresses two key topics in the context of biology, promoting meaningful learning and knowledge mapping as a strategy for achieving this goal. Meaning-making and meaning-building are examined from multiple perspectives throughout the book. In many biology courses, students become so mired in detail that they fail to ...
Mapping Biology Knowledge
Mapping Biology Knowledge addresses two key topics in the context of biology, promoting meaningful learning and knowledge mapping as a strategy for achieving this goal. Meaning-making and meaning-building are examined from multiple perspectives throughout the book. In many biology courses, students become so mired in detail that they fail to grasp the big picture. Various strategies are proposed for helping instructors focus on the big picture, using the `need to know' principle to decide the level of detail students must have in a given situation. The metacognitive tools described here serve as support systems for the mind, creating an arena in which learners can operate on ideas. They include concept maps, cluster maps, webs, semantic networks, and conceptual graphs. These tools, compared and contrasted in this book, are also useful for building and assessing students' content and cognitive skills. The expanding role of computers in mapping biology knowledge is also explored.
https://magrudy-assets.storage.googleapis.com/9781402002731.jpg
73.490000 USD

Mapping Biology Knowledge

by James H. Wandersee, David E. Moody, Kathleen M. Fisher
Paperback / softback
Book cover image
Organisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. The methods and techniques derived from Organisational Semiotics enable us to study the organisation by examining how information is created and used for communication, coordination and performance of actions towards organisational objectives. The latest development of the ...
Virtual, Distributed and Flexible Organisations: Studies in Organisational Semiotics
Organisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. The methods and techniques derived from Organisational Semiotics enable us to study the organisation by examining how information is created and used for communication, coordination and performance of actions towards organisational objectives. The latest development of the young discipline and its applications have been reported in this book, which provides a useful guide and a valuable reference to anyone working in the areas of organisational study and information systems development.
https://magrudy-assets.storage.googleapis.com/9789048166039.jpg
208.950000 USD

Virtual, Distributed and Flexible Organisations: Studies in Organisational Semiotics

Paperback / softback
Book cover image
This handbook is a reference for those interested in information technologies and emerging management practices in China. The emphasis on information technologies and management provides a unique proposition and gives characteristics of flexibility and adoption to diverse audiences. The subject area is a combination of global information technology and management ...
The China Information Technology Handbook
This handbook is a reference for those interested in information technologies and emerging management practices in China. The emphasis on information technologies and management provides a unique proposition and gives characteristics of flexibility and adoption to diverse audiences. The subject area is a combination of global information technology and management along with strategic management of IT. The handbook exploits state-of-the-art and emerging trends in theory and technology. This handbook is primarily designed for a professional and academic audience.
https://magrudy-assets.storage.googleapis.com/9781441945990.jpg
292.950000 USD

The China Information Technology Handbook

Paperback / softback
Book cover image
The author here presents a detailed explanation of the methodolgy of software reliablity evaluation, and then demonstrates its applications to a commercial loan system, a funds transfer security system, and a payables processing system. Her well-written, practical text enables users to design original software modules, as well as to critically ...
Software Failure Risk: Measurement and Management
The author here presents a detailed explanation of the methodolgy of software reliablity evaluation, and then demonstrates its applications to a commercial loan system, a funds transfer security system, and a payables processing system. Her well-written, practical text enables users to design original software modules, as well as to critically assess commercial software products.
https://magrudy-assets.storage.googleapis.com/9781461363163.jpg
83.990000 USD

Software Failure Risk: Measurement and Management

by Susan A. Sherer
Paperback / softback
Book cover image
This book presents the research challenges that are due to the introduction of the 3rd dimension in chips for researchers and covers the whole architectural design approach for 3D-SoCs. Nowadays the 3D-Integration technologies, 3D-Design techniques, and 3D-Architectures are emerging as interesting, truly hot, broad topics. The present book gathers the ...
3D Integration for NoC-based SoC Architectures
This book presents the research challenges that are due to the introduction of the 3rd dimension in chips for researchers and covers the whole architectural design approach for 3D-SoCs. Nowadays the 3D-Integration technologies, 3D-Design techniques, and 3D-Architectures are emerging as interesting, truly hot, broad topics. The present book gathers the recent advances in the whole domain by renowned experts in the field to build a comprehensive and consistent book around the hot topics of three-dimensional architectures and micro-architectures. This book includes contributions from high level international teams working in this field.
https://magrudy-assets.storage.googleapis.com/9781461427483.jpg
167.990000 USD

3D Integration for NoC-based SoC Architectures

Paperback / softback
Book cover image
Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and policy dimensions related to the design, planning and deployment of digital government systems. The ...
Advances in Digital Government: Technology, Human Factors, and Policy
Advances In Digital Government presents a collection of in-depth articles that addresses a representative cross-section of the matrix of issues involved in implementing digital government systems. These articles constitute a survey of both the technical and policy dimensions related to the design, planning and deployment of digital government systems. The research and development projects within the technical dimension represent a wide range of governmental functions, including the provisioning of health and human services, management of energy information, multi-agency integration, and criminal justice applications. The technical issues dealt with in these projects include database and ontology integration, distributed architectures, scalability, and security and privacy. The human factors research emphasizes compliance with access standards for the disabled and the policy articles contain both conceptual models for developing digital government systems as well as real management experiences and results in deploying them. Advances In Digital Government presents digital government issues from the perspectives of different communities and societies. This geographic and social diversity illuminates a unique array of policy and social perspectives, exposing practitioners to new and useful ways of thinking about digital government.
https://magrudy-assets.storage.googleapis.com/9781475784541.jpg
262.490000 USD

Advances in Digital Government: Technology, Human Factors, and Policy

Paperback / softback
Book cover image
Optical character recognition (OCR) is the most prominent and successful example of pattern recognition to date. There are thousands of research papers and dozens of OCR products. Optical Character Rcognition: An Illustrated Guide to the Frontier offers a perspective on the performance of current OCR systems by illustrating and explaining ...
Optical Character Recognition: An Illustrated Guide to the Frontier
Optical character recognition (OCR) is the most prominent and successful example of pattern recognition to date. There are thousands of research papers and dozens of OCR products. Optical Character Rcognition: An Illustrated Guide to the Frontier offers a perspective on the performance of current OCR systems by illustrating and explaining actual OCR errors. The pictures and analysis provide insight into the strengths and weaknesses of current OCR systems, and a road map to future progress. Optical Character Recognition: An Illustrated Guide to the Frontier will pique the interest of users and developers of OCR products and desktop scanners, as well as teachers and students of pattern recognition, artificial intelligence, and information retrieval. The first chapter compares the character recognition abilities of humans and computers. The next four chapters present 280 illustrated examples of recognition errors, in a taxonomy consisting of Imaging Defects, Similar Symbols, Punctuation, and Typography. These examples were drawn from large-scale tests conducted by the authors. The final chapter discusses possible approaches for improving the accuracy of today's systems, and is followed by an annotated bibliography. Optical Character Recognition: An Illustrated Guide to the Frontier is suitable as a secondary text for a graduate level course on pattern recognition, artificial intelligence, and information retrieval, and as a reference for researchers and practitioners in industry.
https://magrudy-assets.storage.googleapis.com/9781461372813.jpg
230.990000 USD

Optical Character Recognition: An Illustrated Guide to the Frontier

by Thomas A. Nartker, George Nagy, Stephen V. Rice
Paperback / softback
Book cover image
JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. The JR implementation executes on UNIX-based systems (Linux, Mac OS X, and Solaris) and Windows-based systems. It is available free from the JR webpage. This book describes ...
The JR Programming Language: Concurrent Programming in an Extended Java
JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. The JR implementation executes on UNIX-based systems (Linux, Mac OS X, and Solaris) and Windows-based systems. It is available free from the JR webpage. This book describes the JR programming language and illustrates how it can be used to write concurrent programs for a variety of applications. This text presents numerous small and large example programs. The source code for all programming examples and the given parts of all programming exercises are available on the JR webpage. Dr. Ronald A. Olsson and Dr. Aaron W. Keen, the authors of this text, are the designers and implementors of JR.
https://magrudy-assets.storage.googleapis.com/9781475788822.jpg
115.490000 USD

The JR Programming Language: Concurrent Programming in an Extended Java

by Aaron W. Keen, Richard Olsson
Paperback / softback
Book cover image
Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes ...
Computer Science: The Hardware, Software and Heart of It
Computer Science: The Hardware, Software and Heart of It focuses on the deeper aspects of the two recognized subdivisions of Computer Science, Software and Hardware. These subdivisions are shown to be closely interrelated as a result of the stored-program concept. Computer Science: The Hardware, Software and Heart of It includes certain classical theoretical computer science topics such as Unsolvability (e.g. the halting problem) and Undecidability (e.g. Godel's incompleteness theorem) that treat problems that exist under the Church-Turing thesis of computation. These problem topics explain inherent limits lying at the heart of software, and in effect define boundaries beyond which computer science professionals cannot go beyond. Newer topics such as Cloud Computing are also covered in this book. After a survey of traditional programming languages (e.g. Fortran and C++), a new kind of computer Programming for parallel/distributed computing is presented using the message-passing paradigm which is at the heart of large clusters of computers. This leads to descriptions of current hardware platforms for large-scale computing, such as clusters of as many as one thousand which are the new generation of supercomputers. This also leads to a consideration of future quantum computers and a possible escape from the Church-Turing thesis to a new computation paradigm. The book's historical context is especially helpful during this, the centenary of Turing's birth. Alan Turing is widely regarded as the father of Computer Science, since many concepts in both the hardware and software of Computer Science can be traced to his pioneering research. Turing was a multi-faceted mathematician-engineer and was able to work on both concrete and abstract levels. This book shows how these two seemingly disparate aspects of Computer Science are intimately related. Further, the book treats the theoretical side of Computer Science as well, which also derives from Turing's research. Computer Science: The Hardware, Software and Heart of It is designed as a professional book for practitioners and researchers working in the related fields of Quantum Computing, Cloud Computing, Computer Networking, as well as non-scientist readers. Advanced-level and undergraduate students concentrating on computer science, engineering and mathematics will also find this book useful.
https://magrudy-assets.storage.googleapis.com/9781489994431.jpg
114.450000 USD

Computer Science: The Hardware, Software and Heart of It

Paperback / softback
Book cover image
As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
Security in E-Learning
As e-learning increases in popularity and reach, more people are taking online courses and need to understand the relevant security issues. This book discusses typical threats to e-learning projects, introducing how they have been and should be addressed.
https://magrudy-assets.storage.googleapis.com/9781441937223.jpg
177.450000 USD

Security in E-Learning

by Edgar R. Weippl
Paperback / softback
Book cover image
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. As well as being an interdisciplinary area, Environmental Informatics provides an interface between all involved professional groups. Monitoring the state of the environment, analysing existing data, presenting the data ...
Environmental Software Systems: IFIP TC5 WG5.11 International Symposium on Environmental Software Systems (ISESS '97), 28 April-2 May 1997, British Columbia, Canada
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. As well as being an interdisciplinary area, Environmental Informatics provides an interface between all involved professional groups. Monitoring the state of the environment, analysing existing data, presenting the data to scientists and the public, as well as providing decision support are only some of the topics involved. Environmental Informatics is therefore a good foundation for the computer-assisted protection of the environment.
https://magrudy-assets.storage.googleapis.com/9781475751628.jpg
283.500000 USD

Environmental Software Systems: IFIP TC5 WG5.11 International Symposium on Environmental Software Systems (ISESS '97), 28 April-2 May 1997, British Columbia, Canada

Paperback / softback
Book cover image
New Algorithms, Architectures and Applications for Reconfigurable Computing consists of a collection of contributions from the authors of some of the best papers from the Field Programmable Logic conference (FPL'03) and the Design and Test Europe conference (DATE'03). In all, seventy-nine authors, from research teams from all over the world, ...
New Algorithms, Architectures and Applications for Reconfigurable Computing
New Algorithms, Architectures and Applications for Reconfigurable Computing consists of a collection of contributions from the authors of some of the best papers from the Field Programmable Logic conference (FPL'03) and the Design and Test Europe conference (DATE'03). In all, seventy-nine authors, from research teams from all over the world, were invited to present their latest research in the extended format permitted by this special volume. The result is a valuable book that is a unique record of the state of the art in research into field programmable logic and reconfigurable computing. The contributions are organized into twenty-four chapters and are grouped into three main categories: architectures, tools and applications. Within these three broad areas the most strongly represented themes are coarse-grained architectures; dynamically reconfigurable and multi-context architectures; tools for coarse-grained and reconfigurable architectures; networking, security and encryption applications. Field programmable logic and reconfigurable computing are exciting research disciplines that span the traditional boundaries of electronic engineering and computer science. When the skills of both research communities are combined to address the challenges of a single research discipline they serve as a catalyst for innovative research. The work reported in the chapters of this book captures that spirit of that innovation.
https://magrudy-assets.storage.googleapis.com/9781441952646.jpg
209.990000 USD

New Algorithms, Architectures and Applications for Reconfigurable Computing

Paperback / softback
Book cover image
In the continued quest for increased economic benefits from our water resources, numerous structures and operating policies for controlling the river flow have been built and implemented. These structures and associated operating policies can facilitate navigation; they can provide greater quantities of reliable water supplies to meet agricultural, industrial and ...
Restoration of Degraded Rivers: Challenges, Issues and Experiences
In the continued quest for increased economic benefits from our water resources, numerous structures and operating policies for controlling the river flow have been built and implemented. These structures and associated operating policies can facilitate navigation; they can provide greater quantities of reliable water supplies to meet agricultural, industrial and municipal water demands; they can generate hydroelectric power and energy; and they can provide increased flood protection, recreation, and other benefits. Over the past half-century we have converted many of our rivers into engineered waterways. These straightened, often periodically dredged, engineered rivers are complete with dikes, reservoirs, weirs, and diversion canals. All this engineering has enhanced economic development. However, as rivers and their floodplains become stressed from the excessive use and misuse of their resources, their contribution to economic development can be threatened. Evidence of economic and ecological degradation, especially in relatively large river systems such as the Danube, the Mississippi, the Rhine, and the Volga, has increased our appreciation of beneficial roles natural aquatic and terrestrial ecosystems play in water quantity and quality management. We have recognized the need to pay more attention to letting nature help us regulate water quantity and quality rather than working against nature and its variabilities and uncertainties. Today there are efforts underway in many developed river basins to 'de engineer' or return these straightened and controlled rivers to a more natural state.
https://magrudy-assets.storage.googleapis.com/9789048149919.jpg
366.450000 USD

Restoration of Degraded Rivers: Challenges, Issues and Experiences

Paperback / softback
Book cover image
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation process. The 5.4 Working Group of IFIP aims at defining the scientific foundation of Computer Aided Innovation systems and at identifying state of the art and trends of CAI tools ...
Computer-Aided Innovation (CAI): IFIP 20th World Computer Congress, Proceedings of the Second Topical Session on Computer-Aided Innovation, WG 5.4/TC 5 Computer-Aided Innovation, September 7-10, 2008, Milano, Italy
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation process. The 5.4 Working Group of IFIP aims at defining the scientific foundation of Computer Aided Innovation systems and at identifying state of the art and trends of CAI tools and methods. These Proceedings derive from the second Topical Session on Computer- Aided Innovation organized within the 20th World Computer Congress of IFIP. The goal of the Topical Session is to provide a survey of existing technologies and research activities in the field and to identify opportunities of integration of CAI with other PLM systems. According to the heterogeneous needs of innovation-related activities, the papers published in this volume are characterized by multidisciplinary contents and complementary perspectives and scopes. Such a richness of topics and disciplines will certainly contribute to the promotion of fruitful new collaborations and synergies within the IFIP community. Gaetano Cascini th Florence, April 30 20 08 CAI Topical Session Organization The IFIP Topical Session on Computer-Aided Innovation (CAI) is a co-located conference organized under the auspices of the IFIP World Computer Congress (WCC) 2008 in Milano, Italy Gaetano Cascini CAI Program Committee Chair gaetano.cascini@unifi.it
https://magrudy-assets.storage.googleapis.com/9781441935199.jpg
156.450000 USD

Computer-Aided Innovation (CAI): IFIP 20th World Computer Congress, Proceedings of the Second Topical Session on Computer-Aided Innovation, WG 5.4/TC 5 Computer-Aided Innovation, September 7-10, 2008, Milano, Italy

Paperback / softback
Book cover image
Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm . Presents results of a large and integrated body of research in the area of 'quantitative' program logics.
Abstraction, Refinement and Proof for Probabilistic Systems
Illustrates by example the typical steps necessary in computer science to build a mathematical model of any programming paradigm . Presents results of a large and integrated body of research in the area of 'quantitative' program logics.
https://magrudy-assets.storage.googleapis.com/9781441923127.jpg
208.950000 USD

Abstraction, Refinement and Proof for Probabilistic Systems

by Charles Carroll Morgan, Annabelle McIver
Paperback / softback
Book cover image
Decomposition methods aim to reduce large-scale problems to simpler problems. This monograph presents selected aspects of the dimension-reduction problem. Exact and approximate aggregations of multidimensional systems are developed and from a known model of input-output balance, aggregation methods are categorized. The issues of loss of accuracy, recovery of original variables ...
Large-scale Optimization: Problems and Methods
Decomposition methods aim to reduce large-scale problems to simpler problems. This monograph presents selected aspects of the dimension-reduction problem. Exact and approximate aggregations of multidimensional systems are developed and from a known model of input-output balance, aggregation methods are categorized. The issues of loss of accuracy, recovery of original variables (disaggregation), and compatibility conditions are analyzed in detail. The method of iterative aggregation in large-scale problems is studied. For fixed weights, successively simpler aggregated problems are solved and the convergence of their solution to that of the original problem is analyzed. An introduction to block integer programming is considered. Duality theory, which is widely used in continuous block programming, does not work for the integer problem. A survey of alternative methods is presented and special attention is given to combined methods of decomposition. Block problems in which the coupling variables do not enter the binding constraints are studied. These models are worthwhile because they permit a decomposition with respect to primal and dual variables by two-level algorithms instead of three-level algorithms. Audience: This book is addressed to specialists in operations research, optimization, and optimal control.
https://magrudy-assets.storage.googleapis.com/9781441948489.jpg
208.950000 USD

Large-scale Optimization: Problems and Methods

by Vladimir Tsurkov
Paperback / softback
Page 1 of 21