Filter
(found 253 products)
Book cover image
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations ...
People Over Process: Leadership for Agility
This book helps participants in agile software development environments learn to become leaders. Facilitative leaders should be at every level of the organization, from individual contributor to informal team leader to managers of all stripes -- it takes much focus and intentionality from senior organizational leaders, who have special obligations in creating successful lean and agile development environments. But, beyond the principles of facilitative leadership for agility, People over Process provides tips and demonstrative scenes for the more important and common software meetings: architecture simulations, project planning, team configurations, retrospectives, and more. The author fully illustrates the principles and shares proven techniques for the most important leadership events in agile projects. While this book focuses on facilitating extraordinarily well-prepared meetings, it serves as a metaphor for leadership more broadly. The leader's obligation to help their team make rigorous fact-based decisions; to gain broad input and have participants aligned on the outcomes and next steps; and to do so in an efficient way that respects the time of the participants is as relevant to every-day leadership activity as it is to conducting meetings. The author mixes background and explanation with demonstration -- in this case, the story of an agile project at the fictitious Pacifica Bank. The scenario constructed at Pacifica illustrates the concepts of effective leadership and productive workplace environments. The book concentrates on the flow of software from understanding what is needed through design, development, testing, and deployment. Essentially, the author provides a simple and powerful model of leadership, examples, and tips. This is not a cookbook on how to lead -- It is a set of principles and examples. All leaders must find their own way for their team, their organization, and their unique challenges.
https://magrudy-assets.storage.googleapis.com/9780367341886.jpg
50.19 USD

People Over Process: Leadership for Agility

by Michael K. Levine
Paperback / softback
Book cover image
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to ...
Intelligent Technologies for Web Applications
The Internet has become an integral part of human life, yet the web still utilizes mundane interfaces to the physical world, which makes Internet operations somewhat mechanical, tedious, and less human-oriented. Filling a large void in the literature, Intelligent Technologies for Web Applications is one of the first books to focus on providing vital fundamental and advanced guidance in the area of Web intelligence for beginners and researchers. The book covers techniques from diverse areas of research, including: Natural language processing Information extraction, retrieval, and filtering Knowledge representation and management Machine learning Databases Data, web, and text mining Human-computer interaction Semantic web technologies To develop effective and intelligent web applications and services, it is critical to discover useful knowledge through analyzing large amounts of content, hidden content structures, or usage patterns of web data resources. Intended to improve and reinforce problem-solving methods in this area, this book delves into the hybridization of artificial intelligence (AI) and web technologies to help simplify complex Web operations. It introduces readers to the state-of-the art development of web intelligence techniques and teaches how to apply these techniques to develop the next generation of intelligent Web applications. The book lays out presented projects, case studies, and innovative ideas, which readers can explore independently as standalone research projects. This material facilitates experimentation with the book's content by including fundamental tools, research directions, practice questions, and additional reading.
https://magrudy-assets.storage.googleapis.com/9780367381363.jpg
78.700000 USD

Intelligent Technologies for Web Applications

by Rajendra Akerkar, Priti Srinivas Sajja
Paperback / softback
Book cover image
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia ...
Advances in Mobile Cloud Computing Systems
With recent advances in mobile communication technologies, more and more people are accessing cloud computing systems using mobile devices, such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities, mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chapters from leading experts in this field cover different aspects of modeling, analysis, design, optimization, and architecture of mobile cloud computing systems. Advances in Mobile Cloud Computing Systems begins by discussing the background, features, and available service models of mobile cloud computing. It goes on to describe a mobile cloud computing system with several third party cloud mobile media (CMM) services that offers its services to a telecom operator. In this scenario, the telecom operator acts as broker that can mix and interchange the resources offered by the different CMM service providers. Subsequent contributed chapters discuss such key research areas as Energy-efficient task execution that reduces the energy consumption in both mobile devices and the cloud Design and architecture of a Proximity Cloud that delivers low-latency, bandwidth-efficient end-user services with a global footprint Virtual mobile networks in clouds that enable resource sharing between multiple mobile network operators Software piracy control framework in mobile cloud computing systems designed to prevent mobile application piracy Dynamic configuration of cloud radio access networks (C-RANs) to improve end-to-end TCP throughput performance in next generation wireless networks The book includes many supporting illustrations and tables along with
https://magrudy-assets.storage.googleapis.com/9780367377182.jpg
78.700000 USD

Advances in Mobile Cloud Computing Systems

Paperback / softback
Book cover image
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to ...
Project Management Tools and Techniques for Success
Emphasizing that it's much easier and more cost effective to make changes in the planning phases of a project rather than later on, Project Management Tools and Techniques for Success provides an accessible introduction to project management fundamentals. Highlighting approaches for avoiding common pitfalls, it begins with an introduction to project management that compares and contrasts the stages of poor management with those of effective management. Because change is inherent in virtually all projects, the text outlines the human effects of change and suggests ways to mitigate these effects. It addresses team dynamics, sourcing alternatives, motivating the team, managing expectations, assessing risk, and defining and prioritizing project requirements. The book translates difficult concepts into practical applications with a case study that examines the merger of two companies, along with the subsequent development of a new corporate headquarters. By adding a layer of statistical methods and tools to the front-end of a project, Design for Six Sigma (DFSS) augments standard Six Sigma processes to help ensure project results meet customers' needs and that delays caused by new requirements or rework after implementation are eliminated or reduced. The book explains how to effectively incorporate DFSS tools to reduce the possibility of failure in your next project. Clearly illustrating effective project management practices, the book includes a listing of commonly used acronyms, suggestions for additional reading, along with instructions on how to create four of the most important tools discussed in the book.
https://magrudy-assets.storage.googleapis.com/9780367384036.jpg
78.700000 USD
Paperback / softback
Book cover image
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a ...
Embedded Software Development for Safety-Critical Systems, Second Edition
This is a book about the development of dependable, embedded software. It is for systems designers, implementers, and verifiers who are experienced in general embedded software development, but who are now facing the prospect of delivering a software-based system for a safety-critical application. It is aimed at those creating a product that must satisfy one or more of the international standards relating to safety-critical applications, including IEC 61508, ISO 26262, EN 50128, EN 50657, IEC 62304, or related standards. Of the first edition, Stephen Thomas, PE, Founder and Editor of FunctionalSafetyEngineer.com said, I highly recommend Mr. Hobbs' book.
https://magrudy-assets.storage.googleapis.com/9780367338855.jpg
115.28 USD

Embedded Software Development for Safety-Critical Systems, Second Edition

by Chris Hobbs
Paperback / softback
Book cover image
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and ...
Digital Afterlife: Death Matters in a Digital Age
Despite the range of studies into grief and mourning in relation to the digital, research to date largely focuses on the cultural practices and meanings that are played out in and through digital environments. Digital Afterlife brings together experts from diverse fields who share an interest in digital afterlife and the wide-ranging issues that relate to this. The book covers a variety of matters which have been neglected in other research texts, for example: The legal, ethical and philosophical conundrums of digital afterlife. The ways digital media are currently being used to expand the possibilities of commemorating the dead and managing the grief of those left behind. Our lives are shaped by and shape the creation of our Digital Afterlife as the digital has become a taken for granted aspect of human experience. This book will be of interest to undergraduates from computing, theology, business studies, philosophy, psychology, sociology and education from all types of institutions. Secondary audiences include researchers and postgraduate researchers with an interest in the digital. At a practical level, cost of data storage, changing data storage systems mitigate the likelihood of our digital presence existing in perpetuity. Whether we create accidental or intentional digital memories this has psychological consequences for ourselves and for society. Essentially the foreverness of forever is in question. Maggi Savin-Baden is Professor of Higher Education Research at the University of Worcester. She has a strong publication record of over 50 research publications and 17 books. Victoria Mason-Robbie is a Chartered Psychologist and an experienced lecturer having worked in the Higher Education sector for over 15 years. Her current research focuses on evaluating web-based avatars, pedagogical agents, and virtual humans. For more information, please visit the author's website.
70.65 USD

Digital Afterlife: Death Matters in a Digital Age

Paperback / softback
Book cover image
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages ...
Introduction to Software for Chemical Engineers, Second Edition
The field of Chemical Engineering and its link to computer science is in constant evolution and new engineers have a variety of tools at their disposal to tackle their everyday problems. Introduction to Software for Chemical Engineers, Second Edition provides a quick guide to the use of various computer packages for chemical engineering applications. It covers a range of software applications from Excel and general mathematical packages such as MATLAB and MathCAD to process simulators, CHEMCAD and ASPEN, equation-based modeling languages, gProms, optimization software such as GAMS and AIMS, and specialized software like CFD or DEM codes. The different packages are introduced and applied to solve typical problems in fluid mechanics, heat and mass transfer, mass and energy balances, unit operations, reactor engineering, process and equipment design and control. This new edition offers a wider view of packages including open source software such as R, Python and Julia. It also includes complete examples in ASPEN Plus, adds ANSYS Fluent to CFD codes, Lingo to the optimization packages, and discusses Engineering Equation Solver. It offers a global idea of the capabilities of the software used in the chemical engineering field and provides examples for solving real-world problems. Written by leading experts, this book is a must-have reference for chemical engineers looking to grow in their careers through the use of new and improving computer software. Its user-friendly approach to simulation and optimization as well as its example-based presentation of the software, makes it a perfect teaching tool for both undergraduate and master levels.
https://magrudy-assets.storage.googleapis.com/9781138324213.jpg
139.46 USD

Introduction to Software for Chemical Engineers, Second Edition

Paperback / softback
Book cover image
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous ...
Anonymous Communication Networks: Protecting Privacy on the Web
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy. Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities. The book explores various anonymous communication networks as possible solutions to Internet privacy concerns-making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks. Details helpful tips for optimizing onion routing Defines and classifies mixed networks Illustrates the application of a mixed network to e-voting with a case study Considers the application of symmetric cipher and Diffie-Hellman key exchange in Tor Supplies detailed guidance on how to download and install Tor, I2P, JAP/JonDo, and QuickSilver Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
https://magrudy-assets.storage.googleapis.com/9780367378738.jpg
78.700000 USD
Paperback / softback
Book cover image
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of ...
Enhancing Computer Security with Smart Technology
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals. Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and experience, this volume is made up of chapters written by specialists in each subject field. It is accessible to any professional with a basic background in computer science. Following an introduction to the issue of cyber-security and cyber-trust, the book offers a broad survey of the state-of-the-art in firewall technology and of the importance of Web application security. The remainder of the book focuses on the use of machine learning methods and tools and their performance.
https://magrudy-assets.storage.googleapis.com/9780367391720.jpg
78.700000 USD
Paperback / softback
Book cover image
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes ...
Project Management of Large Software-Intensive Systems
The book describes how to manage and successfully deliver large, complex, and expensive systems that can be composed of millions of line of software code, being developed by numerous groups throughout the globe, that interface with many hardware items being developed by geographically dispersed companies, where the system also includes people, policies, constraints, regulations, and a myriad of other factors. It focuses on how to seamlessly integrate systems, satisfy the customer's requirements, and deliver within the budget and on time. The guide is essentially a shopping list of all the activities that could be conducted with tailoring guidelines to meet the needs of each project.
https://magrudy-assets.storage.googleapis.com/9780367136710.jpg
139.46 USD

Project Management of Large Software-Intensive Systems

by Marvin Gechman
Paperback / softback
Book cover image
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science ...
Revival: Genetic Algorithms for Pattern Recognition (1986)
Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.
https://magrudy-assets.storage.googleapis.com/9781138558885.jpg
71.350000 USD

Revival: Genetic Algorithms for Pattern Recognition (1986)

by Paul P. Wang, Sankar K. Pal
Paperback / softback
Book cover image
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a ...
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds. Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing technology. Supplying step-by-step instruction on how to develop and secure cloud computing platforms and web services, it includes an easy-to-understand, basic-level overview of cloud computing and its supporting technologies. Presenting a framework for secure cloud computing development, the book describes supporting technologies for the cloud such as web services and security. It details the various layers of the cloud computing framework, including the virtual machine monitor and hypervisor, cloud data storage, cloud data management, and virtual network monitor. It also provides several examples of cloud products and prototypes, including private, public, and U.S. government clouds. Reviewing recent developments in cloud computing, the book illustrates the essential concepts, issues, and challenges in developing and securing today's cloud computing platforms and applications. It also examines prototypes built on experimental cloud computing systems that the author and her team have developed at the University of Texas at Dallas. This diverse reference is suitable for those in industry, government, and academia. Technologists will develop the understanding required to select the appropriate tools for particular cloud applications. Developers will discover alternative designs for cloud development, and managers will understand if it's best to build their own clouds or contract them out.
https://magrudy-assets.storage.googleapis.com/9781138374539.jpg
77.650000 USD

Developing and Securing the Cloud

by Bhavani Thuraisingham
Paperback / softback
Book cover image
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy ...
Practical Guide for Oracle SQL, T-SQL and MySQL
SQL is a widely used to access most databases, therefore database developers and system administrators should be familiar with it. This hands-on SQL book will help beginner and intermediate users to write queries that apply complex conditions on a table. The book's unique side by side approach makes it easy for the reader to learn three major query languages in the IT industry. The author has over 20 years of experience in database design. KEY FEATURES: Contains numerous practical screenshots of Oracle SQL, T-SQL, MySQL statements and results. Shows the differences between Oracle SQL, T-SQL and MySQL side by side. Gives a real world experience for SQL developers and database administrators. Sample data is available to work on (available on our website).
https://magrudy-assets.storage.googleapis.com/9781138347526.jpg
65.07 USD

Practical Guide for Oracle SQL, T-SQL and MySQL

by Preston Zhang
Paperback / softback
Book cover image
Organisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. The methods and techniques derived from Organisational Semiotics enable us to study the organisation by examining how information is created and used for communication, coordination and performance of actions towards organisational objectives. The latest development of the ...
Virtual, Distributed and Flexible Organisations: Studies in Organisational Semiotics
Organisational Semiotics offers an effective approach to analysing organisations and modelling organisational behaviour. The methods and techniques derived from Organisational Semiotics enable us to study the organisation by examining how information is created and used for communication, coordination and performance of actions towards organisational objectives. The latest development of the young discipline and its applications have been reported in this book, which provides a useful guide and a valuable reference to anyone working in the areas of organisational study and information systems development.
https://magrudy-assets.storage.googleapis.com/9789048166039.jpg
208.950000 USD

Virtual, Distributed and Flexible Organisations: Studies in Organisational Semiotics

Paperback / softback
Book cover image
In the continued quest for increased economic benefits from our water resources, numerous structures and operating policies for controlling the river flow have been built and implemented. These structures and associated operating policies can facilitate navigation; they can provide greater quantities of reliable water supplies to meet agricultural, industrial and ...
Restoration of Degraded Rivers: Challenges, Issues and Experiences
In the continued quest for increased economic benefits from our water resources, numerous structures and operating policies for controlling the river flow have been built and implemented. These structures and associated operating policies can facilitate navigation; they can provide greater quantities of reliable water supplies to meet agricultural, industrial and municipal water demands; they can generate hydroelectric power and energy; and they can provide increased flood protection, recreation, and other benefits. Over the past half-century we have converted many of our rivers into engineered waterways. These straightened, often periodically dredged, engineered rivers are complete with dikes, reservoirs, weirs, and diversion canals. All this engineering has enhanced economic development. However, as rivers and their floodplains become stressed from the excessive use and misuse of their resources, their contribution to economic development can be threatened. Evidence of economic and ecological degradation, especially in relatively large river systems such as the Danube, the Mississippi, the Rhine, and the Volga, has increased our appreciation of beneficial roles natural aquatic and terrestrial ecosystems play in water quantity and quality management. We have recognized the need to pay more attention to letting nature help us regulate water quantity and quality rather than working against nature and its variabilities and uncertainties. Today there are efforts underway in many developed river basins to 'de engineer' or return these straightened and controlled rivers to a more natural state.
https://magrudy-assets.storage.googleapis.com/9789048149919.jpg
366.450000 USD

Restoration of Degraded Rivers: Challenges, Issues and Experiences

Paperback / softback
Book cover image
The aim of this book is to present the mathematical theory and the know-how to make computer programs for the numerical approximation of Optimal Control of PDE's. The computer programs are presented in a straightforward generic language. As a consequence they are well structured, clearly explained and can be translated ...
Optimal Control from Theory to Computer Programs
The aim of this book is to present the mathematical theory and the know-how to make computer programs for the numerical approximation of Optimal Control of PDE's. The computer programs are presented in a straightforward generic language. As a consequence they are well structured, clearly explained and can be translated easily into any high level programming language. Applications and corresponding numerical tests are also given and discussed. To our knowledge, this is the first book to put together mathematics and computer programs for Optimal Control in order to bridge the gap between mathematical abstract algorithms and concrete numerical ones. The text is addressed to students and graduates in Mathematics, Mechanics, Applied Mathematics, Numerical Software, Information Technology and Engineering. It can also be used for Master and Ph.D. programs.
https://magrudy-assets.storage.googleapis.com/9789048164981.jpg
208.950000 USD

Optimal Control from Theory to Computer Programs

by Pekka Neittaanmaki, Viorel Arnautu
Paperback / softback
Book cover image
The subject of this book is the control of software engineering. The rapidly increasing demand for software is accompanied by a growth in the number of products on the market, as well as their size and complexity. Our ability to control software engineering is hardly keeping pace with this growth. ...
Towards a Software Factory
The subject of this book is the control of software engineering. The rapidly increasing demand for software is accompanied by a growth in the number of products on the market, as well as their size and complexity. Our ability to control software engineering is hardly keeping pace with this growth. As a result, software projects are often late, software products sometimes lack the required quality and the productivity improvements achieved by software engineering are insufficient to keep up with the demand This book describes ways to improve software engineering control. It argues that this should be expanded to include control of the development, maintenance and reuse of software, thus making it possible to apply many of the ideas and concepts that originate in production control and quality control. The book is based on research and experience accumulated over a number of years. During this period I had two employers: Eindhoven University of Technology and Philips Electronics. Research is not a one-man activity and I would like to thank the following persons for their contributions to the successful completion of this project. First and foremost my Ph. D. advisers Theo Bemelmans, Hans van Vliet and Fred Heemstra whose insights and experience proved invaluable at every stage. Many thanks are also due to Rob Kusters and Fred Heemstra for their patience in listening to my sometimes wild ideas and for being such excellent colleagues.
https://magrudy-assets.storage.googleapis.com/9789401050968.jpg
146.990000 USD

Towards a Software Factory

by Michiel Van Genuchten
Paperback / softback
Book cover image
Integrating ideas from the fields of systems science and knowledge science, Knowledge and Systems Science: Enabling Systemic Knowledge Synthesis shows how to create and justify various pieces of knowledge systemically. Written by one of the foremost experts in this area, the book presents approaches for the systemic integration of knowledge, ...
Knowledge and Systems Science: Enabling Systemic Knowledge Synthesis
Integrating ideas from the fields of systems science and knowledge science, Knowledge and Systems Science: Enabling Systemic Knowledge Synthesis shows how to create and justify various pieces of knowledge systemically. Written by one of the foremost experts in this area, the book presents approaches for the systemic integration of knowledge, which can help solve complex problems today and in the future. After discussing issues of systemic knowledge synthesis, the book emphasizes the importance of the human dimension in problem solving and introduces a new integrated systems approach called the informed systems approach. It also covers mathematical information aggregation techniques. Moving on to knowledge science concepts and approaches, the book discusses organizational and academic knowledge creation models and considers a sociological interpretation of the knowledge integration system. To support knowledge science as an academic discipline, the author explains how to justify knowledge and summarizes a theory of knowledge synthesis (construction) systems. Through case studies of technology archiving, academic research evaluation, demand forecasting of perishable foods, and other real-world concerns, this book demonstrates the use of new knowledge-based methods in addressing a variety of complex issues. It also illustrates the importance of acquiring a systemic view through trained intuition.
https://magrudy-assets.storage.googleapis.com/9781138033795.jpg
68.200000 USD
Paperback / softback
Book cover image
In delivering lectures and writing books, we were most often forced to pay absolutely no attention to a great body of interesting results and useful algorithms appearing in numerous sources and occasionally encountered. It was absolutely that most of these re sults would finally be forgotten because it is impossible ...
Graph Theory for Programmers: Algorithms for Processing Trees
In delivering lectures and writing books, we were most often forced to pay absolutely no attention to a great body of interesting results and useful algorithms appearing in numerous sources and occasionally encountered. It was absolutely that most of these re sults would finally be forgotten because it is impossible to run through the entire variety of sources where these materials could be published. Therefore, we decided to do what we can to correct this situation. We discussed this problem with Ershov and came to an idea to write an encyclopedia of algorithms on graphs focusing our main attention on the algorithms already used in programming and their generalizations or modifications. We thought that it is reasonable to group all graphs into certain classes and place the algo rithms developed for each class into a separate book. The existence of trees, i. e. , a class of graphs especially important for programming, also supported this decision. This monograph is the first but, as we hope, not the last book written as part of our project. It was preceded by two books Algorithms on Trees (1984) and Algorithms of Processing of Trees (1990) small editions of which were published at the Computer Center of the Siberian Division of the Russian Academy of Sciences. The books were distributed immediately and this made out our decision to prepare a combined mono graph on the basis of these books even stronger.
https://magrudy-assets.storage.googleapis.com/9789401058049.jpg
115.490000 USD

Graph Theory for Programmers: Algorithms for Processing Trees

by Vladimir A. Evstigneev, Victor N. Kasyanov
Paperback / softback
Book cover image
We are invited to deal with mathematical activity in a sys tematic way [ ... ] one does expect and look for pleasant surprises in this requirement of a novel combination of psy chology, logic, mathematics and technology. Hao Wang, 1970, quoted from(Wang, 1970). The field of mathematics has been ...
Automated Deduction - A Basis for Applications Volume I Foundations - Calculi and Methods Volume II Systems and Implementation Techniques Volume III Applications
We are invited to deal with mathematical activity in a sys tematic way [ ... ] one does expect and look for pleasant surprises in this requirement of a novel combination of psy chology, logic, mathematics and technology. Hao Wang, 1970, quoted from(Wang, 1970). The field of mathematics has been a key application area for automated theorem proving from the start, in fact the very first automatically found the orem was that the sum of two even numbers is even (Davis, 1983). The field of automated deduction has witnessed considerable progress and in the last decade, automated deduction methods have made their way into many areas of research and product development in computer science. For instance, deduction systems are increasingly used in software and hardware verification to ensure the correctness of computer hardware and computer programs with respect to a given specification. Logic programming, while still falling somewhat short of its expectations, is now widely used, deduc tive databases are well-developed and logic-based description and analysis of hard-and software is commonplace today.
https://magrudy-assets.storage.googleapis.com/9789048150526.jpg
292.950000 USD

Automated Deduction - A Basis for Applications Volume I Foundations - Calculi and Methods Volume II Systems and Implementation Techniques Volume III Applications

Paperback / softback
Book cover image
This book covers recent progress in solving propositional satisfiability and related problems. Propositional satisfiability is a powerful and general formalism used to solve a wide range of important problems including hardware and software verification. Research into methods to automate such reasoning has therefore a long history in artificial intelligence. This ...
SAT 2005: Satisfiability Research in the Year 2005
This book covers recent progress in solving propositional satisfiability and related problems. Propositional satisfiability is a powerful and general formalism used to solve a wide range of important problems including hardware and software verification. Research into methods to automate such reasoning has therefore a long history in artificial intelligence. This book follows on from the highly successful volume entitled SAT 2000 published five years ago.
https://magrudy-assets.storage.googleapis.com/9789400787155.jpg
198.450000 USD

SAT 2005: Satisfiability Research in the Year 2005

Paperback / softback
Book cover image
The complexity of issues requiring rational decision making grows and thus such decisions are becoming more and more difficult, despite advances in methodology and tools for decision support and in other areas of research. Globalization, interlinks between environmental, industrial, social and political issues, and rapid speed of change all contribute ...
Model-Based Decision Support Methodology with Environmental Applications
The complexity of issues requiring rational decision making grows and thus such decisions are becoming more and more difficult, despite advances in methodology and tools for decision support and in other areas of research. Globalization, interlinks between environmental, industrial, social and political issues, and rapid speed of change all contribute to the increase of this complexity. Specialized knowledge about decision-making processes and their support is increasing, but a large spectrum of approaches presented in the literature is typically illustrated only by simple examples. Moreover, the integration of model-based decision support methodologies and tools with specialized model-based knowledge developed for handling real problems in environmental, engineering, industrial, economical, social and political activities is often not satisfactory. Therefore, there is a need to present the state of art of methodology and tools for development of model-based decision support systems, and illustrate this state by applications to various complex real-world decision problems. The monograph reports many years of experience of many researchers, who have not only contributed to the developments in operations research but also succeeded to integrate knowledge and craft of various disciplines into several modern decision support systems which have been applied to actual complex decision-making processes in various fields of policy making. The experience presented in this book will be of value to researchers and practitioners in various fields. The issues discussed in this book gain in importance with the development of the new era of the information society, where information, knowledge, and ways of processing them become a decisive part of human activities. The examples presented in this book illustrate how how various methods and tools of model-based decision support can actually be used for helping modern decision makers that face complex problems. Overview of the contents: The first part of this three-part book presents the methodological background and characteristics of modern decision-making environment, and the value of model-based decision support thus addressing current challenges of decision support. It also provides the methodology of building and analyzing mathematical models that represent underlying physical and economic processes, and that are useful for modern decision makers at various stages of decision making. These methods support not only the analysis of Pareto-efficient solutions that correspond best to decision maker preferences but also allow the use of other modeling concepts like soft constraints, soft simulation, or inverse simulation. The second part describes various types of tools that are used for the development of decision support systems. These include tools for modeling, simulation, optimization, tools supporting choice and user interfaces. The described tools are both standard, commercially available, and nonstandard, public domain or shareware software, which are robust enough to be used also for complex applications. All four environmental applications (regional water quality management, land use planning, cost-effective policies aimed at improving the European air quality, energy planning with environmental implications) presented in the third part of the book rely on many years of cooperation between the authors of the book with several IIASA's projects, and with many researchers from the wide IIASA network of collaborating institutions. All these applications are characterized by an intensive use of model-based decision support. Finally, the appendix contains a short description of some of the tools described in the book that are available from IIASA, free of charge, for research and educational purposes. The experiences reported in this book indicate that the development of DSSs for strategic environmental decision making should be a joint effort involving experts in the subject area, modelers, and decision support experts. For the other experiences discussed in this book, the authors stress the importance of good data bases, and good libraries of tools. One of the most important requirements is a modular structure of a DSS that enhances the reusability of system modules. In such modular structures, user interfaces play an important role. The book shows how modern achievements in mathematical programming and computer sciences may be exploited for supporting decision making, especially about strategic environmental problems. It presents the methodological background of various methods for model-based decision support and reviews methods and tools for model development and analysis. The methods and tools are amply illustrated with extensive applications. Audience: This book will be of interest to researchers and practitioners in the fields of model development and analysis, model-based decision analysis and support, (particularly in the environment, economics, agriculture, engineering, and negotiations areas) and mathematical programming. For understanding of some parts of the text a background in mathematics and operational research is required but several chapters of the book will be of value also for readers without such a background. The monograph is also suitable for use as a text book for courses on advanced (Master and Ph.D.) levels for programs on Operations Research, decision analysis, decision support and various environmental studies (depending on the program different parts of the book may be emphasized).
https://magrudy-assets.storage.googleapis.com/9789048154647.jpg
209.990000 USD

Model-Based Decision Support Methodology with Environmental Applications

Paperback / softback
Book cover image
In the mathematics I can report no deficience, except that it be that men do not sufficiently understand the excellent use of the pure mathematics, in that they do remedy and cure many defects in the wit and faculties intellectual. For if the wit be too dull, they sharpen it; ...
Practical Foundations of Business System Specifications
In the mathematics I can report no deficience, except that it be that men do not sufficiently understand the excellent use of the pure mathematics, in that they do remedy and cure many defects in the wit and faculties intellectual. For if the wit be too dull, they sharpen it; if too wandering, they fix it; if too inherent in the sense, they abstract it. Roger Bacon (1214?-1294?) Mathematics-the art and science of effective reasoning. E. W. Dijkstra, 1976 A person who had studied at a good mathematical school can do anything. Ye. Bunimovich, 2000 This is the third book published by Kluwer based on the very successful OOPSLA workshops on behavioral semantics (the first two books were published in 1996 [KH 1996] and 1999 [KRS 1999]). These workshops fostered precise and explicit specifications of business and system semantics, independently of any (possible) realization. Some progress has been made in these areas, both in academia and in industry. At the same time, in too many cases only lip service to elegant specifica tions of semantics has been provided, and as a result the systems we build or buy are all too often not what they are supposed to be. We used to live with that, and quite often users relied on human intermediaries to sort the things out. This approach worked perfectly well for a long time.
https://magrudy-assets.storage.googleapis.com/9789048163670.jpg
208.950000 USD

Practical Foundations of Business System Specifications

Paperback / softback
Book cover image
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the ...
Security for Service Oriented Architectures
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
https://magrudy-assets.storage.googleapis.com/9781466584020.jpg
82.900000 USD

Security for Service Oriented Architectures

by Walter Williams
Paperback / softback
Book cover image
This volume contains thirty revised and extended research articles written by prominent researchers participating in an international conference in engineering technologies and physical science and applications. The conference serves as good platforms for the engineering community to meet with each other and to exchange ideas. The conference has also struck ...
IAENG Transactions on Engineering Technologies: Special Edition of the World Congress on Engineering and Computer Science 2011
This volume contains thirty revised and extended research articles written by prominent researchers participating in an international conference in engineering technologies and physical science and applications. The conference serves as good platforms for the engineering community to meet with each other and to exchange ideas. The conference has also struck a balance between theoretical and application development. The conference is truly international meeting with a high level of participation from many countries. Topics covered include chemical engineering, circuits, communications systems, control theory, engineering mathematics, systems engineering, manufacture engineering, and industrial applications. The book offers the state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science and applications.
https://magrudy-assets.storage.googleapis.com/9789400799257.jpg
188.990000 USD

IAENG Transactions on Engineering Technologies: Special Edition of the World Congress on Engineering and Computer Science 2011

Paperback / softback
Book cover image
Among the most important problems confronting computer science is that of developing a paradigm appropriate to the discipline. Proponents of formal methods - such as John McCarthy, C.A.R. Hoare, and Edgar Dijkstra - have advanced the position that computing is a mathematical activity and that computer science should model itself ...
Program Verification: Fundamental Issues in Computer Science
Among the most important problems confronting computer science is that of developing a paradigm appropriate to the discipline. Proponents of formal methods - such as John McCarthy, C.A.R. Hoare, and Edgar Dijkstra - have advanced the position that computing is a mathematical activity and that computer science should model itself after mathematics. Opponents of formal methods - by contrast, suggest that programming is the activity which is fundamental to computer science and that there are important differences that distinguish it from mathematics, which therefore cannot provide a suitable paradigm. Disagreement over the place of formal methods in computer science has recently arisen in the form of renewed interest in the nature and capacity of program verification as a method for establishing the reliability of software systems. A paper that appeared in Communications of the ACM entitled, `Program Verification: The Very Idea', by James H. Fetzer triggered an extended debate that has been discussed in several journals and that has endured for several years, engaging the interest of computer scientists (both theoretical and applied) and of other thinkers from a wide range of backgrounds who want to understand computer science as a domain of inquiry. The editors of this collection have brought together many of the most interesting and important studies that contribute to answering questions about the nature and the limits of computer science. These include early papers advocating the mathematical paradigm by McCarthy, Naur, R. Floyd, and Hoare (in Part I), others that elaborate the paradigm by Hoare, Meyer, Naur, and Scherlis and Scott (in Part II), challenges, limits and alternatives explored by C. Floyd, Smith, Blum, and Naur (in Part III), and recent work focusing on formal verification by DeMillo, Lipton, and Perlis, Fetzer, Cohn, and Colburn (in Part IV). It provides essential resources for further study. This volume will appeal to scientists, philosophers, and laypersons who want to understand the theoretical foundations of computer science and be appropriately positioned to evaluate the scope and limits of the discipline.
https://magrudy-assets.storage.googleapis.com/9789401047890.jpg
492.450000 USD

Program Verification: Fundamental Issues in Computer Science

Paperback / softback
Book cover image
This book includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computing Sciences, Software Engineering and Systems. The book presents selected papers from the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2006). All aspects ...
Advances and Innovations in Systems, Computing Sciences and Software Engineering
This book includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Computing Sciences, Software Engineering and Systems. The book presents selected papers from the conference proceedings of the International Conference on Systems, Computing Sciences and Software Engineering (SCSS 2006). All aspects of the conference were managed on-line.
https://magrudy-assets.storage.googleapis.com/9789048175888.jpg
187.950000 USD

Advances and Innovations in Systems, Computing Sciences and Software Engineering

Paperback / softback
Book cover image
This work, a tribute to renowned researcher Robert Paige, is a collection of revised papers published in his honor in the Higher-Order and Symbolic Computation Journal in 2003 and 2005. Among them there are two key papers: a retrospective view of his research lines, and a proposal for future studies ...
Automatic Program Development: A Tribute to Robert Paige
This work, a tribute to renowned researcher Robert Paige, is a collection of revised papers published in his honor in the Higher-Order and Symbolic Computation Journal in 2003 and 2005. Among them there are two key papers: a retrospective view of his research lines, and a proposal for future studies in the area of the automatic program derivation. The book also includes some papers by members of the IFIP Working Group 2.1 of which Bob was an active member.
https://magrudy-assets.storage.googleapis.com/9789048176748.jpg
166.950000 USD

Automatic Program Development: A Tribute to Robert Paige

Paperback / softback
Book cover image
The nationwide research project `Deduktion', funded by the `Deutsche Forschungsgemeinschaft (DFG)' for a period of six years, brought together almost all research groups within Germany engaged in the field of automated reasoning. Intensive cooperation and exchange of ideas led to considerable progress both in the theoretical foundations and in the ...
Automated Deduction - A Basis for Applications Volume I Foundations - Calculi and Methods Volume II Systems and Implementation Techniques Volume III Applications
The nationwide research project `Deduktion', funded by the `Deutsche Forschungsgemeinschaft (DFG)' for a period of six years, brought together almost all research groups within Germany engaged in the field of automated reasoning. Intensive cooperation and exchange of ideas led to considerable progress both in the theoretical foundations and in the application of deductive knowledge. This three-volume book covers these original contributions moulded into the state of the art of automated deduction. The three volumes are intended to document and advance a development in the field of automated deduction that can now be observed all over the world. Rather than restricting the interest to purely academic research, the focus now is on the investigation of problems derived from realistic applications. In fact industrial applications are already pursued on a trial basis. In consequence the emphasis of the volumes is not on the presentation of the theoretical foundations of logical deduction as such, as in a handbook; rather the books present the concepts and methods now available in automated deduction in a form which can be easily accessed by scientists working in applications outside of the field of deduction. This reflects the strong conviction that automated deduction is on the verge of being fully included in the evolution of technology. Volume I focuses on basic research in deduction and on the knowledge on which modern deductive systems are based. Volume II presents techniques of implementation and details about system building. Volume III deals with applications of deductive techniques mainly, but not exclusively, to mathematics and the verification of software. Each chapter was read by two referees, one an international expert from abroad and the other a knowledgeable participant in the national project. It has been accepted for inclusion on the basis of these review reports. Audience: Researchers and developers in software engineering, formal methods, certification, verification, validation, specification of complex systems and software, expert systems, natural language processing.
https://magrudy-assets.storage.googleapis.com/9789048150502.jpg
314.990000 USD

Automated Deduction - A Basis for Applications Volume I Foundations - Calculi and Methods Volume II Systems and Implementation Techniques Volume III Applications

Paperback / softback
Book cover image
Hardware Software Co-Design of a Multimedia SOC Platform is one of the first of its kinds to provide a comprehensive overview of the design and implementation of the hardware and software of an SoC platform for multimedia applications. Topics covered in this book range from system level design methodology, multimedia ...
Hardware Software Co-Design of a Multimedia SOC Platform
Hardware Software Co-Design of a Multimedia SOC Platform is one of the first of its kinds to provide a comprehensive overview of the design and implementation of the hardware and software of an SoC platform for multimedia applications. Topics covered in this book range from system level design methodology, multimedia algorithm implementation, a sub-word parallel, single-instruction-multiple data (SIMD) processor design, and its virtual platform implementation, to the development of an SIMD parallel compiler as well as a real-time operating system (RTOS). Hardware Software Co-Design of a Multimedia SOC Platform is written for practitioner engineers and technical managers who want to gain first hand knowledge about the hardware-software design process of an SoC platform. It offers both tutorial-like details to help readers become familiar with a diverse range of subjects, and in-depth analysis for advanced readers to pursue further.
https://magrudy-assets.storage.googleapis.com/9789048181711.jpg
136.490000 USD

Hardware Software Co-Design of a Multimedia SOC Platform

by Yu Hen Hu, Pao-Ann Hsiung, Guang-Huei Lin, Sao-Jie Chen
Paperback / softback
Page 1 of 9