Browse Results

Showing 10,326 through 10,350 of 83,303 results

Practical Parallel Rendering

by Alan Chalmers Erik Reinhard Tim Davis

Meeting the growing demands for speed and quality in rendering computer graphics images requires new techniques. Practical parallel rendering provides one of the most practical solutions. This book addresses the basic issues of rendering within a parallel or distributed computing environment, and considers the strengths and weaknesses of multiprocessor machines and networked render farms for graphics rendering. Case studies of working applications demonstrate, in detail, practical ways of dealing with complex issues involved in parallel processing.

Practical Software Reuse (Practitioner Series)

by Michel Ezran Maurizio Morisio Colin Tully

Software reuse promises high value to businesses that develop software, opening the door to radical improvements in productivity, cost, and time to market. This book is for those who are wondering whether they should adopt reuse and how, and also for those who have already started to adopt it but are wondering where they may be going wrong and how they could do better. It emphasizes the practical issues that influence success or failure in reuse; and offers a concise and balanced coverage of the essentials.

Practical Web Database Design

by Chris Auld Allan Kent Rudy Limeback Nigel Stanger Thearon Willis

Although many web professionals will have incorporated a database into a web site before, they may not have much experience of designing them - this book will teach you all you need to know about designing a database for use with a web site or web application. From first principles to designing a successful web database, this book will show you how to get the most out of database design. From the Publisher Unlike other database design books in the market, this one focuses on design of databases for use on the Web. Web databases benefit from good general database design principles, but also have their own set of caveats, which must be considered for their design to be truly successful. This book covers both the general, and the web-specific database principles.

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results

by Peter Fletcher Alex Poon Ben Pearce Peter Comber

Once you've got a web site up and running it is all too easy to sit back and relax. But how do you know you did a good job? How can you improve the site you have based on real user behaviour? Without getting feedback from your users, how will you find out how it's being used? Web traffic analysis allows you to gain some insight into your site users: where they come from, what pages they like, and how often they come back. However, as statistics are prone to being misinterpreted, your insight often has to be taken with a pinch of salt. This book takes you through the process of analyzing your traffic, without taking for granted the statistics that you generate. Assuming you have a web site, reading this book will help you learn: - The techniques for gathering data on your users - Standards and Guidelines you should adhere to when interpreting your data - What other sites are doing to ensure they respect the privacy of their users - Insight into how real sites use web traffic analysis - Major case case studies from BBC News Online, eBay, and ASPToday - Additional material from The Onion, SmartGirl, and The New York Times From the Publisher This book is for any web professional who wants to understand their site traffic. It's also for anyone with an interest in finding out where their site is most used, and how to make comparisons with other sites. To get the most from this book, you'll need access to log files for your web site as they contain the information we'll show you how to analyze. The book discusses the privacy practices of The Onion, SmartGirl, and The New York Times, as well as examining in detail the traffic analysis techniques used by BBC News Online, eBay, and ASPToday.

Preservation of the Integrity of Electronic Records (The Archivist's Library #2)

by L. Duranti T. Eastwood H. MacNeil

By Terry Eastwood This book reports the findings of a research project on the means of protecting the integrity of active and semi-active electronic records. The project, which is commonly referred to as "the UBC Project," was conceived by two of the authors of this book, Luciana Duranti and Terry Eastwood, and conducted between 1994 and 1997. The third author, Heather MacNeil, who worked formally as the principal research assistant on the project, acted as an equal in the research and in the writing of this book. The project investigated a number of fundamental questions that have arisen over the past decade as a consequence of the rapid development and use of computer technology for the creation, maintenance, and preservation of recorded information. One of the first comprehensive studies of the issues associated with the management of electronic records was conducted by the United Nations. The study, commonly known as the ACCIS report, aimed to "develop guidelines for implementation of electronic archives and records management programmes for use by United Nations organizations, taking into account traditional archives and records management practices. " The report of the study of electronic records in eighteen United Nations organizations identified a number of enduring issues. It recognized that the United Nations had to "distinguish between record and non-record material. "l It recognized the problem of ensuring the authenticity of records, which, rather narrowly, it construed as "assuring legality.

Principles and Practice of Constraint Programming - CP 2002: 8th International Conference, CP 2002, Ithaca, NY, USA, September 9-13, 2002, Proceedings (Lecture Notes in Computer Science #2470)

by Pascal Van Hentenryck

This book constitutes the refereed proceedings of the 8th International Conference on Principles and Practice of Constraint Programming, CP 2002, held in Ithaca, NY, USA in September 2002.The 38 revised full papers and 6 innovative application papers as well as the 14 short papers presented toghether with 25 abstracts from contributions to the doctoral program were carefully reviewed and selected from 146 submissions. All current issues in constraint processing are addressed, ranging from theoretical and foundational issues to application in various fields.

Principles of 3D Image Analysis and Synthesis (The Springer International Series in Engineering and Computer Science #556)

by Bernd Girod Günther Greiner Heinrich Niemann

Traditionally, say 15 years ago, three-dimensional image analysis (aka computer vi­ sion) and three-dimensional image synthesis (aka computer graphics) were separate fields. Rarely were expert

Principles of Digital Transmission: With Wireless Applications (Information Technology: Transmission, Processing and Storage)

by Sergio Benedetto Ezio Biglieri

Principles of Digital Transmission is designed for advanced undergraduate and graduate level students and professions in telecommunications. Teachers and learners can mix and match chapters to create four distinct courses: (1) a one-term basic course in digital communications; (2) a one-term course in advanced digital communications; (3) a one-term course in information theory and coding; (4) a two-term course sequence in digital communications and coding. The book provides rigorous mathematical tools for the analysis and design of digital transmission systems. The authors emphasize methodology in their aim to teach the reader how to do it rather than how it is done. They apply the fundamental tools of the discipline onto a number of systems, such as wireless data transmission systems.

Principles of Nonparametric Learning (CISM International Centre for Mechanical Sciences #434)

by Laszlo Györfi

This volume provides a systematic in-depth analysis of nonparametric learning. It covers the theoretical limits and the asymptotical optimal algorithms and estimates, such as pattern recognition, nonparametric regression estimation, universal prediction, vector quantization, distribution and density estimation, and genetic programming.

Principles of Secure Network Systems Design

by Sumit Ghosh

A fundamental and comprehensive framework for network security designed for military, government, industry, and academic network personnel. Scientific validation of "security on demand" through computer modeling and simulation methods. The book presents an example wherein the framework is utilized to integrate security into the operation of a network. As a result of the integration, the inherent attributes of the network may be exploited to reduce the impact of security on network performance and the security availability may be increased down to the user level. The example selected is the ATM network which is gaining widespread acceptance and use.

Probabilistic Logic in a Coherent Setting (Trends in Logic #15)

by Giulianella Coletti R. Scozzafava

The approach to probability theory followed in this book (which differs radically from the usual one, based on a measure-theoretic framework) characterizes probability as a linear operator rather than as a measure, and is based on the concept of coherence, which can be framed in the most general view of conditional probability. It is a `flexible' and unifying tool suited for handling, e.g., partial probability assessments (not requiring that the set of all possible `outcomes' be endowed with a previously given algebraic structure, such as a Boolean algebra), and conditional independence, in a way that avoids all the inconsistencies related to logical dependence (so that a theory referring to graphical models more general than those usually considered in bayesian networks can be derived). Moreover, it is possible to encompass other approaches to uncertain reasoning, such as fuzziness, possibility functions, and default reasoning. The book is kept self-contained, provided the reader is familiar with the elementary aspects of propositional calculus, linear algebra, and analysis.

Probability and Statistics with Reliability, Queuing, and Computer Science Applications

by Kishor S. Trivedi

An accessible introduction to probability, stochastic processes, and statistics for computer science and engineering applicationsSecond edition now also available in Paperback. This updated and revised edition of the popular classic first edition relates fundamental concepts in probability and statistics to the computer sciences and engineering. The author uses Markov chains and other statistical tools to illustrate processes in reliability of computer systems and networks, fault tolerance, and performance.This edition features an entirely new section on stochastic Petri nets—as well as new sections on system availability modeling, wireless system modeling, numerical solution techniques for Markov chains, and software reliability modeling, among other subjects. Extensive revisions take new developments in solution techniques and applications into account and bring this work totally up to date. It includes more than 200 worked examples and self-study exercises for each section.Probability and Statistics with Reliability, Queuing and Computer Science Applications, Second Edition offers a comprehensive introduction to probability, stochastic processes, and statistics for students of computer science, electrical and computer engineering, and applied mathematics. Its wealth of practical examples and up-to-date information makes it an excellent resource for practitioners as well. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.

Probability and Statistics with Reliability, Queuing, and Computer Science Applications

by Kishor S. Trivedi

An accessible introduction to probability, stochastic processes, and statistics for computer science and engineering applicationsSecond edition now also available in Paperback. This updated and revised edition of the popular classic first edition relates fundamental concepts in probability and statistics to the computer sciences and engineering. The author uses Markov chains and other statistical tools to illustrate processes in reliability of computer systems and networks, fault tolerance, and performance.This edition features an entirely new section on stochastic Petri nets—as well as new sections on system availability modeling, wireless system modeling, numerical solution techniques for Markov chains, and software reliability modeling, among other subjects. Extensive revisions take new developments in solution techniques and applications into account and bring this work totally up to date. It includes more than 200 worked examples and self-study exercises for each section.Probability and Statistics with Reliability, Queuing and Computer Science Applications, Second Edition offers a comprehensive introduction to probability, stochastic processes, and statistics for students of computer science, electrical and computer engineering, and applied mathematics. Its wealth of practical examples and up-to-date information makes it an excellent resource for practitioners as well. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department.

Probability Distributions Involving Gaussian Random Variables: A Handbook for Engineers and Scientists

by Marvin K. Simon

This handbook, now available in paperback, brings together a comprehensive collection of mathematical material in one location. It also offers a variety of new results interpreted in a form that is particularly useful to engineers, scientists, and applied mathematicians. The handbook is not specific to fixed research areas, but rather it has a generic flavor that can be applied by anyone working with probabilistic and stochastic analysis and modeling. Classic results are presented in their final form without derivation or discussion, allowing for much material to be condensed into one volume.

Probleme lösen: In komplexen Zusammenhängen denken

by Robert Sell Ralf Schimweg

"...nützlich für jeden, der sich mit Problemen herumschlagen muß - oder möchte. ... dargeboten in einer verständlichen Sprache..." (Die Zeit)

Process Algebra and Probabilistic Methods: Second Joint International Workshop PAPM-PROBMIV 2002, Copenhagen, Denmark, July 25-26, 2002 Proceedings (Lecture Notes in Computer Science #2399)

by Holger Hermanns Roberto Segala

This volume contains the proceedings of the second joint PAPM-PROBMIV Workshop, held at the University of Copenhagen, Denmark, July 25–26, 2002 as part of the Federated Logic Conference (FLoC 2002). The PAPM-PROBMIV workshop results from the combination of two wo- shops: PAPM (Process Algebras and Performance Modeling) and PROBMIV (Probabilistic Methods in Veri?cation). The aim of the joint workshop is to bring together the researchers working across the whole spectrum of techniques for the modeling, speci?cation, analysis, and veri?cation of probabilistic systems. Probability is widely used in the design and analysis of software and hardware systems, as a means to derive e?cient algorithms (e.g. randomization), as a model for unreliable or unpredictable behavior (as in the study of fault-tolerant systems and computer networks), and as a tool to study performance and - pendability properties. The topics of the workshop include speci?cation, m- els, and semantics of probabilistic systems, analysis and veri?cation techniques, probabilistic methods for the veri?cation of non-probabilistic systems, and tools and case studies. The ?rst PAPM workshop was held in Edinburgh in 1993; the following ones were held in Regensberg (1994), Edinburgh (1995), Turin (1996), Enschede (1997), Nice (1998), Zaragoza (1999), and Geneva (2000). The ?rst PROBMIV workshop was held in Indianapolis, Indiana (1998); the next one took place in Eindhoven (1999). In 2000, PROBMIV was replaced by a Dagstuhl seminar on Probabilistic Methods in Veri?cation.

Process Algebra with Timing (Monographs in Theoretical Computer Science. An EATCS Series)

by J.C.M. Baeten C.A. Middelburg

Timing issues are of growing importance for the conceptualization and design of computer-based systems. Timing may simply be essential for the correct behaviour of a system, e.g. of a controller. Even if timing is not essential for the correct behaviour of a system, there may be good reasons to introduce it in such a way that suitable timing becomes relevant for the correct behaviour of a complex system. This book is unique in presenting four algebraic theories about processes, each dealing with timing from a different point of view, in a coherent and systematic way. The timing of actions is either relative or absolute and the underlying time scale is either discrete or continuous.

Product Focused Software Process Improvement: 4th International Conference, PROFES 2002 Rovaniemi, Finland, December 9-11, 2002, Proceedings (Lecture Notes in Computer Science #2559)

by Markku Oivo Seija Komi-Sirviö

On behalf of the PROFES organizing committee we would like to welcome you to the 4th International Conference on Product Focused Software Process Impro- ment (PROFES 2002) in Rovaniemi, Finland. The conference was held on the Arctic Circle in exotic Lapland under the Northern Lights just before Christmas time, when Kaamos (the polar night is known in Finnish as ”Kaamos”) shows its best characteristics. PROFES has established itself as one of the recognized international process improvement conferences. Despite the current economic downturn, PROFES has attracted a record number of submissions. A total of 70 full papers were subm- ted and the program committee had a di?cult task in selecting the best papers to be presented at the conference. The main theme of PROFES is professional software process improvement (SPI) motivated by product and service quality needs. SPI is facilitated by so- ware process assessment, software measurement, process modeling, and techn- ogy transfer. It has become a practical tool for quality software engineering and management. The conference addresses both the solutions found in practice and the relevant research results from academia.

Professional Design Patterns in VB .NET: Building Adaptable Applications

by Chaur Wu Tom Fischer Peter Stromquist John Slater

* Explains through case studies how design patterns can improve the design of the individual tiers in an application. * Shows how design patterns can be used in conjunction with .NET Remoting across the tiers in an application. * The emphasis throughout is on how design patterns can be used in real applications to write more robust and flexible code.

A Programmer’s Guide to ADO.NET in C#

by Mahesh Chand Mike Gold

A Programmer's Guide to ADO.NET in C# begins by taking readers through a fast-paced overview of C# and then delves into ADO.NET. Why should C# programmers use it instead of the existing technologies? What new functionality does it offer? The chapters that follow go through the details on each of the major Data Providers of the .NET platform (OleDb, SQL Server, and ODBC) that enable you to read and write data to the targeted database. These chapters also serve as a good reference for looking up detailed methods and properties for these data provider classes. Authors Chand and Gold also show C# programmers how to work with XML classes and how to integrate XML into the ADO.NET architecture.The book provides programmers with handy ideas about taking advantage of the VS.NET IDE and how you can tie your data to the myriad of powerful controls including the multi-faceted Data Grid. Finally, it goes through creating a guest book application for the Web so you can see how all the pieces fit together.

Programmieren lernen mit Perl (Xpert.press)

by Joachim Ziegler

Das vorliegende Buch bietet eine vollständige Einführung in die imperativ-prozedurale Programmierung anhand der Skriptsprache Perl. Die sukzessive Einführung von Sprachkonstrukten mittels vieler praxisrelevanter Beispiele erleichtert das systematische Erlernen dieser und auch anderer imperativer Programmiersprachen wie C oder Pascal. Die in das Buch aufgenommenen Übungen sind genau auf die Lerninhalte abgestimmt, so daß sich der Text hervorragend zum Selbststudium eignet. Die Darstellung erfolgt in einer Weise, die es auch dem Anfänger ermöglicht, in kurzer Zeit fundierte Programmierfertigkeiten zu entwickeln. Dabei steht das Erlernen der algorithmischen Denkweise und deren Umsetzung in Programm-Code im Vordergrund. Die hierdurch vermittelten Grundlagen sind wesentlich für ein Verständnis objektorientierter Sprachen wie C++ oder Java, Das Buch ist aus der längjährigen Erfahrung des Autors in der Ausbildung von Softwareentwicklern hervorgegangen.

Programmieren spielend gelernt mit dem Java-Hamster-Modell

by Dietrich Boles

Mit dem Hamster-Modell wird Programmieranfängern ein einfaches aber mächtiges Modell zur Verfügung gestellt, mit dessen Hilfe Grundkonzepte der Programmierung auf spielerische Art und Weise erlernt werden.

Programming Constraint Services: High-Level Programming of Standard and New Constraint Services (Lecture Notes in Computer Science #2302)

by Christian Schulte

Constraint Programming is an approach for modeling and solving combi- torial problems that has proven successful in many applications. It builds on techniques developed in Arti?cial Intelligence, Logic Programming, and - erations Research. Key techniques are constraint propagation and heuristic search. Constraint Programming is based on an abstraction that decomposes a problem solver into a reusable constraint engine and a declarative program modeling the problem. The constraint engine implements the required pr- agation and search algorithms. It can be realized as a library for a general purpose programming language (e.g. C++), as an extension of an existing language (e.g. Prolog), or as a system with its own dedicated language. The present book is concerned with the architecture and implementation of constraint engines. It presents a new, concurrent architecture that is far superior to the sequential architecture underlying Prolog. The new archit- ture is based on concurrent search with copying and recomputation rather than sequential search with trailing and backtracking. One advantage of the concurrent approach is that it accommodates any search strategy. Furth- more, it considerably simpli?es the implementation of constraint propagation algorithms since it eliminates the need to account for trailing and backtra- ing. The book investigates an expressive generalization of the concurrent - chitecture that accommodates propagation-preserving combinators (known as deep guard combinators) for negation, disjunction, implication, and re- cation of constraint propagators. Such combinators are beyond the scope of Prolog’s technology. In the concurrent approach they can be obtained with a re?ective encapsulation primitive.

Refine Search

Showing 10,326 through 10,350 of 83,303 results