Browse Results

Showing 83,026 through 83,050 of 83,302 results

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis

by Colleen McCue

It is now possible to predict the future when it comes to crime. In Data Mining and Predictive Analysis, Dr. Colleen McCue describes not only the possibilities for data mining to assist law enforcement professionals, but also provides real-world examples showing how data mining has identified crime trends, anticipated community hot-spots, and refined resource deployment decisions. In this book Dr. McCue describes her use of "off the shelf" software to graphically depict crime trends and to predict where future crimes are likely to occur. Armed with this data, law enforcement executives can develop "risk-based deployment strategies," that allow them to make informed and cost-efficient staffing decisions based on the likelihood of specific criminal activity.Knowledge of advanced statistics is not a prerequisite for using Data Mining and Predictive Analysis. The book is a starting point for those thinking about using data mining in a law enforcement setting. It provides terminology, concepts, practical application of these concepts, and examples to highlight specific techniques and approaches in crime and intelligence analysis, which law enforcement and intelligence professionals can tailor to their own unique situation and responsibilities.* Serves as a valuable reference tool for both the student and the law enforcement professional* Contains practical information used in real-life law enforcement situations* Approach is very user-friendly, conveying sophisticated analyses in practical terms

Handbook of Constraint Programming (ISSN)

by Toby Walsh

Constraint programming is a powerful paradigm for solving combinatorial search problems that draws on a wide range of techniques from artificial intelligence, computer science, databases, programming languages, and operations research. Constraint programming is currently applied with success to many domains, such as scheduling, planning, vehicle routing, configuration, networks, and bioinformatics.The aim of this handbook is to capture the full breadth and depth of the constraint programming field and to be encyclopedic in its scope and coverage. While there are several excellent books on constraint programming, such books necessarily focus on the main notions and techniques and cannot cover also extensions, applications, and languages. The handbook gives a reasonably complete coverage of all these lines of work, based on constraint programming, so that a reader can have a rather precise idea of the whole field and its potential. Of course each line of work is dealt with in a survey-like style, where some details may be neglected in favor of coverage. However, the extensive bibliography of each chapter will help the interested readers to find suitable sources for the missing details. Each chapter of the handbook is intended to be a self-contained survey of a topic, and is written by one or more authors who are leading researchers in the area.The intended audience of the handbook is researchers, graduate students, higher-year undergraduates and practitioners who wish to learn about the state-of-the-art in constraint programming. No prior knowledge about the field is necessary to be able to read the chapters and gather useful knowledge. Researchers from other fields should find in this handbook an effective way to learn about constraint programming and to possibly use some of the constraint programming concepts and techniques in their work, thus providing a means for a fruitful cross-fertilization among different research areas.The handbook is organized in two parts. The first part covers the basic foundations of constraint programming, including the history, the notion of constraint propagation, basic search methods, global constraints, tractability and computational complexity, and important issues in modeling a problem as a constraint problem. The second part covers constraint languages and solver, several useful extensions to the basic framework (such as interval constraints, structured domains, and distributed CSPs), and successful application areas for constraint programming.- Covers the whole field of constraint programming- Survey-style chapters- Five chapters on applications

Introduction to Financial Technology (Complete Technology Guides for Financial Services)

by Roy S. Freedman

The financial technology environment is a dynamic, high-pressured, fast-paced world in which developing fast and efficient buy-and-sell order processing systems and order executing (clearing and settling) systems is of primary importance. The orders involved come from an ever-changing network of people (traders, brokers, market makers) and technology. To prepare people to succeed in this environment, seasoned financial technology veteran Roy Freedman presents both the technology and the finance side in this comprehensive overview of this dynamic area. He covers the broad range of topics involved in this industry--including auction theory, databases, networked computer clusters, back-office operations, derivative securities, regulation, compliance, bootstrap statistics, optimization, and risk management—in order to present an in-depth treatment of the current state-of-the-art in financial technology. Each chapter concludes with a list of exercises; a list of references; a list of websites for further information; and case studies. With amazing clarity, Freedman explains both the technology side and the finance side of financial technology Accessible to both finance professionals needing to upgrade their technology knowledge and technology specialists needing to upgrade their finance knowledge

Modern Information Processing: From Theory to Applications

by Bernadette Bouchon-Meunier, Giulianella Coletti, Ronald R. Yager

The volume "Modern Information Processing: From Theory to Applications," edited by Bernadette Bouchon-Meunier, Giulianella Coletti and Ronald Yager, is a collection of carefully selected papers drawn from the program of IPMU'04, which was held in Perugia, Italy. The book represents the cultural policy of IPMU conference which is not focused on narrow range of methodologies, but on the contrary welcomes all the theories for the management of uncertainty and aggregation of information in intelligent systems, providing a medium for the exchange of ideas between theoreticians and practitioners in these and related areas. The book is composed by 7 sections: UNCERTAINTYPREFERENCESCLASSIFICATION AND DATA MININGAGGREGATION AND MULTI-CRITERIA DECISION MAKINGKNOWLEDGE REPRESENTATION•The book contributes to enhancement of our ability to deal effectively with uncertainty in all of its manifestations. •The book can help to build brigs among theories and methods methods for the management of uncertainty. •The book addresses issues which have a position of centrality in our information-centric world. •The book presents interesting results devoted to representing knowledge: the goal is to capture the subtlety of human knowledge (richness) and to allow computer manipulation (formalization). •The book contributes to the goal: an efficient use of the information for a good decision strategy.APPLIED DOMAINS· The book contributes to enhancement of our ability to deal effectively with uncertainty in all of its manifestations.· The book can help to build brigs among theories and methods methods for the management of uncertainty.· The book addresses issues which have a position of centrality in our information-centric world.· The book presents interesting results devoted to representing knowledge: the goal is to capture the subtlety of human knowledge (richness) and to allow computer manipulation (formalization).· The book contributes to the goal: an efficient use of the information for a good decision strategy.

Grid Computing: The New Frontier of High Performance Computing (ISSN #Volume 14)

by Lucio Grandinetti

The book deals with the most recent technology of distributed computing.As Internet continues to grow and provide practical connectivity between users of computers it has become possible to consider use of computing resources which are far apart and connected by Wide Area Networks.Instead of using only local computing power it has become practical to access computing resources widely distributed. In some cases between different countries in other cases between different continents.This idea of using computer power is similar to the well known electric power utility technology. Hence the name of this distributed computing technology is the Grid Computing.Initially grid computing was used by technologically advanced scientific users.They used grid computing to experiment with large scale problems which required high performance computing facilities and collaborative work.In the next stage of development the grid computing technology has become effective and economically attractive for large and medium size commercial companies.It is expected that eventually the grid computing style of providing computing power will become universal reaching every user in industry and business.* Written by academic and industrial experts who have developed or used grid computing* Many proposed solutions have been tested in real life applications* Covers most essential and technically relevant issues in grid computing

Parallel Computational Fluid Dynamics 2004: Multidisciplinary Applications

by Jacques Periaux Pat Fox A. Ecer N. Satofuka Gabriel Winter

Parallel CFD 2004, the sixteenth international conference on Parallel Computational Fluid Dynamics and other modern scientific domains, has been held since May 24th till May 27th, 2004 in Las Palmas de Gran Canaria, Spain. The specialized, high-level Parallel CFD conferences are organised on travelling locations all over the world, yearly because of multidisciplinary subject of parallel CFD and its rapidly evolving nature.The conference featured 8 invited lectures, 3 Mini Symposia, contributed papers and one Tutorial & Short Course. More than 80 multi-disciplinary presentations of the Parallel CFD had been presented, with participants from 17 countries. The sessions involved contributed papers on many diverse subjects including turbulence, complex flows, unstructured and adaptive grids, industrial applications, developments in software tools and environments as parallel optimization tools. This Book presents an up-to-date overview of the state of the art in parallel computational fluid dynamics.- Report on current research in the field.- Researchers around the world are included.- Subject is important to all interested in solving large fluid dynamics problems.- It is of interest to researchers in computer science, engineering and physical sciences.- It is an interdisciplinary activity. Contributions include scientists with a variety of backgrounds.- It is an area which is rapidly changing.

IM Instant Messaging Security

by John Rittinghouse, PhD, CISM James F. Ransome, PhD, CISM, CISSP

There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM securityAddresses IM security for day-to-day operations and management of IM-capable networks in today’s corporate environment

Fuzzy Logic and the Semantic Web (ISSN #Volume 1)

by Elie Sanchez

These are exciting times in the fields of Fuzzy Logic and the Semantic Web, and this book will add to the excitement, as it is the first volume to focus on the growing connections between these two fields. This book is expected to be a valuable aid to anyone considering the application of Fuzzy Logic to the Semantic Web, because it contains a number of detailed accounts of these combined fields, written by leading authors in several countries. The Fuzzy Logic field has been maturing for forty years. These years have witnessed a tremendous growth in the number and variety of applications, with a real-world impact across a wide variety of domains with humanlike behavior and reasoning. And we believe that in the coming years, the Semantic Web will be major field of applications of Fuzzy Logic. This book, the first in the new series Capturing Intelligence, shows the positive role Fuzzy Logic, and more generally Soft Computing, can play in the development of the Semantic Web, filling a gap and facing a new challenge. It covers concepts, tools, techniques and applications exhibiting the usefulness, and the necessity, for using Fuzzy Logic in the Semantic Web. It finally opens the road to new systems with a high Web IQ. Most of today's Web content is suitable for human consumption. The Semantic Web is presented as an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. For example, within the Semantic Web, computers will understand the meaning of semantic data on a web page by following links to specified ontologies. But while the Semantic Web vision and research attracts attention, as long as it will be used two-valued-based logical methods no progress will be expected in handling ill-structured, uncertain or imprecise information encountered in real world knowledge. Fuzzy Logic and associated concepts and techniques (more generally, Soft Computing), has certainly a positive role to play in the development of the Semantic Web. Fuzzy Logic will not supposed to be the basis for the Semantic Web but its related concepts and techniques will certainly reinforce the systems classically developed within W3C. In fact, Fuzzy Logic cannot be ignored in order to bridge the gap between human-understandable soft logic and machine-readable hard logic. None of the usual logical requirements can be guaranteed: there is no centrally defined format for data, no guarantee of truth for assertions made, no guarantee of consistency. To support these arguments, this book shows how components of the Semantic Web (like XML, RDF, Description Logics, Conceptual Graphs, Ontologies) can be covered, with in each case a Fuzzy Logic focus.First volume to focus on the growing connections between Fuzzy Logic and the Semantic WebKeynote chapter by Lotfi ZadehThe Semantic Web is presently expected to be a major field of applications of Fuzzy LogicIt fills a gap and faces a new challenge in the development of the Semantic WebIt opens the road to new systems with a high Web IQContributed chapters by Fuzzy Logic leading experts

Managing Microsoft's Remote Installation Services

by Soren Rasmussen Michael Iversen

BRIEF DESCRIPTION OF CONTENT: The authors have been working with Remote Installation Services since its birth in 1999. We are really enthusiastic about working with it. From their experiences from very different customers with very different requirements to their Windows infrastructure environment, they have gained a tremendous deal of experience and in-depth knowledge with Remote Installation Services that other people can benefit from. This includes basic understanding, a lot of theory and best-practices, but also how you can stretch Remote Installation Services to really do what any system or network administrator would require. This information is essential for anyone wishing to implement Remote Installation Services and use the advanced features and tools it contains. There is much more than up grades, adding and deleting programs from a central administrator that can be done In addition it can save the cost adding a costly third party software package like Alteris to the enterprise network. This is the reason that the authors are now gathering all the experience and knowledge, and focusing on forming a single point of entry to everything you must know about Remote Installation Services in form of a book. Note based on my (TRS) and reviewers comments the book will be over 320 pages as authors ad numerous consulting client examples and illustrations UNIQUE FEATURE: Book is excellent companion to Windows and Exchange series and WMI books by Lissoir: Authors are top quality IBM Consultants· Gives Network and Systems Administrators real tools to manage up grades, program modifications and system and security related tools · Presents a balance of theory and methods with best-practices the authors have developed in their consulting work· Shows how an enterprise can save the cost adding a costly third party software package like Alteris to the enterprise network

Joe Celko's SQL for Smarties: Advanced SQL Programming (The Morgan Kaufmann Series in Data Management Systems)

by Joe Celko

SQL for Smarties was hailed as the first book devoted explicitly to the advanced techniques needed to transform an experienced SQL programmer into an expert. Now, 10 years later and in the third edition, this classic still reigns supreme as the book written by an SQL master that teaches future SQL masters. These are not just tips and techniques; Joe also offers the best solutions to old and new challenges and conveys the way you need to think in order to get the most out of SQL programming efforts for both correctness and performance. In the third edition, Joe features new examples and updates to SQL-99, expanded sections of Query techniques, and a new section on schema design, with the same war-story teaching style that made the first and second editions of this book classics.Expert advice from a noted SQL authority and award-winning columnist, who has given ten years of service to the ANSI SQL standards committee and many more years of dependable help to readers of online forums.Teaches scores of advanced techniques that can be used with any product, in any SQL environment, whether it is an SQL-92 or SQL-99 environment.Offers tips for working around system deficiencies.Continues to use war stories--updated!--that give insights into real-world SQL programming challenges.

Globus® Toolkit 4: Programming Java Services (The Morgan Kaufmann Series in Networking)

by Borja Sotomayor Lisa Childers

The Globus Toolkit is a key technology in Grid Computing, the exciting new computing paradigm that allows users to share processing power, data, storage, and other computing resources across institutional and geographic boundaries. Globus Toolkit 4: Programming Java Services provides an introduction to the latest version of this widely acclaimed toolkit. Based on the popular web-based The Globus Toolkit 4 Programmer's Tutorial, this book far surpasses that document, providing greater detail, quick reference appendices, and many additional examples. If you’re making the leap into Grid Computing using the Globus Toolkit, you’ll want Globus Toolkit 4: Programming Java Services at your side as you take your first steps.Written for newcomers to Globus Toolkit, but filled with useful information for experienced users.Clearly situates Globus application development within the context of Web Services and evolving Grid standards.Provides detailed coverage of Web Services programming with the Globus Toolkit's Java WS Core component.Covers basic aspects of developing secure services using the Grid Security Infrastructure (GSI).Uses simple, didactic examples throughout the book, but also includes a more elaborate example, the FileBuy application, that showcases common design patterns found in Globus applications.Concludes with useful reference appendices.

Programming with Quartz: 2D and PDF Graphics in Mac OS X (The Morgan Kaufmann Series in Computer Graphics)

by David Gelphman Bunny Laden

Written by members of the development team at Apple, Programming with Quartz is the first book to describe the sophisticated graphics system of Mac OS X. By using the methods described in this book, developers will be able to fully exploit the state-of-the-art graphics capabilities of Mac OS X in their applications, whether for Cocoa or Carbon development. This book also serves as an introduction to 2D graphics concepts, including how images are drawn and how color is rendered. It includes guidance for working with PDF documents, drawing bitmap graphics, using Quartz built-in color management, and drawing text. Programming with Quartz is a rich resource for new and experienced Mac OS X developers, Cocoa and Carbon programmers, UNIX developers who are migrating to Mac OS X, and anyone interested in powerful 2D graphics systems.This is the definitive guide to the revolutionary graphics system of Mac OS X that uses the Portable Document Format (PDF) as the basis of its imaging modelIt contains the latest on programming with Quartz for Mac OS X version 10.4Carefully crafted and extensive code examples show how to accomplish most of the drawing tasks possible with Quartz

Oracle Data Warehouse Tuning for 10g

by Gavin JT Powell

“This book should satisfy those who want a different perspective than the official Oracle documentation. It will cover all important aspects of a data warehouse while giving the necessary examples to make the reading a lively experience." - Tim Donar, Author and Systems Architect for Enterprise Data WarehousesTuning a data warehouse database focuses on large transactions, mostly requiring what is known as throughput. Throughput is the passing of large amounts of information through a server, network and Internet environment, backwards and forwards, constantly! The ultimate objective of a data warehouse is the production of meaningful and useful reporting, from historical and archived data. The trick is to make the reports print within an acceptable time frame.A data model contains tables and relationships between tables. Tuning a data model involves Normalization and Denormalization. Different approaches are required depending on the application, such as OLTP or a Data Warehouse. Inappropriate database design can make SQL code impossible to tune. Poor data modeling can have a most profound effect on database performance since all SQL code is constructed from the data model.* Takes users beyond basics to critical issues in running most efficient data warehouse applications* Illustrates how to keep data going in and out in the most productive way possible* Focus is placed on Data Warehouse performance tuning

Smart Phone and Next Generation Mobile Computing

by Pei Zheng Lionel Ni

This in-depth technical guide is an essential resource for anyone involved in the development of “smart" mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you’re a manager, engineer, designer, or entrepreneur.Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure sideCompares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANsEvaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and LinuxConsiders the limitations of existing terminal designs and several pressing application design issuesExplores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networksSurveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Handbook of Categorization in Cognitive Science

by Henri Cohen Claire Lefebvre

Categorization, the basic cognitive process of arranging objects into categories, is a fundamental process in human and machine intelligence and is central to investigations and research in cognitive science. Until now, categorization has been approached from singular disciplinary perspectives with little overlap or communication between the disciplines involved (Linguistics, Psychology, Philosophy, Neuroscience, Computer Science, Cognitive Anthropology). Henri Cohen and Claire Lefebvre have gathered together a stellar collection of contributors in this unique, ambitious attempt to bring together converging disciplinary and conceptual perspectives on this topic."Categorization is a key concept across the range of cognitive sciences, including linguistics and philosophy, yet hitherto it has been hard to find accounts that go beyond the concerns of one or two individual disciplines. The Handbook of Categorization in Cognitive Science provides just the sort of interdisciplinary approach that is necessary to synthesize knowledge from the different fields and provide the basis for future innovation." Professor Bernard Comrie, Department of Linguistics, Max Planck Institute for Evolutionary Anthropology, Germany"Anyone concerned with language, semantics, or categorization will want to have this encyclopedic collection." Professor Eleanor Rosch, Dept of Psychology, University of California, Berkeley, USA

Deploying LINUX on the Desktop

by Edward Haletky

This book will meet the needs of those LINUX users who wish to set up a desktop LINUX workstations, and integrate them into their corporate environment. It will provide practical answers to such questions as: a) What tools do I use to fully integrate with the Microsoft Office tool suite? b) How do I set up my email and interact with a Microsoft Exchange Server? c) Where can I obtain, and how do I install, Internet browser plug-ins needed for web access, media playing, and other corporate Internet functionality? Provides a guide to using LINUX on the desktop for the corporate user. It will cover more than basic topics, such as whether to use OpenOffice or use another tool such as Evolution; they will delve into specific configurations necessary to interact efficiently with the Microsoft centric world of the Desktop. This guide will cover those problem areas that arise and discuss how to smooth over the bumps while meeting the goal of using a LINUX desktop.Lastly this book will cover whether or not a complete LINUX solution is available, or if some hybrid desktop will be needed to interact smoothly in the modern corporate computing environment; including a discussion of necessary LINUX growth directions for future expansion and capability.· Reviews real world requirements.· Covers Pure LINUX, and Hybrid Corporate Desktops.· Covers Enabling Tools such as CrossOver Office and the use of Windows Native programs on LINUX.· Reveals Interoperability Concerns.· Implements a solid Corporate Desktop.· Reviews the complete costs of Implementing LINUX as a desktop.

Advanced Systems Design with Java, UML and MDA

by Kevin Lano

The Model Driven Architecture defines an approach where the specification of the functionality of a system can be separated from its implementation on a particular technology platform. The idea being that the architecture will be able to easily be adapted for different situations, whether they be legacy systems, different languages or yet to be invented platforms.MDA is therefore, a significant evolution of the object-oriented approach to system development.Advanced System Design with Java, UML and MDA describes the factors involved in designing and constructing large systems, illustrating the design process through a series of examples, including a Scrabble player, a jukebox using web streaming, a security system, and others. The book first considers the challenges of software design, before introducing the Unified Modelling Language and Object Constraint Language. The book then moves on to discuss systems design as a whole, covering internet systems design, web services, Flash, XML, XSLT, SOAP, Servlets, Javascript and JSP.In the final section of the book, the concepts and terminology of the Model Driven Architecture are discussed. To get the most from this book, readers will need introductory knowledge of software engineering, programming in Java and basic knowledge of HTML.* Examines issues raised by the Model-Driven Architecture approach to development* Uses easy to grasp case studies to illustrate complex concepts* Focused on the internet applications and technologies that are essential for students in the online age

GMPLS: Architecture and Applications (ISSN)

by Adrian Farrel Igor Bryskin

The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLS’s place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers.Written by two industry researchers at the forefront of the development of GMPLS.Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering.Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection.Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs.Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system.

Configuring Microsoft Outlook 2003

by Sue Mosher Robert Sparnaaij Charlie Pulfer David Hooker

One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows registry, as files in the user’s profile folders, and in the information store itself. Configuring Microsoft® Outlook 2003 pulls together in one volume the information that administrators in organizations of all sizes need to understand, deploy, and manage settings for Microsoft Outlook 2003. It covers configuration issues for environments where Microsoft Exchange is the mail server and also for those using IMAP4 or POP3. The book gives special attention to security issues, including recommended configuration of Outlook’s built-in security features and methods for locking down Outlook with Group Policy Objects and other techniques.Configure the new Cached Exchange mode and RPC over HTTP connections in Outlook 2003Discover undocumented settings for Microsoft Exchange Server and use them to deploy or modify Outlook mail profilesMigrate both user data and settings to a new machineUse tools such as MFCMAPI and Outlook Spy to explore Outlook's data and settingsConfigure an archive .pst file in the new Unicode format that supports up to 20GB of dataUse scripts to handle challenging configuration tasks such as granting Reviewer access to a Calendar folder, or adding a second Exchange mailbox to an Outlook profile

Real-Time Systems Development

by Rob Williams

Real-Time Systems Development introduces computing students and professional programmers to the development of software for real-time applications. Based on the academic and commercial experience of the author, the book is an ideal companion to final year undergraduate options or MSc modules in the area of real-time systems design and implementation. Assuming a certain level of general systems design and programming experience, this text will extend students’ knowledge and skills into an area of computing which has increasing relevance in a modern world of telecommunications and ‘intelligent’ equipment using embedded microcontrollers. This book takes a broad, practical approach in discussing real-time systems. It covers topics such as basic input and output; cyclic executives for bare hardware; finite state machines; task communication and synchronization; input/output interfaces; structured design for real-time systems; designing for multitasking; UML for real-time systems; object oriented approach to real-time systems; selecting languages for RTS development; Linux device drivers; and hardware/software co-design. Programming examples using GNU/Linux are included, along with a supporting website containing slides; solutions to problems; and software examples. This book will appeal to advanced undergraduate Computer Science students; MSc students; and, undergraduate software engineering and electronic engineering students.* Concise treatment delivers material in manageable sections* Includes handy glossary, references and practical exercises based on familiar scenarios* Supporting website contains slides, solutions to problems and software examples

Understanding Mobile Human-Computer Interaction (Information Systems Series (ISS))

by Steve Love

Taking a psychological perspective, this book examines the role of Human-Computer Interaction in the field of Information Systems research. The introductory section of the book covers the basic tenets of the HCI discipline, including how it developed and an overview of the various academic disciplines that contribute to HCI research. The second part of the book focuses on the application of HCI to Information Systems research, and reviews ways in which HCI techniques, methodologies and other research components have been used to date in the IS field. The third section of the book looks at the research areas where HCI has not yet been fully exploited in relation to IS, such as broadening user groups and user acceptance of technology. The final section of the book comprises of a set of guidelines for students to follow when undertaking an HCI based research project.* Offers a comprehensive insight into the social shaping of technology* Includes in depth analysis of HCI issues relating to mobile devices * Provides guidelines, technical tips and an overview of relevant data analysis techniques to help students develop their own research projects

The Persona Lifecycle: Keeping People in Mind Throughout Product Design (Interactive Technologies)

by Tamara Adlin John Pruitt

The Persona Lifecycle is a field guide exclusively focused on interaction design's most popular new technique. The Persona Lifecycle addresses the "how" of creating effective personas and using those personas to design products that people love. It doesn’t just describe the value of personas; it offers detailed techniques and tools related to planning, creating, communicating, and using personas to create great product designs. Moreover, it provides rich examples, samples, and illustrations to imitate and model. Perhaps most importantly, it positions personas not as a panacea, but as a method used to complement other user-centered design (UCD) techniques including scenario-based design, cognitive walkthroughs and user testing. The authors developed the Persona Lifecycle model to communicate the value and practical application of personas to product design and development professionals. This book explores the complete lifecycle of personas, to guide the designer at each stage of product development. It includes a running case study with rich examples and samples that demonstrate how personas can be used in building a product end-to-end. It also presents recommended best practices in techniques, tools, and innovative methods and contains hundreds of relevant stories, commentary, opinions, and case studies from user experience professionals across a variety of domains and industries. This book will be a valuable resource for UCD professionals, including usability practitioners, interaction designers, technical writers, and program managers; programmers/developers who act as the interaction designers for software; and those professionals who work with developers and designers.Features* Presentation and discussion of the complete lifecycle of personas, to guide the designer at each stage of product development.* A running case study with rich examples and samples that demonstrate how personas can be used in building a product end-to-end. * Recommended best practices in techniques, tools, and innovative methods.* Hundreds of relevant stories, commentary, opinions, and case studies from user experience professionals across a variety of domains and industries.

Cost-Justifying Usability: An Update for the Internet Age (Interactive Technologies)

by Randolph G. Bias Deborah J. Mayhew

You just know that an improvement of the user interface will reap rewards, but how do you justify the expense and the labor and the time—guarantee a robust ROI!—ahead of time? How do you decide how much of an investment should be funded? And what is the best way to sell usability to others? In this completely revised and new edition of Cost-Justifying Usability, Randolph G. Bias (University of Texas at Austin, with 25 years’ experience as a usability practitioner and manager) and Deborah J. Mayhew (internationally recognized usability consultant and author of two other seminal books including The Usability Engineering Lifecycle) tackle these and many other problems. It has been updated to cover cost-justifying usability for Web sites and intranets, for the complex applications we have today, and for a host of products—offering techniques, examples, and cases that are unavailable elsewhere. No matter what type of product you build, whether or not you are a cost-benefit expert or a born salesperson, this book has the tools that will enable you to cost-justify the appropriate usability investment.Includes contributions by a host of experts involved in this work, including Aaron Marcus, Janice Rohn, Chauncey Wilson, Nigel Bevan, Dennis Wixon, Clare-Marie Karat, Susan Dray, Charles Mauro, and many othersIncludes actionable ideas for every phase of the software development processIncludes case studies from inside a variety of companiesIncludes ideas from "the other side of the table," software executives who hold the purse strings, who offer thoughts on which proposals for usability support they've funded, and which ones they've declined

Network Security: A Practical Approach (ISSN)

by Jan L. Harrington

Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. You’ll learn to do just that with this book’s assessments of the risks, rewards, and trade-offs related implementing security measures.Helps you see through a hacker's eyes so you can make your network more secure.Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates.Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices.Covers techniques for enhancing the physical security of your systems and network.Explains how hackers use information-gathering to find and exploit security flaws.Examines the most effective ways to prevent hackers from gaining root access to a server.Addresses Denial of Service attacks, "malware," and spoofing.Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates.

Student's Essential Guide to .NET

by Tony Grimer

The Student's Essential Guide to .NET provides a clear and simple overview of Microsoft's .NET technologies. It is aimed at second and third year undergraduate students and postgraduate students on Computing or Computer Science courses who are required to look at a modern operating system, (Microsoft Windows 9x, Nt 2000 or XP) and to design and code simple or even not so simple examples. The approach is based upon the student's learning the technology of .NET through examples using the supported languages C#, VB and C++. The examples are based on fun, familiar games, and students are encouraged to review reference material to refine their skills on key aspects of the architecture. Review questions and worked examples enhance the learning process and the material is supported by the author's website, which contains extensive ancillary material.* Student-focused treatment with many examples and exercises, together with solutions* Integrates the use of .NET with the supported languages C#, VB and C++* Authors supporting website contains solutions, source code and other extras

Refine Search

Showing 83,026 through 83,050 of 83,302 results