961 results
Search Results
2. Ambient Intelligence Perspectives II : Selected Papers From the Second International Ambient Intelligence Forum 2009
- Author
-
Čech, Pavel, Bureš, Vladimír, Nerudová, Ludmila, Čech, Pavel, Bureš, Vladimír, and Nerudová, Ludmila
- Subjects
- Ambient intelligence--Congresses
- Abstract
Ambient Intelligence Perspectives II contains selected papers from the second international Ambient Intelligence Forum – AmIF 2009, held in Hradec Králové, Czech Republic. This book aims to point to a multifaceted nature of Ambient Intelligence. It presents Ambient Intelligence in five different perspectives. The first perspective focuses on general issues and discusses the concepts of Ambient Intelligence. Second perspective deals with Ambient Intelligence enablers that facilitate the development of concepts and approaches. Third perspective presents applications of Ambient Intelligence in various fields and activities. Fourth perspective is concerned with Ambient Intelligence as being materialized in intelligent environments integrating devices and knowledge in order to assists and support humans. The last perspective covers the cognitive aspects of Ambient Intelligence.
- Published
- 2009
3. Et Al : Because Not All Research Deserves a Nobel Prize
- Author
-
B McGraw and B McGraw
- Abstract
Et al. is a satirical academic journal that uses machine learning and scientific principles on absurd studies, from the cat Lord Whiskers'role in the extinction of the dodo bird to the quantum mysteries of untidy toddler rooms.Key FeaturesConducts satirical research on topics ranging from quantum computing to clingy robot dog algorithmsAnswers questions like “Can a computer understand a Scotsman?” and “Is Sarah Palin real?”Secures the power grid and your home from the prying eyes of government drones a.k.a. birdsExpands science by studying cow-based atmospheres, and the flavortown center of the brainSolves climate change and saves the world by proposing a banana-based fission reactorNullifies the possibility of getting lost at the fair with a mirror-house escape algorithmBook DescriptionTired of the same old math, science, statistics, and programming memes people post online and want something a little more elaborate? This is the book for you. Tremble as we make up all our own facts and data, hand-draw diagrams in MS Paint, and quote from fictional studies and journals. Cower as authors write in the first person because their study is just a little too personal for them. Recoil from the sheer mass of oversimplified methodology, distilling someone's entire thesis into a paragraph of jokes crude enough to make it into a Mike Myers movie. Over the last few years, we have taken arguments that you would normally have after four Jack and cokes at game night and turned them into properly formatted research papers with a writing tone serious enough to confuse the uninitiated. These papers are high-effort jokes by researchers and scientists for researchers and scientists. They cover a range of topics such as the consequences of re-releasing tourists back into Yellowstone National Park after COVID-19, how to play StarCraft competitively online on a quantum computer, and most importantly, how trees around the globe are becoming increasingly radicalized.What you will learnHow to draw a graph using MS Paint, maybeWhether Sarah Palin is a figment of your imaginationHow one pirate cat brought about the extinction of the beloved dodoWhy rabbits used to be jerks back in the dayIf you actually learn anything from these articles, get your memory erased immediatelyWho this book is forThis book is for researchers and those who love science mingled with humor. It's for those who are a little too tired of the talking heads and futurists of the science world and would like something more entertaining in the form of absurd speculative studies by researchers as unbelievable as their work. Anyone who has experienced academic writing, or the tribulations of any research institution will enjoy the wide range of bizarre, yet real-world topics compiled in this book. Even if you don't know much about the subject, we usually have a background section.
- Published
- 2023
4. Take Control of Your Digital Legacy
- Author
-
Joe Kissell and Joe Kissell
- Subjects
- Information technology--Law and legislation
- Abstract
Preserve your data for posterity!How do you want to be remembered by future generations? You can make a will to handle your physical possessions, but what about your digital life--photos, videos, email, documents, and the like? This ebook, written by tech expert Joe Kissell, covers many aspects of preserving such electronic ephemera as part of your digital legacy.If you're not at the stage of life where you can think about this for yourself, consider that you may have to do so for your parents or other relatives. It's not all about posterity either, since following Joe's advice will also help loved ones access your key accounts and important info if you're incapacitated, which can happen at any time.The book will help you with these essential tasks:Identify your key digital assets: online accounts, photos, audio files, videos, passwords, documents, email, and more.Plan for each type of digital asset based on your priorities for today, for shortly after you are no longer around, and for posterity. Joe explains the ideal file formats to use, how to deal with social media sites, the best ways to digitize paper documents and photos, and strategies for sharing passwords with family members, among much else.Communicate your wishes in a'digital will'and designate someone to be its'digital executor.'The book includes a template document that you can develop into a personalized digital will.Preserve your data for the future. You'll consider types of archival storage media, cloud-based storage services, backups, and what instructions to provide about maintaining your data as file formats and storage media types evolve.Whether you just want to ensure that your heirs get copies of your favorite family photos and a few key documents or you want to catalog and preserve tens of thousands of digital items, this book helps you make smart decisions about your digital legacy.Questions answered include:What strategies can I use for sorting and preserving email?How can I ensure that my email account will be available to those wrapping up my estate?What if I have digital data that should be destroyed when I die?What should I do with my huge photo collection (both digital and paper)?How can I make my passwords available to those who will need them--but keep them private for now?What should I think about when handing down purchased audio and video files?What should happen to my Facebook account when I'm no longer around?What choices are available for keeping my digital archive available and backed up?How long should I expect archival media to last?Should I write an autobituary?Are online digital legacy services any good?How will organizing all this stuff benefit me while I'm alive?
- Published
- 2017
5. Data Analytics in Web Information Systems
- Author
-
Indrawan-Santiago, Maria and Indrawan-Santiago, Maria
- Subjects
- World Wide Web, Information technology--Management, Data mining
- Abstract
The importance of data analytics in many different domains has given rise to the research on new approaches, methods and algorithms in utilizing data to gain insight into the domain. In this ebook, we have selected six interesting work from the iiWAS 2015 conference. The papers were selected based on its originality and significant contribution to the area of data analytics. The application coverage of the papers involves different domains such as recommender systems, robotics, medical, linked data and logistics.
- Published
- 2016
6. Take Control of PDFpen 8
- Author
-
Cohen, Michael E. and Cohen, Michael E.
- Subjects
- Apple computer--Programming, PDF (Computer file format), Portable document software
- Abstract
Juggle your PDFs easily with PDFpen 8!These days, an ever-increasing amount of “paper” — contracts, tax forms, bills, reports, and more — comes into our lives as PDF files. We generate this virtual paper too, since it's so much easier to save a document as a PDF and send it to a colleague via email than it is to print and send via fax or mail. To read, edit, and manipulate all these PDFs, you need appropriate tools and skills.Given the high price of Adobe Acrobat DC Pro, many Mac users have turned to Smile's affordable PDFpen apps to help them sign PDF forms, handle scanned documents, make changes in existing PDFs, create new PDFs from a variety of sources, and even export PDFs to other file formats. With Take Control of PDFpen 8, you'll learn how to do all these tasks and more on your Mac with PDFpen or PDFpenPro or on the go with PDFpen for iPad & iPhone.Members of Take Control's sister publication, TidBITS, can save 20% on all Smile products purchased through the Smile cart, including PDFpen 8 and PDFpenPro 8. To learn more, visit the Membership Benefits page. To access the coupon code, make sure you've logged in and click through from the Your Member Benefits page.Take Control of PDFpen 8 begins with a guide to purchasing options: PDFpen versus PDFpenPro, from Smile versus the Mac App Store, and the advantages of the iOS version. Next, you'll meet PDFpen with an overview of the PDF format and a tour of the interface.With the basics out of the way, highlights of what you'll learn to do include:Add and remove pages, and combine pages from multiple files into one PDF.Mark up a PDF with highlights, comments, editing marks, and more.Edit a PDF by fixing typos, adding text, formatting text, and redacting confidential text. Scan a document into a PDF, and make the text editable with OCR.View and work with OCRed text in the OCR layer (PDFpenPro only)Add clickable links, page numbers, and images.Make a clickable table of contents (PDFpenPro only).Password-protect a PDF. And (PDFpenPro only), prevent others from printing or editing a PDF. Turn a PDF into a formatted Microsoft Word document, or (PDFpenPro only) export it in Excel or PowerPoint format. And, you'll find directions for working with PDF forms:Fill out forms with ease.Add a handwritten signature.Apply a digital signing certificate.Print just form entries on a pre-printed form.Create an interactive PDF form (PDFpenPro only) that can collect data and send it to you via email or the Web. You can add an interactive signature field, which makes it easy for the form to be signed online.An appendix describes the useful AppleScripts that ship with PDFpen.This ebook was created in collaboration with Smile, with PDFpen's developers tech editing the book.
- Published
- 2016
7. Information Modelling and Knowledge Bases XXV
- Author
-
Tokuda, Takehiro, IOS Press, Tokuda, Takehiro, and IOS Press
- Subjects
- Information modeling, System design, Artificial intelligence
- Abstract
Because of our ever increasing use of and reliance on technology and information systems, information modelling and knowledge bases continue to be important topics in those academic communities concerned with data handling and computer science. As the information itself becomes more complex, so do the levels of abstraction and the databases themselves. This book is part of the series Information Modelling and Knowledge Bases, which concentrates on a variety of themes in the important domains of conceptual modeling, design and specification of information systems, multimedia information modeling, multimedia systems, ontology, software engineering, knowledge and process management, knowledge bases, cross-cultural communication and context modeling. Theoretical disciplines, including cognitive science, artificial intelligence, logic, linguistics and analytical philosophy, also receive attention. The selected papers presented here cover many areas of information modeling and knowledge bases including: theory of concepts, semantic computing, data mining, context-based information retrieval, ontological technology, image databases, temporal and spatial databases, document data management, software engineering, cross-cultural computing, environmental analysis, social networks, WWW information management, and many others. This new issue also contains papers initiated by the panels on: “Cross-cultural Communication with Icons and Images” and “Conceptual Modelling of Collaboration for Information Systems”. The book will be of interest to all those interested in advances in research and applications in the academic disciplines concerned.
- Published
- 2014
8. Mental Models and Human-Computer Interaction
- Author
-
Martin G. Tauber, D. Ackermann, Martin G. Tauber, and D. Ackermann
- Subjects
- Human-computer interaction--Congresses
- Abstract
Nowadays, mental models are seen as crucial in systems design. Research is driven by the assumption that a better insight into a user's cognitive processes when using a system will improve design methods and provide friendly and efficient interfaces.The papers in this volume explore three fundamental issues: understanding the complexity of the intended worksystem, describing it by models and finally building the required powerful and usable system. The papers are an edited selection of those presented at the 8th interdisciplinary workshop on Mental Models and HCI, held in Austria in June 1989. They concentrate primarily on design issues, their theoretical background and the application of the concept of Human-Computer Interaction (HCI). Nevertheless, there are also contributions on theoretical topics and methodological questions.
- Published
- 2013
9. Cloud Computing and Big Data
- Author
-
C. Catlett, W. Gentzsch, L. Grandinetti, C. Catlett, W. Gentzsch, and L. Grandinetti
- Subjects
- Big data, Cloud computing
- Abstract
Cloud computing offers many advantages to researchers and engineers who need access to high performance computing facilities for solving particular compute-intensive and/or large-scale problems, but whose overall high performance computing (HPC) needs do not justify the acquisition and operation of dedicated HPC facilities. There are, however, a number of fundamental problems which must be addressed, such as the limitations imposed by accessibility, security and communication speed, before these advantages can be exploited to the full. This book presents 14 contributions selected from the International Research Workshop on Advanced High Performance Computing Systems, held in Cetraro, Italy, in June 2012. The papers are arranged in three chapters. Chapter 1 includes five papers on cloud infrastructures, while Chapter 2 discusses cloud applications. The third chapter in the book deals with big data, which is nothing new – large scientific organizations have been collecting large amounts of data for decades – but what is new is that the focus has now broadened to include sectors such as business analytics, financial analyses, Internet service providers, oil and gas, medicine, automotive and a host of others. This book will be of interest to all those whose work involves them with aspects of cloud computing and big data applications.
- Published
- 2013
10. Formal Ontologies Meet Industry
- Author
-
P.E. Vermaas, V. Dignum and P.E. Vermaas, V. Dignum
- Subjects
- Information modeling--Congresses, Business networks--Congresses, Semantic networks (Information theory)--Congresses, Ontologies (Information retrieval)--Congresses
- Abstract
Knowledge modeling and the semantic dimension of information plays an increasingly central role in the network economy today. Theoretical research and actual implementations bring up unexpected problems and issues and there is, moreover, an increasing need for solid theoretical foundations for practical applications of ontologies, based on philosophy, linguistics, artificial intelligence and logic. The fifth International workshop Formal Ontology Meets Industry (FOMI 2011), held in Delft, the Netherlands in July 2011, brings together researchers and practitioners involved in this field, without the restrictions of their usual domains of work: business, medicine, engineering, finance, law, biology, geography, electronics, and many more. The nine papers presented here are divided into three sections: Philosophical Foundations of FOMI, Methodological Approaches, and finally, Data Integration. Subjects covered in part one include defining the general notion of technical artifacts in formal ontologies and a philosophy inspired schema to describe applied ontologies. Part two includes a paper on the context and methodological approach for the support of ontology-based annotations and meta data management of clinical trial resources, as well as a presentation of two formal approaches to similarity, the geometric model and feature matching model. In part three, there is a proposal to apply ontologies for Linked Open Data to monitor operational behavior, particularly supply chain risk analysis; this section also includes a description of Gellish, a formal ontological language.
- Published
- 2011
11. Spatial Gems : Volume 2
- Author
-
John Krumm, Andreas Züfle, Cyrus Shahabi, John Krumm, Andreas Züfle, and Cyrus Shahabi
- Abstract
Spatial gems are computational techniques for processing spatial data. This book, a follow-up to the first Spatial Gems volume, is a further collection of techniques contributed by leading research experts. Although these approaches were developed by their authors as part of larger research projects, the gems represent fundamental solutions that are generically applicable to many different problems. Our goal is to expose these useful techniques that are not yet in textbooks and often buried inside technical research papers to share them with software developers, graduate students, professors, and professional researchers.
- Published
- 2024
12. Spatial Gems : Volume 2
- Author
-
John Krumm, Andreas Züfle, Cyrus Shahabi, John Krumm, Andreas Züfle, and Cyrus Shahabi
- Abstract
Spatial gems are computational techniques for processing spatial data. This book, a follow-up to the first Spatial Gems volume, is a further collection of techniques contributed by leading research experts. Although these approaches were developed by their authors as part of larger research projects, the gems represent fundamental solutions that are generically applicable to many different problems. Our goal is to expose these useful techniques that are not yet in textbooks and often buried inside technical research papers to share them with software developers, graduate students, professors, and professional researchers.
- Published
- 2024
13. International E-Conference on Computer Science (IeCCS 2005)
- Author
-
Theodore Simos and Theodore Simos
- Subjects
- Computer science--Congresses
- Abstract
The aim of IeCCS 2005, which was held in May 2005, was to bring together leading scientists of the international Computer Science community and to attract original research papers. This volume in the Lecture Series on Computer and Computational Sciences contains the extended abstracts of the presentations. The topics covered included (but were not limited to): Numerical Analysis, Scientific Computation, Computational Mathematics, Mathematical Software, Programming Techniques and Languages, Parallel Algorithms and its Applications, Symbolic and Algebraic Manipulation, Analysis of Algorithms, Problem Complexity, Mathematical Logic, Formal Languages, Data Structures, Data Bases, Information Systems, Artificial Intelligence, Expert Systems, Simulation and Modeling, Computer Graphics, Software Engineering, Image Processing, Computer Applications, Hardware, Computer Systems Organization, Software, Data, Theory of Computation, Mathematics of Computing, Information Systems, Computing Methodologies, Computer Applications and Computing Milieu.
- Published
- 2018
14. Take Control of Calendar and Reminders
- Author
-
Scholle McFarland and Scholle McFarland
- Subjects
- Scheduling--Computer programs, Apple computer--Programming, Mobile computing
- Abstract
Manage your schedule more effectively using Calendar and Reminders!In the days before personal computers and mobile devices, we had to rely on paper calendars and to-do lists to help us organize our time and activities. Now, we have powerful tools, like Apple's Calendar and Reminders, that are much more responsive to our needs. Put an event on your schedule, invite others to join, or set yourself an alarm (or more than one). Or, keep a list of to-do items, add to it and view it on all your Apple devices, and share your list with family or friends.In this book, veteran Mac journalist and editor Scholle McFarland will guide you through getting to know these incredibly helpful apps, including lesser-known (but handy) features. For example, did you know that in Calendar you can set an alert for when you need to leave for an event, based on the travel time calculated using the location you entered for the event? Or that Reminders can prompt you to do something not only at a certain time, but also once you've reached a specific destination, like the grocery store?If you've never taken the opportunity to explore Calendar and Reminders, this book will show you how to make them an important part of your daily routine. If you've already been using Calendar and Reminders, you'll learn how to use them more effectively, troubleshoot common problems, and delve deeper into their capabilities.Whip your schedule into shape and tame your to-do lists with Take Control of Calendar and Reminders!Let Scholle walk you through how to get the best out of Calendar and Reminders, including how to:Customize Calendar to your liking, from setting time zones, to color coding specific calendarsCreate events, making them repeat at regular intervals or on certain datesSet up notifications and alerts, so you never miss an eventInvite people to events, or share your calendar with themCreate, manage, and share lists in RemindersSet alarms in Reminders at a certain time or a certain placeUse Siri to save time when creating events or remindersEasily check events and reminders on your Mac, iPhone, or Apple WatchTroubleshoot common problems in Calendar and RemindersShare calendars and reminders using iCloud Family Sharing
- Published
- 2017
15. Wireless Networks
- Author
-
Jandieri, George, Solo, Ashu M.G, Tinetti, Fernando G., Arabnia, Hamid, Deligiannidis, Leonidas, Jandieri, George, Solo, Ashu M.G, Tinetti, Fernando G., Arabnia, Hamid, and Deligiannidis, Leonidas
- Subjects
- Wireless communication systems, Wireless Application Protocol (Computer network pr
- Abstract
Wireless Networks is a compendium of articles and papers that were presented at ICWN'16, an international conference that serves researchers, scholars, professionals, students, and academicians.
- Published
- 2016
16. ICASI 2015
- Author
-
Meen, Teen-Hang and Meen, Teen-Hang
- Subjects
- Computer-aided engineering, Information technology, Computer science, Engineering
- Abstract
Current research is interdisciplinary in nature, reflecting a combination of concepts and methods that often span several areas of mechanics, mathematics, electrical engineering, control engineering, and other scientific disciplines. This research often combines theoretical models with numerical simulations to solve problems or make predictions that may be used to design for industry or ordinary life of people. This eBook has selected excellent papers from International Conference on Applied System Innovation 15 (ICASI 15). ICASI 15 was held in Osaka, Japan on May 22~26, 15 and provided an unified communication platform for researchers in area of topics from innovation design, communication science & engineering, industrial design, computer science, electrical & electronic engineering, mechanical & automation engineering. We hope this eBook will enable interdisciplinary collaboration between engineering and design technologists in the academic and industrial fields as well as networking internationally. It's our hope to facilitate more collaboration around the world through these studies published in Engineering Computations.
- Published
- 2016
17. Take Control of Dropbox
- Author
-
Kissell, Joe and Kissell, Joe
- Subjects
- Virtual storage (Computer science), Cloud computing
- Abstract
Sync, link, and share your files!Because Dropbox is so simple to use for basic file syncing, it's easy to forget that you can do far more with it than just sync files between two computers. If that's all you're doing, you're missing out!Author Joe Kissell explains why Dropbox is cool, shares best practices for using Dropbox on your own or with a group, helps you avoid common mistakes, clues you in to newer and advanced collaboration features, teaches you how to secure your Dropbox account, and describes unusual uses of Dropbox.Readers can quickly benefit from the book: new users can start in the'Dropbox Quick Start,'which directs you to beginner basics or to special information for people who just want to access a shared Dropbox document.But, for those who already know Dropbox basics,'Check Your Dropbox Skills'routes you immediately to help with exciting new features that you may not yet have mastered -- or even been aware of(!) -- such as Dropbox Team, Dropbox Paper collaboration, file requests, and Office integration/collaboration.Teach This Book! Because a powerful aspect of Dropbox is sharing files with others, you may want to help your colleagues and friends use it. To that end, Take Control of Dropbox includes links to a downloadable 1-page PDF handout and to a 21-slide PDF-based presentation.Joe focuses on using Dropbox from a Macintosh or Windows PC, or Linux, but part of why this book has crept up to 151 pages in its second edition is that he has included helpful details for integrating a mobile device (primarily iOS and Android) into your Dropbox workflow.You'll find out how to:Recover accidentally deleted or revised files.Put new photos and videos into Dropbox with Camera Upload and share them easily.Sync data from Dropbox-savvy apps on all your devices (apps like 1Password, DEVONthink, and GoodReader). Make sure you're set up optimally by checking a few account-related details. These include security settings and methods of getting more storage space.Edit shared Office documents on the Dropbox Web site -- you don't need to have Office installed locally on your computer or subscribe to Office 365.Work with the Dropbox badge if you are editing a Dropbox-shared Office file on your local computer.Open PDFs from Dropbox from within Adobe Acrobat DC or Acrobat Reader DC -- and save any changes back to Dropbox.Set up a Dropbox team: learn how it works, and how to control who can do what and when.Create a Dropbox folder that other people can drop files into, but not see inside of.Unlink and remote-wipe Dropbox from a stolen device.Joe also shares examples of interesting Internet services that can interact with files that you put in your Dropbox folder to publish a blog, automate Web activities, automate your Mac, sync with other cloud services, and even publish a book like this one!
- Published
- 2016
18. Birthing the Computer: From Relays to Vacuum Tubes
- Author
-
Stephen H. Kaisler, Author and Stephen H. Kaisler, Author
- Subjects
- Computers--History
- Abstract
Birthing the Computer: From Relays to Vacuum Tubes is the first in a multi-volume series on historical computing machines. This series will span the development of computer systems from the Zuse machines of the early 1930s to about 1995 when microprocessors began to be commoditized. Each volume will focus on a range of technologies, or a class of machines or a particular vendor, and will describe the hardware of the machines and its peripherals, the operating system and system software, and its influence upon programming languages. This volume begins with the Zuse machines which were constructed from relays, but contained the basic elements of a computer system, namely input, computing engine, and output. Early machines from Atanasoff and Berry, Aiken, Stibitz, and IBM are described. The transition from relays to vacuum tubes increased speed and performance significantly, and led to the first true computers in ENIAC, EDSAC, and EDVAC which used paper tape and Williams tubes for I/O and storage. These machines were built by universities.Several early machines were purpose built such as Colossus and BINAC, and created with government support and industrial know-how. By the mid-to-late ‘50s, computing machines were being built by universities (the SSEM, Whirlwind, and IAS machines), governments (the NBS SEAC and SWAC, and several other machines), and industry (the UNIVAC series and the English Electric DEUCE). Most of these machines were constructed using the von Neumann architecture, and represent an evolution of thinking in how computing machines were to operate along with some innovative ideas in software and programming languages. By the end of the 1950s, the design, development, programming and use of computing machines were in full ferment as many new ideas were proposed, many different machines were designed and some were constructed. Computing machines became a commercial enterprise. Governments receded from building machines to levying requirements and funding construction, while universities continued to explore new architectures, new operating systems, and new programming languages.
- Published
- 2016
19. The ICT Age
- Author
-
Liz Bacon, Editor, Edmond Prakash, Editor, Craig Speelman, Editor, Liz Bacon, Editor, Edmond Prakash, Editor, and Craig Speelman, Editor
- Subjects
- Digital communications--Congresses, Information technology--Congresses, Computer science--Congresses, Internet of things--Congresses, Big data--Congresses, Cloud computing--Congresses
- Abstract
The world is at the cusp of yet another new era of computing as the physical and digital infrastructures of the world converge as we continue to infuse intelligence into more and more connected things. Many agree that this new era in computing is being driven by Cloud Computing, Big Data and the Internet of Things (IOT). This will once again reshape and transform the future of people, businesses, society and nations. This volume is a collection of leading edge and recent research papers in the areas of Cloud Computing Technology, Computer Gaming and IOT, and was conceived at the 7th Annual Computer Gaming and Allied Technologies Conference (CGAT) organised and administered by the Global Science and Technology Forum (GSTF).
- Published
- 2016
20. Transition of HPC Towards Exascale Computing
- Author
-
E.H. D'Hollander, J.J. Dongarra, I.T. Foster, E.H. D'Hollander, J.J. Dongarra, and I.T. Foster
- Subjects
- Supercomputers--Congresses, High performance computing--Congresses, Heterogeneous computing--Congresses
- Abstract
The US, Europe, Japan and China are racing to develop the next generation of supercomputers – exascale machines capable of 10 to the 18th power calculations a second – by 2020. But the barriers are daunting: the challenge is to change the paradigm of high-performance computing. The 2012 biennial high performance workshop, held in Cetraro, Italy in June 2012, focused on the challenges facing the computing research community to reach exascale performance in the next decade. This book presents papers from this workshop, arranged into four major topics: energy, scalability, new architectural concepts and programming of heterogeneous computing systems. Chapter 1 introduces the status of present supercomputers, which are still about two orders of magnitude separated from the exascale mark. Chapter 2 examines energy demands, a major limiting factor of today's fastest supercomputers; the quantum leap in performance required for exascale computing will require a shift in architectures and technology. In Chapter 3, scalable computer paradigms for dense linear algebra on massive heterogeneous systems are presented, and Chapter 4 discusses architectural concepts. Finally, Chapter 5 addresses the programming of heterogeneous systems. This book will be of interest to all those wishing to understand how the development of modern supercomputers is set to advance in the next decade.
- Published
- 2015
21. Frontiers in Education : Computer Science and Computer Engineering
- Author
-
Arabnia, Hamid R., Bahrami, Azita, Deligiannidis, Leonidas, Jandieri, George, Solo, Ashu M. G., Tinetti, Fernando G., Arabnia, Hamid R., Bahrami, Azita, Deligiannidis, Leonidas, Jandieri, George, Solo, Ashu M. G., and Tinetti, Fernando G.
- Subjects
- Electronic data processing--Study and teaching--Congresses, Computer science--Study and teaching--Congresses
- Abstract
Frontiers in Education: Computer Science and Computer Engineering is a compendium of articles and papers that were presented at FECS'15, an international conference that serves researchers, scholars, professionals, students, and academicians.
- Published
- 2015
22. SOA : 100 Most Asked Questions: What You Need to Know
- Author
-
Sherman, Martha and Sherman, Martha
- Subjects
- Telecommunication, Service-oriented architecture (Computer science)
- Abstract
There has never been a SOA manual like this. SOA 100 Success Secrets is not about the ins and outs of SOA. Instead, it answers the top 100 questions that we are asked and those we come across in forums, our consultancy and education programs. It tells you exactly how to deal with those questions, with tips that have never before been offered in print. This guidebook is also not about SOA best practice and standards details. Instead it introduces everything you want to know to be successful with SOA. A quick look inside of the subjects covered: The Enterprise SOA Advantage, DNS SOA, SOA web services, Internal Audit Independence SOA, Soa Best practices, (SOA) Service Oriented Architecture: Understanding The True Definition, What is Service Oriented Architecture (SOA), SOA Security In Action, SOA Business Process Modeling Marketing, Loose Coupling And SOA Modelling, Enterprise SOA Understanding, What We May Mean By SOA Application, SOA Walkthrough, Web services soa, Visualize with an SOA Diagram, Defining SOA, Soa, An Example Of How SOA Can Help You, Read about SOA on a White Paper, Why Enterprises Need SOA Integration, Improve Your Productivity Through SOA Software, Governance in SOA, Enterprise Future SOA, Sap SOA, SOA Jobs, Get the Latest SOA News, The Best SOA Strategy, SOA records, Enterprise SOA, SOA - Linking Business Resources for Better Provision of Services, SOA and ITIL, SOA: A Whole New Way of Doing Programming, The Microsoft SOA practical implementation through WCF, Web Services, SOA And Other Independent Technology, SOA consultants, Is Open Source Boosting the Popularity of Java SOA?, Oracle SOA : Delivering Flexibility, Service Oriented Architecture SOA Microsoft, Service Counts in SOA Enterprise Architecture, SOA and DNS Together, SOA Conference: Mark the Dates!, The Job Description Of SOA Architect, SOA BPM Redefined, SOA Blueprint, Using The SOA System, Can Children Learn Enough About SOA to Take an SOA Exam?, The Benefits Of SOA Tools, What is BPM SOA BAM BPEL web services, SOA Record, The Services of SOA, WHEN IS SOA CONSULTING NEEDED?, SOA Service Definitions, Steps On SOA Security, Integrating SOA Into The Mainframe, The Real-World SOA Microsoft Approach, SOA Actuary, SOA Software, What is SOA?, Web Services And SOA, Describing the ESB SOA relationship, Soa advantages challenges, SOA MODELS, SOA DATA ARCHITECTURE, Store All with SOA Registry, SOA s, What Does an SOA Actuary Really Do?, SOA And Compatibility, The Disadvantages of SOA, The SAP SOA Platform, Adopting An Enterprise SOA, SOA Architecture, and much more...
- Published
- 2014
23. Informatica 76 Success Secrets : 76 Most Asked Questions On Informatica: What You Need To Know
- Author
-
Fox, Emily and Fox, Emily
- Subjects
- Computer science
- Abstract
There has never been a Informatica Guide like this. It contains 76 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the information you need--fast! This all-embracing guide offers a thorough view of key knowledge and detailed insight. This Guide introduces what you want to know about Informatica. A quick look inside of some of the subjects covered: List of important publications in computer science - Pascal, Computational geometry - Combinatorial/algorithmic computational geometry, Counter-Strike - Controversy, Education in Romania - Admission to High School, Solace Systems, Gaurav Dhillon, Theoretical computer science - Journals and newsletters, Business Objects - Timeline, DNA sequencing - Computational challenges, Hortonworks - History, University of Amsterdam - Faculty of Science, Edsger Dijkstra - Life and work, IP Pascal - Further reading, MapR, Alan Kay - Awards and honors, Andrew S. Tanenbaum Keynote talks, Aster Data Systems - Clients and partners, Computer science Name of the field, Informatica, Roger Penrose - Physics and consciousness, Hydraulophone - Relationship to other musical instruments in the orchestra, Punjab Engineering College - Notable alumni, Data virtualization - Topics, Silicon Valley - Notable companies, Higher education in Chile - Santiago Metropolitan Region, List of computer system manufacturers - Current, Marketing operations - Data, Academia de Studii Economice - Institution, Ben Goertzel - Papers, Informatics (academic field) - Etymology, AMQP - History, Latin America and Caribbean Network Information Centre - History, ArchiMate - History, Curitiba - Economy, Greenplum - Technology, Business Objects (company) - Timeline, and much more...
- Published
- 2014
24. Examining Robustness and Vulnerability of Networked Systems
- Author
-
Shylo, Volodymyr, Pasiliao, Eduardo L., Butenko, Sergiy, IOS Press, Shylo, Volodymyr, Pasiliao, Eduardo L., Butenko, Sergiy, and IOS Press
- Subjects
- Computer networks--Mathematical models--Congresses, Computer networks--Security measures--Congresses
- Abstract
Modern critical infrastructure is characterized by complex, heterogeneous and dynamically evolving networks. But these can be vulnerable to component failure, and this is a problem which must be addressed by realistic mathematical models. This book presents papers from the NATO Advanced Research Workshop (ARW), Examining Robustness and Vulnerability of Critical Infrastructure Networks, held in Kiev, Ukraine, in June 2013. Contributions were from workshop participants as well as invited experts in the field, and cover topics including: mathematical models; probability-based risk measures; algorithms for the design and detection of robust structures; identification of critical network components and case studies. This book will be of interest to researchers, practitioners and graduate students in the fields of mathematics, computer science and engineering.
- Published
- 2014
25. Kindle : 122 Most Asked Questions: What You Need to Know
- Author
-
Hinton, Carolyn and Hinton, Carolyn
- Subjects
- Electronic book readers--Handbooks, manuals, etc, Kindle (Electronic book reader)--Handbooks, manuals, etc, Tablet computers--Handbooks, manuals, etc
- Abstract
There has never been a Kindle Guide like this. It contains 122 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the information you need--fast! This all-embracing guide offers a thorough view of key knowledge and detailed insight. This Guide introduces what you want to know about Kindle. A quick look inside of some of the subjects covered: Ebook - 2000's, AOSP - Reception, Vevo - Availability, Will It Blend? - List of episodes, Dell Post-PC era, Amazon Publishing - Amazon Publishing history, Google Bouncer - Device compatibility, Electronic paper - e-Books, HBO GO, Kindle Fire HD, BlackBerry PlayBook - Features, LoveFilm - History, Amazon.com controversies, Adam tablet - Software, Tablet computer - Android, Whitelist - Email whitelists, WebKit - Ports, Comparison of e-book formats - Mobipocket, Nook Tablet - 16 GB version, OMAP - Products using OMAP processors, OverDrive Media Console, Calibre (software), Amazon Appstore, Polarization (economics) - Consequences, E-book - Dedicated hardware readers and mobile reader software, Fire OS - Features, Blip (website) - Blip platforms, Kindle single, Amazon.com Consumer electronics, Amazon Appstore - Trademark infringement lawsuit, Emma Lazarus - Background, Android (operating system) - Reception, Nexus 7 (2012 version) - Development phase, Digital rights management - DRM and e-books, Ebook - Dedicated hardware readers and mobile reader software, Kindle Fire - Hardware, Mobipocket - Implementations, TVCatchup - Ways to watch the service, Live365 - Listening, SnagFilms - History, Kamber Edelson - Class actions, Kindle Fire HD - Software, Kindle Fire HDX - Reception, VDM Publishing - Products and services, and much more...
- Published
- 2014
26. Mobility 45 Success Secrets : 45 Most Asked Questions on Mobility: What You Need to Know
- Author
-
Munoz, Daniel and Munoz, Daniel
- Subjects
- Wireless communication systems, Mobile computing
- Abstract
There has never been a Mobility Guide like this. Mobility 45 Success Secrets is not about the ins and outs of Mobility. Instead, it answers the top 45 questions that we are asked and those we come across in our forums, consultancy and education programs. It tells you exactly how to deal with those questions, with tips that have never before been offered in print. Get the information you need--fast! This comprehensive guide offers a thorough view of key knowledge and detailed insight. This Guide introduces everything you want to know to be successful with Mobility. A quick look inside of the subjects covered: WiMax provides Broadband Access, Why Go Wireless?, What are the uses of Wireless LANs? - Certified Wireless Network Administrator (CWNA), Locomotive Interfaces, How to access the mobility center - Microsoft Certified IT Professional, Request Fulfillment, Migrating to an external cloud, WiMax Wireless Network, Find WiMax Equipment Availability, Various Purposes of WiMAX White Paper and Where to Find Free Copies, Lenovo Lepad Tablet, Who built the first wireless network? - Cisco Certified Entry Networking Technician, The best ITIL intermediate courses offer PDF textbooks to E-learners, Is ITIL certification really a salary booster?, Parallel Virtual File System, BYOD additional characteristics - about this growing trend, Taking Advantages of Wireless LANs, What are Brain – Computer interface devices really capable of?, ITIL intermediate is perfect for IT professionals interested in PMP certification (project management professional), Importance of Having Your WiMax Product Certified, Understanding the WiMax Spectrum, The Golden Age Of IT Has Begun: 6 Reasons Why, The Technology That WiMax Offers, Activities, Why Choose WiMAX Network?, The Factors Affecting WiMax Market Performance, Mobile Internet Devices and Secure Guest Access (SGA and MID), Examining Cloud security certification, Wimax and the Cost-Effective Price that Pays Off, WiMAX: Rural Areas'Bridge to the rest of the World, A Positive Note On The Cost of Outsourcing IT Disaster Recovery, History, Sample Bring Your Own Device Policy and Rules of Behavior, What are the uses of Wireless LAN? - Certified Wireless Security Professional (CWSP), The Map of the Wireless Worlds and WiMax, BCODE, The ITIL (information technology laboratory) and NIST rely on ITIL training; what about you and your organization?, Definition of Web 2.0 Tag Cloud, WiMax Chip: Replacing the Role of Modem in Broadband Connections, What are the 2 types of VLANs? - Cisco Certified Entry Networking Technician, Effects, Which display settings are found for mobile? - Microsoft Certified IT Professional, and much more...
- Published
- 2013
27. IT Service Management 102 : Most Asked Questions: What You Need to Know
- Author
-
Cross, Christopher and Cross, Christopher
- Subjects
- Computer service industry--Management, Information technology--Management
- Abstract
There has never been a IT Service Management manual like this. IT Service Management 102 Success Secrets is not about the ins and outs of IT Service Management. Instead, it answers the top 102 questions that we are asked and those we come across in forums, our consultancy and education programs. It tells you exactly how to deal with those questions, with tips that have never before been offered in print. This guidebook is also not about IT Service Management best practice and standards details. Instead it introduces everything you want to know to be successful with IT Service Management. A quick look inside of the subjects covered: ITIL Service Support and Processes, Customize your ITIL Workflow, ITIL In Action: Service Delivery, Define ITIL, What Should I do To Earn an ITIL Certificate?, Specialist Training, For example, ITIL is not an IT Project Management methodology, BS15000 ITIL Material Training, Discover the new ITIL version 3, Levels of ITIL Certification, The Exam of ITIL Foundation, Project Management Professional Courses for Task's Overall Success, Your ITIL Certification Will Draw Your Career, What is so special about ITIL Service Management?, How to Effectively Use an ITIL Interactive Process Map, ITIL Salary Increases With Certification, Using ITIL as a Framework, Six Sigma and ITIL, Read ITIL through White paper ppt, What Is ITIL Change Management, IT Services Service Catalog Perspectives Process: Service Catalog Management, Tools to Aid ITIL Process, CV ITIL, Understanding the ITIL Foundations Live Demo, Best ITIL Practice, Good practices, Service Support Disciplines, A Short Description of ITIL History- The Best Way to Define ITIL, The Value of Staying Up to Date About Basic CCNA 1 Answers, Viewpoints to Creating a Service Catalog, How Do You Define Change Management ITIL?, ITIL V3 the Service-Life Cycle, Count on ITIL, Training for ITIL, Role of the ITIL CMDB, What are Services?, Business Process Management and ITIL, The True Meaning of ITIL, IT Services Service Agreements Processes: Service Level Management Supplier Management, Reasons Why You Should Take ITIL Foundation Course, Microsoft ITIL, Service Desk and Incident Management, Do My IT People Need to Be ITIL Certified?, Exin ITIL : With exams like ITIL Project Management PRINCE2 and ISPL EXIN…., How Does One Take the ITIL Input Output Managers Exam?, What is an ITIL V3 Lifecycle?, The Service Management of ITIL, The Skills That Should be Taught During IT Management Training, Service Delivery Principles, How ITIL software asset management can benefit you, CSIP: ITIL Planning To Implement Service Management, Simulating your ITIL, and much more...
- Published
- 2013
28. Information Science and Management Engineering (Set)
- Author
-
REN, PEIYU, DU, ZHENYU, REN, PEIYU, and DU, ZHENYU
- Subjects
- Information science--Congresses, Information resources management--Congresses, Management information systems--Congresses
- Abstract
The 2013 International Conference of Information Science and Management Engineering (ISME 2013) is a forum for the presentation of new research results and the demonstration of new systems and techniques in the broad fields of information systems, information technology, information management, and their applications in Management Engineering. The forum aims to bring together researchers, developers, and users from around the world in both industry and academia for sharing state-of-art results, for exploring new areas of research and development, and to discuss emerging issues facing business organisations in the knowledge economy. The proceedings of the conference, held in Wuhan, China, are presented in this book. Each of the contained papers has been carefully reviewed by specialists in the field before being selected for publication. Topics covered include: Production and Operation Management; Logistics and Supply Chain Management; Advanced Manufacturing System; Management Information System; Computer Engineering and Technology; Computer Networks; Financial Engineering and Risk Management; Theory and Application of System engineering and operations research; Quality Control and Reliability; E-Commerce and Business Intelligence; Safety Management and Human Factors Engineering; Technological Management, Innovation and Evaluation; Optimisation Technology and Algorithm; Knowledge Management and Data Mining; Web and Grid Services; Computer Communications; Multimedia Technology; Computer Software; Digital Factory/Enterprise; Digital Manufacturing.
- Published
- 2013
29. SOA : 52 Most Asked Questions - What You Need to Know
- Author
-
Barton, Sharon and Barton, Sharon
- Subjects
- Service-oriented architecture (Computer science)
- Abstract
There has never been a SOA Guide like this. SOA 52 Success Secrets is not about the ins and outs of SOA. Instead, it answers the top 52 questions that we are asked and those we come across in our forums, consultancy and education programs. It tells you exactly how to deal with those questions, with tips that have never before been offered in print. Get the information you need--fast! This comprehensive guide offers a thorough view of key knowledge and detailed insight. This Guide introduces everything you want to know to be successful with SOA. A quick look inside of the subjects covered: Info (Data) -Centric SOA - How it differs from task-oriented (process) SOA, Enterprise SOA Understanding, Visualize with an SOA Diagram, The Microsoft SOA practical implementation through WCF, How can Cloud Computing and SOA be leveraged together?, How To Be An SOA Associate, Store All with SOA Registry, WHEN DOES AN SOA TEST BECOME NECESSARY?, Steps On SOA Security, Oracle SOA : Delivering Flexibility, Why Enterprises Need SOA Integration, Integrating SOA Into The Mainframe, What is BPM SOA BAM BPEL web services, Important aspects of SOA architecture (for the cloud), Improve Your Productivity Through SOA Software, The Best SOA Strategy, Service Oriented Architecture SOA Microsoft, What We May Mean By SOA Application, How SOA design is changing SOA Modeling, Integrating Cloud Computing and SOA, Read about SOA on a White Paper, The Job Description Of SOA Architect, The Enterprise SOA Advantage, Web Services SOA JAVA, Defining SAP SOA For Newbies, Why Creating A Dummy SOA Is Important, Comparing and contrasting these two important concepts Integrating Cloud Computing and SOA, Why should you consider metering SOA and Cloud Computing services?, Making SOA Testing More Efficient and Convenient, DETAILS DEFINE SOA WEB MAIL, An Example Of How SOA Can Help You, Get the Latest SOA News, How it differs from task-oriented (process) SOA, An Introduction to SOA Tutorial Basics, Loose Coupling And SOA Modelling, The Soa Saas Marriage of Convenience, The Benefits Of SOA Tools, How can Cloud Computing and SOA be leveraged together?, Can Children Learn Enough About SOA to Take an SOA Exam?, Big Issues facing tech-savvy businesses SOA Security (and Governance), What You Can Learn In Basic SOA Training, Describing the ESB SOA relationship, The SAP SOA Platform, What Does an SOA Actuary Really Do?, Developerworks SOA and Web Services, SOA Modeling - How SOA design is changing, Using The SOA System, Web Services, SOA And Other Independent Technology, The Real-World SOA Microsoft Approach, and much more...
- Published
- 2013
30. Computer Support Specialists Job Hunting : A Practical Manual for Job-hunters and Career Changers
- Author
-
Gladwell, Stephen and Gladwell, Stephen
- Subjects
- Career changes, Job hunting, Information technology--Vocational guidance, Computer technical support--Employees--Vocational guidance, Computer technical support--Vocational guidance
- Abstract
Computer support specialists provide technical assistance, support, and advice to individuals and organizations that depend on information technology. They work within organizations that use computer systems, for computer hardware or software vendors, or for third-party organizations that provide support services on a contract basis, such as help-desk service firms. Support specialists are usually differentiated between technical support specialists and help-desk technicians. This book gives you good solid advice and great strategies for getting interviews and landing the job as Computer Support Specialist. To Prepare for the Job this book tells you: - The training and education needed - Earnings - Expected job prospects - The job's activities and responsibilities - Working conditions To Land the Job, it gives you the hands-on and how-to's insight on: - Finding Opportunities - the best places to find them - Writing Unbeatable Resumes and Cover Letters - Acing the Interview - What to Expect From Recruiters - How employers hunt for Job-hunters.... and More This book offers excellent, insightful advice for everyone from entry level to senior professionals. None of the other such career guides compare with this one. It stands out because it: 1. Explains how the people doing the hiring think, so that you can win them over on paper and then in your interview; 2. Is filled with useful cheat and work-sheets; 3. Explains every step of the job-hunting process - from little known ways for finding openings to getting ahead on the job. This book covers everything. Whether you are trying to get your first Job or move up in the system, get this book.
- Published
- 2012
31. Computer Network, Systems, and Database Administrators Job Hunting : A Practical Manual for Job-hunters and Career Changers
- Author
-
Gladwell, Stephen and Gladwell, Stephen
- Subjects
- Career changes, Computer industry--Employees--Vocational guidance, Database industry--Employees--Vocational guidance, Job hunting
- Abstract
Information Technology (IT) has become an integral part of modern life. Among its most important functions are the efficient transmission of information and the storage and analysis of information. The jobs described in this book all help individuals and organizations share and store information through computer networks and systems, the Internet, and computer databases. This book gives you good solid advice and great strategies for getting interviews and landing the job as Computer Network, Systems, or Database Administrator. To Prepare for the Job this book tells you: - The training and education needed - Earnings - Expected job prospects - The job's activities and responsibilities - Working conditions To Land the Job, it gives you the hands-on and how-to's insight on: - Finding Opportunities - the best places to find them - Writing Unbeatable Resumes and Cover Letters - Acing the Interview - What to Expect From Recruiters - How employers hunt for Job-hunters.... and More This book offers excellent, insightful advice for everyone from entry level to senior professionals. None of the other such career guides compare with this one. It stands out because it: 1. Explains how the people doing the hiring think, so that you can win them over on paper and then in your interview; 2. Is filled with useful cheat and work-sheets; 3. Explains every step of the job-hunting process - from little known ways for finding openings to getting ahead on the job. This book covers everything. Whether you are trying to get your first Job or move up in the system, get this book.
- Published
- 2012
32. Interdisziplinarität und Komplexität. : Konferenz für Wirtschafts- und Sozialkybernetik KyWi 2012 vom 28. bis 29. Juni 2012 in Aachen.
- Author
-
Sabina Jeschke, Eckart Hauck, Frank Hees, Meike Tilebein, Thomas Fischer, Markus Schwaninger, Sabina Jeschke, Eckart Hauck, Frank Hees, Meike Tilebein, Thomas Fischer, and Markus Schwaninger
- Subjects
- Cybernetics--Economic aspects--Congresses, Cybernetics--Social aspects--Congresses
- Abstract
Der Titel des Konferenzbandes »Interdisziplinarität und Komplexität« greift die beiden bedeutsamen Herausforderungen an die aktuelle kybernetische Forschung auf. Aufgrund der Tatsache, dass die Zerlegung hoch komplexer Problemstellungen in Teilprobleme mit detaillierten Lösungsansätzen oft nicht mehr der Lösung der Gesamtproblematik gerecht werden kann, entsteht eine Nachfrage für einen gesteuerten Umgang mit Komplexität. Vollständige, robuste und nachhaltige Lösungen müssen Komplexität integrieren. So konzentrieren sich die Autoren in ihren Beiträgen auf die unterschiedlichsten Bereiche wie etwa Logistik, Normungsprozedere und Geschäftsmodellentwicklung. Um Wirkungszusammenhänge zu beschreiben, komplexe Prozesse und Strukturen zu analysieren und zu interpretieren, werden in den Forschungsansätzen Wissensgrundlagen aus unterschiedlichen Disziplinen herangezogen. Fachexperten wählten die qualitativ hochwertigen Paper-Beiträge in einem double-blind Reviewprozess aus. Die insgesamt dreizehn Veröffentlichungen bieten so eine stimmige Mischung aus Theorie und Praxis auf dem Gebiet der Wirtschafts- und Sozialkybernetik. Dieser Konferenzband erscheint in der Reihe »Wirtschaftskybernetik und Systemanalyse« und ist das gesammelte Ergebnis der wissenschaftlichen Konferenz für Wirtschafts- und Sozialkybernetik 2012 – KyWi 2012. Das An-Institut für Unternehmenskybernetik e.V. (IfU) der RWTH Aachen richtete vom 28. bis 29. Juni 2012 in Kooperation mit der Gesellschaft für Wirtschafts- und Sozialkybernetik e.V. (GWS) und dem Institut für Betriebswirtschaftslehre (IfB) der Universität St. Gallen erstmalig die KyWi aus. Die KyWi 2012 gilt als ein wichtiger Schritt für die Zusammenführung der wissenschaftlichen Gemeinschaft der Kybernetik im deutschsprachigen Raum – die zweitägige Konferenz ist die derzeit größte deutschsprachige Konferenz auf dem Gebiet der Wirtschafts- und Sozialkybernetik und integriert ebenfalls Themen der technischen Kybernetik. Durch den Konferenzband kann der Leser an den Forschungserkenntnissen der Kybernetikwissenschaftler teilhaben und in die Zukunftsperspektiven der Wirtschafts- und Sozialkybernetik Einblick erhalten.
- Published
- 2012
33. Communicating Process Architectures 2011
- Author
-
F.R.M. Barnes, J.F. Broenink, J. Kerridge, J.B. Pedersen, A.T. Sampson, P.H. Welch and F.R.M. Barnes, J.F. Broenink, J. Kerridge, J.B. Pedersen, A.T. Sampson, P.H. Welch
- Subjects
- Transputers--Congresses, Computer architecture--Congresses, Parallel processing (Electronic computers)--Congresses, occam (Computer program language)--Congresses
- Abstract
This book is a collection of the papers presented at the 33rd Communicating Process Architecture (CPA) conference, held at the University of Limerick, Ireland, 19-22 June, 2011. It was hosted by Lero, the Irish Software Engineering Research Centre, and co-located with FM 2011 (the 17th International Symposium on Formal Methods), SEW-34 the 34th Annual IEEE Software Engineering Workshop) and several specialist workshops and tutorials. These CPA proceedings contain the results from rich seams of research
- Published
- 2011
34. Computer Scientists : Job Hunting: a Practical Manual for Job-hunters and Career-changers
- Author
-
Gladwell, Stephen and Gladwell, Stephen
- Subjects
- Job hunting--United States, Computer science--Vocational guidance--United States
- Abstract
The widespread and increasing use of computers and information technology has generated a need for highly trained, innovative workers with extensive theoretical expertise. Computer scientists are the designers, creators, and inventors of new technology. By creating new technology, or finding alternative uses for existing resources, they solve complex business, scientific, and general computing problems. Some computer scientists work on multidisciplinary projects, collaborating with electrical engineers, mechanical engineers, and other specialists. This book gives you good solid advice and great strategies for getting interviews and landing the job as Computer Scientist. To Prepare for the Job this book tells you: - The training and education needed - Earnings - Expected job prospects - The job's activities and responsibilities - Working conditions To Land the Job, it gives you the hands-on and how-to's insight on: - Finding Opportunities - the best places to find them - Writing Unbeatable Resumes and Cover Letters - Acing the Interview - What to Expect From Recruiters - How employers hunt for Job-hunters.... and More This book offers excellent, insightful advice for everyone from entry level to senior professionals. None of the other such career guides compare with this one. It stands out because it: 1. Explains how the people doing the hiring think, so that you can win them over on paper and then in your interview; 2. Is filled with useful cheat and work-sheets; 3. Explains every step of the job-hunting process - from little known ways for finding openings to getting ahead on the job. This book covers everything. Whether you are trying to get your first Job or move up in the system, get this book.
- Published
- 2011
35. High Performance Computing
- Author
-
Grandinetti, L., Gentzsch, W., Foster, I., Grandinetti, L., Gentzsch, W., and Foster, I.
- Subjects
- High performance computing
- Abstract
In the last decade, parallel computing technologies have transformed high-performance computing. Two trends have emerged: massively parallel computing leading to exascale on the one hand and moderately parallel applications, which have opened up high-performance computing for the masses, on the other. The availability of commodity hardware components, a wide spectrum of parallel applications in research and industry and user-friendly management and development tools have enabled access to parallel and high-performance computing for a wide spectrum of end users from research and academia to mid-market industries. This book presents the proceedings of the biennial High Performance Computing workshop held in Cetraro, Italy, in June 2010. It is divided into four sections: state-of-the-art and future scenarios, grids and clouds, technologies and systems, and lastly, applications. The conference addressed the problems associated with the efficient and effective use of large systems. The papers included cover a wide range of topics from algorithms and architectures through grid and cloud technologies to applications and infrastructures for e-science.
- Published
- 2011
36. Logics and Languages for Reliability and Security
- Author
-
J. Esparza, B. Spanfelner, O. Grumberg, J. Esparza, B. Spanfelner, and O. Grumberg
- Subjects
- Computer logic--Congresses, Computer security--Congresses
- Abstract
Software-intensive systems are today an integral part of many everyday products. Whilst they provide great benefits in terms of ease of use and allow for new applications, they also impose enormous responsibilities. It is vital to ensure that such applications work correctly and that any data they use remains secure. Increasing the reliability of such systems is an important and challenging research topic in current computer science. This volume presents a number of papers which formed the basis for lectures at the 2009 summer school Formal Logical Methods for System Security and Correctness. The topics include: program analysis and verification by abstract interpretation, principles and applications of refinement types, multi-valued automata and their applications, mechanized semantics with applications to program proof and compiler verification and using security policies to write secure software, among others. This book delivers an interesting and valuable overview of state-of-the-art in logic- and language-based solutions to system reliability and security to anyone concerned with the correct functioning of software systems.
- Published
- 2010
37. Towards the Future Internet : Emerging Trends From European Research
- Author
-
Tselentis, Georgios and Tselentis, Georgios
- Subjects
- Internet--Security measures, Internet--Social aspects, Internet
- Abstract
This book contains papers describing the major scientific achievements supported by European funding in the area of Future Internet. It is published in the context of FIA, the Future Internet Assembly'1', which is structured to permit interactions across technical domains from researchers and other stakeholders active in Future Internet research. FIA holds two meetings per year and calls on those involved in relevant funded research projects to participate actively and to steer its work. On 31 March, 2008 the Bled declaration “Towards a European approach to the Future Internet”'2'was officially presented at the FIA Conference in Bled, Slovenia: “In the future, even more users, objects, services and critical information infrastructures will be networked through the Future Internet which will underpin an ever larger share of our modern and global economies. It is therefore time to strengthen and focus European activities on the Future Internet to maintain Europe's competitiveness in the global marketplace. A significant change is required and the European Internet scientific and economic actors, researchers, industrialists, SMEs, users, service and content providers, now assert the urgent necessity to redesign the Internet, taking a broad multidisciplinary approach, to meet Europe's societal and commercial ambitions.”'1'For more information see http://www.future-internet.eu'2'For more information see http://www.future-internet.eu/publications/bled-declaration.html
- Published
- 2010
38. Computer and Information Technology in Pervasive Environments
- Author
-
Daming Wei and Daming Wei
- Subjects
- Computer network protocols, Computer network architectures, Ubiquitous computing, Mobile computing
- Abstract
With the emergence and convergence of advanced network technologies and electronic devices, the trend from personal computer computing towards pervasive computing is continuing. This e-book on Computer and Information Technology in Pervasive Environments contains extended versions of papers originally presented at CIT'05, the fifth International Conference on Computer and Information Technology.
- Published
- 2007
39. Tablet PC Quick Reference
- Author
-
West, Jeff Van and West, Jeff Van
- Subjects
- Pen-based computers
- Abstract
Whether you're in a meeting, hallway, coffee shop, or conference—achieve ultimate mobility with the TABLET PC QUICK REFERENCE. Combining the simplicity of pen and paper with all the muscle of Microsoft® Windows® XP Professional, the Tablet PC is more than just cool—it can maximize your productivity, no matter how or where you work. Use this expert guide to get up and running faster, and take the power of a desktop PC—and more—anywhere you'd take a notepad and pen! Pen, voice, keyboard, mouse—you decide how to control your Tablet PC Accelerate your dexterity with the digital pen, Input Panel, and Windows Journal Save, edit, search, and e-mail your handwritten notes Add notes and drawings directly into Microsoft Word documents, Microsoft Excel spreadsheets, and other digital documents Annotate Microsoft PowerPoint® slides—even as you present them Go hands-free with voice commands and dictation capabilities See how the Tablet can maximize collaboration and interactivity in meetings
- Published
- 2003
40. Annual Review in Automatic Programming : International Tracts in Computer Science and Technology and Their Application, Vol. 2
- Author
-
Richard Goodman and Richard Goodman
- Subjects
- Computer programming, Automatic programming (Computer science)
- Abstract
Annual Review in Automatic Programming, Volume 2 is a collection of papers that discusses the controversy about the suitability of COBOL as a common business oriented language, and the development of different common languages for scientific computation. A couple of papers describes the use of the Genie system in numerical calculation and analyzes Mercury autocode in terms of a phrase structure language, such as in the source language, target language, the order structure of ATLAS, and the meta-syntactical language of the assembly program. Other papers explain interference or an'intermediate return'using ALGOL, the National-Elliot 803 Computer, and the MADCAP II. MADCAP II is A version of the automatic programming compiler for MANIAC II. One paper discusses the APT which serves as a common computer language for computational problems. Another paper explains SAKO which can bypass machine language almost entirely in the field of numerical and logical problems, particularly in programs using XYZ and ZAM II. A report of the Working Committee of the British Computer Society Discussion Group No. 5 concludes that COBOL is unnecessarily complex due to its close machine orientation. Computer engineers, computer instructors, programmers, and students of computer science will find the collection highly valuable.
- Published
- 1961
41. Applications of Categories in Computer Science : Proceedings of the London Mathematical Society Symposium, Durham 1991
- Author
-
M. P. Fourman, P. T. Johnstone, A. M. Pitts, M. P. Fourman, P. T. Johnstone, and A. M. Pitts
- Subjects
- Categories (Mathematics)--Congresses, Computer science--Mathematics--Congresses
- Abstract
Category theory and related topics of mathematics have been increasingly applied to computer science in recent years. This book contains selected papers from the London Mathematical Society Symposium on the subject which was held at the University of Durham. Participants at the conference were leading computer scientists and mathematicians working in the area and this volume reflects the excitement and importance of the meeting. All the papers have been refereed and represent some of the most important and current ideas. Hence this book will be essential to mathematicians and computer scientists working in the applications of category theory.
- Published
- 1992
42. Information Systems And Technologies For Network Society: Proceedings Of The Ipsj International Symposium
- Author
-
Yahiko Kambayashi, Yoshifumi Masunaga, Makoto Takizawa, Yuichiro Anzai, Yahiko Kambayashi, Yoshifumi Masunaga, Makoto Takizawa, and Yuichiro Anzai
- Subjects
- Information networks--Congresses, Electronic data processing--Congresses, Information technology--Congresses, Information society--Congresses
- Abstract
This volume contains technical papers and panel position papers selected from the proceedings of the International Symposium on Information Systems and Technologies for Network Society, held together with the IPSJ (information processing society of Japan) National Convention, in September 1997. Papers were submitted from all over the world, especially from Japan, Korea and China. Since these countries are believed to form one of the major computer manufacturing centers in the world, a panel on “Computer Science Education for the 21st Century” was set up. A special session on the Japanese project on Software Engineering invited representative researchers from the project, which is supported by the Ministry of Education, Japan.
- Published
- 1997
43. Parallel Programming Systems - Proceedings Of A Jsps Seminar
- Author
-
Chung Kwong Yuen, A Yonezawa, Chung Kwong Yuen, and A Yonezawa
- Subjects
- Parallel programming (Computer science)--Congresses
- Abstract
This volume contains papers presented at the Japan-Singapore joint seminar on Parallel Programming Systems sponsored by the Japan Society for the Promotion of Science. The papers cover recent research in Japan and Singapore on hardware systems and language processors for processing parallel programs. The areas discussed include dataflow machines, parallel functional and imperative languages, and parallel application algorithms.
- Published
- 1993
44. Microsoft 365 Access For Dummies
- Author
-
Laurie A. Ulrich, Ken Cook, Laurie A. Ulrich, and Ken Cook
- Abstract
Join the millions of people already using Microsoft Access and become a database power-user in no time! In the newly revised edition of Microsoft Access For Dummies, professional database developer and Access extraordinaire Laurie Ulrich-Fuller walks you through the ins-and-outs of one of the world's most popular database platforms. This is the perfect beginner's guide to Microsoft Access, showing you how to create databases, extract data, create reports, and more. The author demonstrates a ton of tips, tricks, and best practices you can use immediately to create, maintain, and improve your databases. You'll also find: Updates outlining edge browser controls in forms Step-by-step guides explaining how to import, export, and edit data Easy-to-follow query-writing tutorials to help you find the exact data you're looking for when you need it Whether you're a database novice or a data science whiz, Microsoft Access For Dummies has the info you need to supercharge your database skills. It's the perfect, how-to guide to get you up-to-speed on everything you need to know to get started with Microsoft's world-famous database app.
- Published
- 2025
45. A First Course in Systems Biology
- Author
-
Eberhard Voit, Melissa L. Kemp, Eberhard Voit, and Melissa L. Kemp
- Subjects
- Systems biology, Computational biology
- Abstract
A First Course in Systems Biology, Third Edition is an introduction to the growing field of systems biology for advanced undergraduates and graduate students. Its focus is the design and analysis of computational models and their applications to diverse biomedical phenomena, from simple networks and kinetics to complex pathway systems, signal transduction, personalized medicine, and interacting populations. The book begins with the fundamentals of computational modeling, then reviews features of the molecular inventories that bring biological systems to life and ends with case studies that reflect some of the frontiers in systems biology. In this way, the First Course provides the reader with a comprehensive background and with access to methods for executing standard tasks of biomedical systems analysis, exposure to the modern literature, and a foundation for launching into specialized projects that address biomedical questions with theoretical and computational means.This third edition has been thoroughly updated. It provides an introduction to agent-based and multiscale modeling, a deeper account of biological design principles, and the optimization of metabolic flux distributions. This edition also discusses novel topics of synthetic biology, personalized medicine, and virtual clinical trials that are just emerging on the horizon of this field.
- Published
- 2025
46. Microsoft 365 Word For Dummies
- Author
-
Dan Gookin and Dan Gookin
- Abstract
Take a deep dive into the most popular word processor on the planet Word, Microsoft's powerful and popular word processor, is capable of extraordinary things. From template building to fancy formatting and even AI-powered editing and proofing, your copy of Word stands ready to help you supercharge your productivity and save you time and energy. You just need to learn how it's done. And, thanks to this easy-to-understand book, learning is the easy part! This latest edition of Word For Dummies is packed with the essentials you need to turn any old copy of the famous word processor into a document-creating, table-formatting, graphics-editing super app. You'll even learn how to customize your version of Microsoft Word so it's absolutely perfect for you, at home and at work. You'll also find out how to: Navigate the Word interface and menus and figure out a ton of hotkey shortcuts Edit, format, and comment documents to make team collaboration a breeze Use the new Microsoft Copilot's AI capabilities to make Word even more powerful So, grab your copy of the latest edition of Word For Dummies today. It's perfect for casual users interested in upgrading their knowledge of this ubiquitous app as well as power users looking for the latest productivity tips and tricks.
- Published
- 2025
47. Innovation District Planning : Concept, Framework, Practice
- Author
-
Tan Yigitcanlar, Surabhi Pancholi, Niusha Esmaeilpoorarabi, Rosemary Adu-McVie, Tan Yigitcanlar, Surabhi Pancholi, Niusha Esmaeilpoorarabi, and Rosemary Adu-McVie
- Subjects
- Cities and towns--Effect of technological innovations on--Australia--Brisbane (Qld.)--Case studies, Economic development--Australia--Brisbane (Qld.)--Case studies, Urban economics--Case studies, City planning--Australia--Brisbane (Qld.)--Case studies, Research parks--Australia--Brisbane (Qld.)--Case studies, Knowledge economy--Australia--Brisbane (Qld.)--Case studies
- Abstract
This book aims to fill the knowledge gap on how to plan, develop and manage innovation districts that are competitive in terms of both productivity and quality of living, justifying the massive investment put into place and at the same time doing both in a delicate and harmonious way.There is a need for smart urban land use that is wired with both hard infrastructures (e.g., telecommunication and transport) and soft infrastructures (e.g., diversity and tolerance). The reader learns this knowledge through conceptual expansions for key insights, frameworks for potential and performance assessment and best practices for global innovation districts. The authors begin innovation district planning with the role and effectiveness of planning a branding in the development of innovation districts. The next key topic of place making is recognised as a key strategy for supporting knowledge generation and innovation activities in the contemporary innovation districts. Another important topic is place quality where the reader learns to identify and classify indicators of place quality by studying global innovation districts best practices. The reader also expands their understanding on the classification of innovation districts based on their key characteristics through a methodological approach. The book concludes with district smartness studied through the socio-cultural role played by anchor universities in facilitating place making in innovation districts. Smart campuses, enabled by digital transformation opportunities in higher education, are seen as a miniature replica of smart cities and serve as living labs for smart technology.The book serves as a repository for scholars, researchers, postgraduate and undergraduate students as it communicates the complex innovation district phenomenon in an easy-to-digest form by providing both the big picture view and specifics of each component of that view.
- Published
- 2024
48. Unmatched : 50 Years of Supercomputing
- Author
-
David Barkai and David Barkai
- Subjects
- Supercomputers--History
- Abstract
Unmatched: 50 Years of Supercomputing: A Personal Journey Accompanying the Evolution of a Powerful ToolThe rapid and extraordinary progress of supercomputing over the past half-century is a powerful demonstration of our relentless drive to understand and shape the world around us. In this book, David Barkai offers a unique and compelling account of this remarkable technological journey, drawing from his own rich experiences working at the forefront of high-performance computing (HPC).This book is a journey delineated as five decade-long ‘epochs'defined by the systems'architectural themes: vector processors, multi-processors, microprocessors, clusters, and accelerators and cloud computing. The final part examines key issues of HPC and discusses where it might be headed.A central goal of this book is to show how computing power has been applied, and, more importantly, how it has impacted and benefitted society. To this end, the use of HPC is illustrated in a range of industries and applications, from weather and climate modeling to engineering and life sciences. As such, this book appeals to both students and general readers with an interest in HPC, as well as industry professionals looking to revolutionize their practice.From the Foreword:“David Barkai's career has spanned five decades, during which he has had the rare opportunity to be part of some of the most significant developments in the field of supercomputing. His personal and professional insights, combined with his deep knowledge and passion for the subject matter, make this book an invaluable resource for anyone interested in the evolution of HPC and its impact on our lives.”-Horst Simon, Director, Abu Dhabi Investment Authority (ADIA) Lab
- Published
- 2024
49. Computer Jargon - The Illustrated Glossary of Basic Computer Terminology : Decode and Simplify Complex Computer Terms with Easy-to-follow Visual Guides
- Author
-
Kevin Wilson and Kevin Wilson
- Abstract
An easy-to-read guide that cuts through computer jargon, using visual aids and step-by-step explanations. Understand tech terms effortlessly with full-color illustrations and concise, clear language.Key FeaturesStep-by-step visual approach simplifies computer jargon.Full-color illustrations aid in understanding.A user-friendly structure helps readers decode terminology at their own pace.Book DescriptionThis book provides a clear and accessible guide to demystifying technical terms. Using a step-by-step approach, it simplifies complex computer terminology, offering detailed explanations alongside full-color illustrations, screenshots, and photographs. Each term is broken down into easy-to-understand language, making it accessible even for those with little technical background. It covers key areas of computer terminology, including networking, internet terms, and digital media formats. Readers are provided with a broad range of terms, from basic functions to security and privacy concepts, boosting their confidence in navigating the technical language of modern technology. Additionally, this glossary addresses emerging technologies and their jargon, defining terms related to artificial intelligence, cloud computing, and cybersecurity. Whether you're a beginner or a moderately experienced user, this guide is an ideal reference for decoding tech terms and understanding the digital world with confidence and clarity.What you will learnDecode technical acronyms quickly and easily.Identify essential hardware and software terms.Simplify and understand internet and networking jargon.Grasp common file formats and media terminology.Recognize security and privacy terms confidently.Learn to decode tech language commonly used in everyday computing.Who this book is forThe ideal audience for this book includes beginner to moderately experienced computer users who may feel overwhelmed by the technical jargon they encounter. Readers do not need prior deep technical knowledge, but a basic familiarity with computers is helpful. This book is also suitable for users looking to refresh or expand their understanding of common acronyms and terminology used in everyday computing.
- Published
- 2024
50. Metaheuristics for Enterprise Data Intelligence
- Author
-
Kaustubh Vaman Sakhare, Vibha Vyas, Apoorva S Shastri, Kaustubh Vaman Sakhare, Vibha Vyas, and Apoorva S Shastri
- Subjects
- Metaheuristics
- Abstract
With the emergence of the data economy, information has become integral to business excellence. Every enterprise, irrespective of its domain of interest, carries and processes a lot of data in their day-to-day activities. Converting massive datasets into insightful information plays an important role in developing better business solutions. Data intelligence and its analysis pose several challenges in data representation, building knowledge systems, issue resolution and predictive systems for trend analysis and decisionmaking. The data available could be of any modality, especially when data is associated with healthcare, biomedical, finance, retail, cybersecurity, networking, supply chain management, manufacturing, etc. The optimization of such systems is therefore crucial to leveraging the best outcomes and conclusions. To this end, AI-based nature-inspired optimization methods or approximation-based optimization methods are becoming very powerful. Notable metaheuristics include genetic algorithms, differential evolution, ant colony optimization, particle swarm optimization, artificial bee colony, grey wolf optimizer, political optimizer, cohort intelligence and league championship algorithm. This book provides a systematic discussion of AI-based metaheuristics application in a wide range of areas, including big data intelligence and predictive analytics, enterprise analytics, graph optimization algorithms, machine learning and ensemble learning, computer vision enterprise practices and data benchmarking.
- Published
- 2024
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.