bannerbanner

зарубежная компьютерная литература

Modeling and Optimization of Air Traffic
3
This book combines the research activities of the authors, both of whom are researchers at Ecole Nationale de l’Aviation Civile (French National School of Civil Aviation), and presents their findings from the last 15 years. Their work uses air transp…
This book combines the research activities of the authors, both of whom are researchers at Ecole Nationale de l’Aviation Civile (French National School of Civil Aviation), and presents their findings from the last 15 years. Their work uses air transp…
Market-Oriented Grid and Utility Computing
3
The first single-source reference covering the state of the art in grid and utility computing economy research This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main part…
The first single-source reference covering the state of the art in grid and utility computing economy research This book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main part…
Fundamentals of Performance Evaluation of Computer and Telecommunications Systems
4
The only singular, all-encompassing textbook on state-of-the-art technical performance evaluation Fundamentals of Performance Evaluation of Computer and Telecommunication Systems uniquely presents all techniques of performance evaluation of computers…
The only singular, all-encompassing textbook on state-of-the-art technical performance evaluation Fundamentals of Performance Evaluation of Computer and Telecommunication Systems uniquely presents all techniques of performance evaluation of computers…
Computer Architecture
5
This book lays out the concepts necessary to understand how a computer works. For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choi…
This book lays out the concepts necessary to understand how a computer works. For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choi…
Hyperconnectivity. Economical, Social and Environmental Challenges
3
The use of digital information and communication technologies would be the traces of a social acceptability of the exploitation of all data, in the context of negotiations of uses. This is the reason why the users present themselves actors and contri…
The use of digital information and communication technologies would be the traces of a social acceptability of the exploitation of all data, in the context of negotiations of uses. This is the reason why the users present themselves actors and contri…
Deterministic Network Calculus. From Theory to Practical Implementation
3
Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its th…
Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its th…
Graph Partitioning
3
Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly increas…
Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly increas…
Telepresence in Training
4
The different forms of telepresence in education, in distance learning, in student support, in the use of learning environments or even at the heart of robot systems, are developed in universities and higher education facilities specializing in profe…
The different forms of telepresence in education, in distance learning, in student support, in the use of learning environments or even at the heart of robot systems, are developed in universities and higher education facilities specializing in profe…
Sound Visualization and Manipulation
4
Unique in addressing two different problems – sound visualization and manipulation – in a unified way Advances in signal processing technology are enabling ever more accurate visualization of existing sound fields and precisely defined sound field pr…
Unique in addressing two different problems – sound visualization and manipulation – in a unified way Advances in signal processing technology are enabling ever more accurate visualization of existing sound fields and precisely defined sound field pr…
ERP and Information Systems. Integration or Disintegration
4
This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems and the…
This research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems and the…
Collaborative Annotation for Reliable Natural Language Processing. Technical and Sociological Aspects
4
This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success of m…
This book presents a unique opportunity for constructing a consistent image of collaborative manual annotation for Natural Language Processing (NLP). NLP has witnessed two major evolutions in the past 25 years: firstly, the extraordinary success of m…
WHOIS Running the Internet. Protocol, Policy, and Privacy
4
Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-y…
Discusses the evolution of WHOIS and how policy changes will affect WHOIS’ place in IT today and in the future This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-y…
Challenges of the Internet of Things. Technique, Use, Ethics
5
This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, met…
This book will examine the issues of IoT according to three complementary axes: technique, use, ethics. The techniques used to produce artefacts (physical objects, infrastructures), programs (algorithms, software) and data (Big data, linked data, met…
Big-Data Analytics for Cloud, IoT and Cognitive Computing
3
The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that are f…
The definitive guide to successfully integrating social, mobile, Big-Data analytics, cloud and IoT principles and technologies The main goal of this book is to spur the development of effective big-data computing operations on smart clouds that are f…
Decision-Making and the Information System
4
The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions to b…
The purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions to b…
Artificial Immune System. Applications in Computer Security
5
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achieve…
This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achieve…
Cyber Security Policy Guidebook
5
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to …
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to …
Information Warfare
4
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strate…
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strate…
Supply Chain Management and its Applications in Computer Science
4
Supply chain management is a key topic for a large variety of strategic decision problems. It is essential in making efficient decisions related to the management of inventory and the delivery of final products to customers. The focus of this book is…
Supply chain management is a key topic for a large variety of strategic decision problems. It is essential in making efficient decisions related to the management of inventory and the delivery of final products to customers. The focus of this book is…

Популярные авторы