ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Books  (27)
  • Maps
  • Other Sources
  • Computer Science
  • English  (27)
  • Danish
  • German
  • Hungarian
  • Swedish
  • 2020-2024  (19)
  • 2015-2019  (8)
  • 2005-2009
  • 1995-1999
  • 1980-1984
  • 1975-1979
  • 1970-1974
  • 1960-1964
  • 1955-1959
  • 1940-1944
  • 2021  (19)
  • 2015  (8)
  • 1995
  • 1984
  • 1971
  • 1944
  • 1942
Collection
  • Books  (27)
  • Maps
  • Other Sources
Language
  • English  (27)
  • Danish
  • German
  • Hungarian
  • Swedish
Years
  • 2020-2024  (19)
  • 2015-2019  (8)
  • 2005-2009
  • 1995-1999
  • 1980-1984
  • +
Year
Topic
  • 1
    Keywords: Computer science ; Computers ; Education ; Computer Science ; Information Systems and Communication Service ; Education, general
    Description / Table of Contents: Innovative Technologies for an Engaging Classroom (iTEC) --- Development of the Future Classroom Toolkit --- Designing Edukata, a Participatory Design Model for Creating Learning Activities --- The iTEC Technical Artefacts, Architecture and Educational Cloud --- The Composer: Creating, Sharing and Facilitating Learning Designs --- Recommender Systems --- Resources beyond Content for Open Education --- The iTEC Widget Store --- The Impact and Potential of iTEC: Evidence from large-scale Validation in School Classrooms
    Pages: Online-Ressource (XVII, 201 pages) , 47 illustrations, 42 illustrations in color
    ISBN: 9783319193663
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science ; Data structures (Computer science) ; User interfaces (Computer systems) ; Application software ; Computers ; Computer Science ; History of Computing ; Computer Appl. in Arts and Humanities ; Data Structures ; User Interfaces and Human Computer Interaction
    Description / Table of Contents: Part I: Artistic Contributions --- The Computer Age --- Odes to Ted Nelson --- Part II: Peer Histories --- The Two-eyed Man --- Ted Nelson’s Xanadu—Caution: Four Letter Words Ahead --- Hanging Out with Ted Nelson --- Riffing on Ted Nelson—Hypermind --- Intertwingled Inspiration --- An Advanced Book for Beginners --- Part III: Hypertext and Ted Nelson-Influenced Research --- The Importance of Ted’s Vision --- Data, Metadata and Ted --- Making Links: Everything Really is Deeply Intertwingled --- Ted Nelson --- History Debugged --- We Can and Must Understand Computers NOW --- The Future of Transclusion --- Ted Nelson: A Critical (and Critically Incomplete) Bibliography --- Part IV: The Last Word --- What Box?
    Pages: Online-Ressource (XVI, 150 pages) , 43 illustrations
    ISBN: 9783319169255
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science ; Management information systems ; Industrial management ; Software engineering ; Application software ; Computer Science ; Computer Appl. in Administrative Data Processing ; Business Process Management ; Information Systems Applications (incl. Internet) ; Software Engineering ; Software Management
    Description / Table of Contents: 1 Introduction --- Part I Business Operation Support --- 2 Subject-Oriented Business Processes Meet Strategic Management: Two Case Studies from the Manufacturing Industry --- 3 Communication- and Value-Based Organizational Development at the University Clinic for Radiotherapy-Radiation Oncology --- 4 Introducing S-BPM at an IT Service Providers --- 5 A Service Hardware Application Case Fiducia --- 6 Designing an Agile Process Layer for Competitive Differentiation --- Part II Consultancy and Education Support --- 7 Model as You Do: Engaging an S-BPM Vendor on Process Modelling in 3D Virtual Worlds --- 8 A Tangible Modeling Interface for Subject-Oriented Business Process Management --- 9 A Reference Model for Maintenance Processes --- 10 Role and Rights Management --- 11 Embodying Business Rules in S-BPM --- 12 Agents Implementing Subject Behaviour: A Manufacturing Scenario --- Part III Technical Execution Support --- 13 An Abstract State Machine Interpreter for S-BPM --- 14 Structured Communication—Approaching S-BPM with Microsoft Technologies --- 15 ERP Integration in S-BPM Processes
    Pages: Online-Ressource (XIV, 283 pages) , 134 illustrations
    ISBN: 9783319175423
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer science ; Artificial intelligence ; Computer Science ; Artificial Intelligence (incl. Robotics)
    Description / Table of Contents: Machine learning techniques provide cost-effective alternatives to traditional methods for extracting underlying relationships between information and data and for predicting future events by processing existing information to train models. Efficient Learning Machines explores the major topics of machine learning, including knowledge discovery, classifications, genetic algorithms, neural networking, kernel methods, and biologically-inspired techniques. Mariette Awad and Rahul Khanna’s synthetic approach weaves together the theoretical exposition, design principles, and practical applications of efficient machine learning. Their experiential emphasis, expressed in their close analysis of sample algorithms throughout the book, aims to equip engineers, students of engineering, and system designers to design and create new and more efficient machine learning systems. Readers of Efficient Learning Machines will learn how to recognize and analyze the problems that machine learning technology can solve for them, how to implement and deploy standard solutions to sample problems, and how to design new systems and solutions. Advances in computing performance, storage, memory, unstructured information retrieval, and cloud computing have coevolved with a new generation of machine learning paradigms and big data analytics, which the authors present in the conceptual context of their traditional precursors. Awad and Khanna explore current developments in the deep learning techniques of deep neural networks, hierarchical temporal memory, and cortical algorithms. Nature suggests sophisticated learning techniques that deploy simple rules to generate highly intelligent and organized behaviors with adaptive, evolutionary, and distributed properties. The authors examine the most popular biologically-inspired algorithms, together with a sample application to distributed datacenter management. They also discuss machine learning techniques for addressing problems of multi-objective optimization in which solutions in real-world systems are constrained and evaluated based on how well they perform with respect to multiple objectives in aggregate. Two chapters on support vector machines and their extensions focus on recent improvements to the classification and regression techniques at the core of machine learning
    Pages: Online-Ressource (XIX, 268 pages) , 88 illustrations
    ISBN: 9781430259909
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science ; Microprogramming ; Computer Science ; Computer Science, general ; Control Structures and Microprogramming
    Description / Table of Contents: Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel’s new firmware direction (including Quark coverage), showing how to integrate Intel® Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization
    Pages: Online-Ressource (XXIII, 224 pages) , 68 illustrations
    ISBN: 9781484200704
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computer science ; Computer organization ; Computers ; Computer Science ; Computer Systems Organization and Communication Networks ; Information Systems and Communication Service
    Description / Table of Contents: Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers
    Pages: Online-Ressource (XXI, 360 pages) , 103 illustrations
    ISBN: 9781430266389
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computer science ; Software engineering ; Data encryption (Computer science) ; Computer Science ; Data Encryption ; Software Engineering/Programming and Operating Systems
    Description / Table of Contents: A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM
    Pages: Online-Ressource (XXVII, 392 pages) , 41 illustrations
    ISBN: 9781430265849
    Language: English
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    facet.materialart.
    Unknown
    Taylor & Francis | Routledge
    Publication Date: 2024-04-14
    Description: This book introduces a new mechanism for representing social networks in which pairwise relationships can be drawn from a range of realistic possibilities, including different types of relationships, different strengths in the directions of a pair, positive and negative relationships, and relationships whose intensities change with time. For each possibility, the book shows how to model the social network using spectral embedding. It also shows how to compose the techniques so that multiple edge semantics can be modeled together. The modeling techniques are then applied to a range of datasets to show how they can produce results that are useful in understanding real-world social networks.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics::UBW Internet: general works
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    facet.materialart.
    Unknown
    Springer Nature | Springer Vieweg
    Publication Date: 2024-04-11
    Description: This Open Access proceedings present a good overview of the current research landscape of industrial robots. The objective of MHI Colloquium is a successful networking at academic and management level. Thereby the colloquium is focussing on a high level academic exchange to distribute the obtained research results, determine synergetic effects and trends, connect the actors personally and in conclusion strengthen the research field as well as the MHI community. Additionally there is the possibility to become acquainted with the organizing institute. Primary audience are members of the scientific association for assembly, handling and industrial robots (WG MHI).
    Keywords: Robotics and Automation ; Manufacturing, Machines, Tools, Processes ; Engineering Design ; Simulation and Modeling ; Machinery and Machine Elements ; Control, Robotics, Automation ; Machines, Tools, Processes ; Computer Science ; Open Access ; Assembly Processes & Systems ; Handling & Grasping ; Modelling & Simulation ; Human-robot-collaboration ; Industrial Robotics ; Robotics ; Production engineering ; Technical design ; Computer modelling & simulation ; Engines & power transmission ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering::TJFM1 Robotics ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TG Mechanical engineering and materials::TGP Production and industrial engineering ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBD Technical design ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TG Mechanical engineering and materials::TGB Mechanical engineering::TGBN Engines and power transmission
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2021-02-10
    Description: This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numenta’s anomaly detection software show that cloud computing is essential to achieving anti-fragility for classes of events with negative impacts.
    Keywords: Computer Systems Organization and Communication Networks ; Information Systems and Communication Service ; Artificial Intelligence ; Simulation and Modeling ; Computer Engineering and Networks ; Database Management System ; Computer Science ; Anomaly detection ; Anti-fragility ; Cloud computing ; Complex adaptive systems ; DevOps (Development and Operation) ; Diversity ; Loose coupling ; Malware ; Malware detection ; Microservices ; Modules ; Monitoring ; Redundancy ; Risk analysis ; Software architecture ; Software design ; System dependencies ; Tight coupling ; Trust ; Weak links ; Computer networking & communications ; Computer modelling & simulation ; bic Book Industry Communication::U Computing & information technology::UT Computer networking & communications ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYQ Artificial intelligence ; bic Book Industry Communication::U Computing & information technology::UY Computer science::UYM Computer modelling & simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This open access book summarizes the research done and results obtained in the second funding phase of the Priority Program 1648 "Software for Exascale Computing" (SPPEXA) of the German Research Foundation (DFG) presented at the SPPEXA Symposium in Dresden during October 21-23, 2019. In that respect, it both represents a continuation of Vol. 113 in Springer’s series Lecture Notes in Computational Science and Engineering, the corresponding report of SPPEXA’s first funding phase, and provides an overview of SPPEXA’s contributions towards exascale computing in today's sumpercomputer technology. The individual chapters address one or more of the research directions (1) computational algorithms, (2) system software, (3) application software, (4) data management and exploration, (5) programming, and (6) software tools. The book has an interdisciplinary appeal: scholars from computational sub-fields in computer science, mathematics, physics, or engineering will find it of particular interest.
    Keywords: Simulation and Modeling ; Performance and Reliability ; Computational Science and Engineering ; Input/Output and Data Communications ; Mathematical and Computational Engineering ; Numerical and Computational Physics, Simulation ; Computer Science ; Computer Hardware ; Mathematical and Computational Engineering Applications ; Theoretical, Mathematical and Computational Physics ; open access ; computational algorithms and numerical methods ; data management and exploration ; high-performance computing ; simulation software and applications ; system software and software tools ; Computer modelling & simulation ; Systems analysis & design ; Maintenance & repairs ; Maths for scientists ; Computer networking & communications ; Distributed databases ; Maths for engineers ; Mathematical physics ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDE Maths for scientists ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TB Technology: general issues::TBJ Maths for engineers ; thema EDItEUR::P Mathematics and Science::PH Physics::PHU Mathematical physics
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    facet.materialart.
    Unknown
    Taylor & Francis
    Publication Date: 2024-04-14
    Description: Drawing on the authors’ more than six years of R&D in location-based information systems as well as their participation in defining the Java ME Location API 2.0, this text describes the technical components needed to create location-based services with an emphasis on nonproprietary, freely available solutions that work across different technologies and platforms. Each chapter presents a general real-time tracking system example that can be easily adapted to target any application domain and that can incorporate other sensor data to make the system "participatory sensing" or "human-centric sensing." A companion website offers many supporting materials.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: This book contains the joint proceedings of the Winter School of Hakodate (WSH) 2011 held in Hakodate, Japan, March 15–16, 2011, and the 6th International Workshop on Natural Computing (6th IWNC) held in Tokyo, Japan, March 28–30, 2012, organized by the Special Interest Group of Natural Computing (SIG-NAC), the Japanese Society for Artificial Intelligence (JSAI). This volume compiles refereed contributions to various aspects of natural computing, ranging from computing with slime mold, artificial chemistry, eco-physics, and synthetic biology, to computational aesthetics.
    Keywords: Simulation and Modeling ; Computational Biology/Bioinformatics ; Models and Principles ; Computer Appl. in Arts and Humanities ; Computer Science ; Computational and Systems Biology ; Database Management System ; Computer and Information Systems Applications ; Computational Aesthetics ; Computing with Natural media ; Harness the Nature for Computation ; Synthetic Biology ; Computer modelling & simulation ; Life sciences: general issues ; Information technology: general issues ; Computer science ; Computer applications in the arts & humanities ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::P Mathematics and Science::PS Biology, life sciences::PSA Life sciences: general issues ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::N History and Archaeology::NH History
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    facet.materialart.
    Unknown
    Springer Nature | Apress
    Publication Date: 2024-04-14
    Description: Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business
    Keywords: Security ; Computer Science ; Rational cybersecurity ; Cybersecurity ; Risk management ; Cybersecurity strategy ; DevSecOps ; Security governance ; Security culture ; Cyber-resilience ; Cybersecurity maturity model ; Cybersecurity RACIs ; Shared responsibility ; Security championship ; Modern identity ; Agile security ; Open Access ; Computer security ; thema EDItEUR::U Computing and Information Technology::UR Computer security
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    facet.materialart.
    Unknown
    Springer Nature | Palgrave Macmillan
    Publication Date: 2021-02-10
    Description: This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing.
    Keywords: Innovation/Technology Management ; Big Data/Analytics ; Security ; e-Commerce/e-business ; Business and Management ; IT in Business ; Computer Science ; e-Commerce and e-Business ; GDPR ; Data regulation ; accountability ; ethics in computing ; HIPAA ; it ; information management ; internet ; open access ; Research & development management ; Industrial applications of scientific research & technological innovation ; Business mathematics & systems ; Computer security ; Business applications ; E-commerce: business aspects ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJM Management & management techniques::KJMV Management of specific areas::KJMV6 Research & development management ; bic Book Industry Communication::K Economics, finance, business & management::KJ Business & management::KJQ Business mathematics & systems ; bic Book Industry Communication::U Computing & information technology::UR Computer security ; bic Book Industry Communication::U Computing & information technology::UF Business applications
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book is the first to combine coverage of fuzzy logic and Semantic Web languages. It provides in-depth insight into fuzzy Semantic Web languages for non-fuzzy set theory and fuzzy logic experts. It also helps researchers of non-Semantic Web languages get a better understanding of the theoretical fundamentals of Semantic Web languages. The first part of the book covers all the theoretical and logical aspects of classical (two-valued) Semantic Web languages. The second part explains how to generalize these languages to cope with fuzzy set theory and fuzzy logic.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    facet.materialart.
    Unknown
    Springer Nature | Springer
    Publication Date: 2024-04-14
    Description: The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.
    Keywords: Software Engineering ; Theory of Computation ; Artificial Intelligence ; Computer Systems Organization and Communication Networks ; Computer Hardware ; Simulation and Modeling ; Computer Engineering and Networks ; Computer Science ; architecture verification and validation ; artificial intelligence ; automata theory ; computer systems ; correlation analysis ; distributed computer systems ; embedded systems ; formal languages ; formal logic ; linguistics ; model checking ; programming languages ; semantics ; software architecture ; software design ; software quality ; verification and validation ; Open Access ; Computer science ; Mathematical theory of computation ; Artificial intelligence ; Computer networking & communications ; Computer hardware ; Computer modelling & simulation ; thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::U Computing and Information Technology::UK Computer hardware ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2024-03-30
    Description: This book summarizes results of longstanding research and scientific contributions from many projects and relevant working groups. It collects and evaluates wind and wave climate projections under changing climate having design needs and marine safety in focus. Potential impact of projected climate change in met-ocean conditions on ships and offshore structures is discussed and illustrated by an example of the expected wave climate change on tanker design.
    Keywords: GE1-350 ; TA1-2040 ; TK1-9971 ; TP248.13-248.65 ; TL1-4050 ; HG1-9999 ; QE1-996.5 ; RS1-441 ; TA401-492 ; Statistics for Engineering ; Computer Science ; Climate Change Management and Policy ; Chemistry and Earth Sciences ; Reliability ; Safety and Risk ; Physics ; Quality Control ; thema EDItEUR::K Economics, Finance, Business and Management::KC Economics::KCV Economics of specific sectors::KCVG Environmental economics
    Language: English
    Format: application/octet-stream
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    facet.materialart.
    Unknown
    Springer Nature | Springer International Publishing
    Publication Date: 2024-04-04
    Description: The book serves both as a reference for various scaled models with corresponding dimensionless numbers, and as a resource for learning the art of scaling. A special feature of the book is the emphasis on how to create software for scaled models, based on existing software for unscaled models. Scaling (or non-dimensionalization) is a mathematical technique that greatly simplifies the setting of input parameters in numerical simulations. Moreover, scaling enhances the understanding of how different physical processes interact in a differential equation model. Compared to the existing literature, where the topic of scaling is frequently encountered, but very often in only a brief and shallow setting, the present book gives much more thorough explanations of how to reason about finding the right scales. This process is highly problem dependent, and therefore the book features a lot of worked examples, from very simple ODEs to systems of PDEs, especially from fluid mechanics. The text is easily accessible and example-driven. The first part on ODEs fits even a lower undergraduate level, while the most advanced multiphysics fluid mechanics examples target the graduate level. The scientific literature is full of scaled models, but in most of the cases, the scales are just stated without thorough mathematical reasoning. This book explains how the scales are found mathematically. This book will be a valuable read for anyone doing numerical simulations based on ordinary or partial differential equations.
    Keywords: Ordinary Differential Equations ; Partial Differential Equations ; Mathematical Modeling and Industrial Mathematics ; Computational Science and Engineering ; Simulation and Modeling ; Analysis ; Computer Science ; scaling ; non-dimensionalization ; dimensionless numbers ; fluid mechanics ; multiphysics models ; Differential calculus & equations ; Mathematical modelling ; Maths for engineers ; Maths for scientists ; Computer modelling & simulation ; thema EDItEUR::P Mathematics and Science::PB Mathematics::PBK Calculus and mathematical analysis::PBKJ Differential calculus and equations ; thema EDItEUR::P Mathematics and Science::PB Mathematics::PBW Applied mathematics::PBWH Mathematical modelling ; thema EDItEUR::P Mathematics and Science::PD Science: general issues::PDE Maths for scientists ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    facet.materialart.
    Unknown
    Springer Nature | Springer Singapore
    Publication Date: 2024-04-11
    Description: This open access book is a compilation of selected papers from 2020 DigitalFUTURES—The 2nd International Conference on Computational Design and Robotic Fabrication (CDRF 2020). The book focuses on novel techniques for computational design and robotic fabrication. The contents make valuable contributions to academic researchers, designers, and engineers in the industry. As well, readers will encounter new ideas about understanding intelligence in architecture.
    Keywords: Robotics and Automation ; Computer-Aided Engineering (CAD, CAE) and Design ; Simulation and Modeling ; Robotics ; Control, Robotics, Automation ; Computer Science ; Post-humanist Intelligence ; Computational Design ; Robotic Fabrication ; Human-Machine Collaboration ; AI in Architecture ; Open Access ; Computer-aided design (CAD) ; Computer modelling & simulation ; Artificial intelligence ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering::TJFM1 Robotics ; thema EDItEUR::U Computing and Information Technology::UG Graphical and digital media applications::UGC Computer-aided design (CAD) ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
    Language: English
    Format: image/png
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    Publication Date: 2024-04-14
    Description: In this concise yet comprehensive Open Access textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. Concepts are introduced in a cross-disciplinary way. Leveraging hybrid (continuous/discrete) systems as a unifying framework and Acumen as a modeling environment, the book bridges the conceptual gap in modeling skills needed for physical systems on the one hand and computational systems on the other. In doing so, the book gives the reader the modeling and design skills they need to build smart, IT-enabled products. Starting with a look at various examples and characteristics of Cyber-Physical Systems, the book progresses to explain how the area brings together several previously distinct ones such as Embedded Systems, Control Theory, and Mechatronics. Featuring a simulation-based project that focuses on a robotics problem (how to design a robot that can play ping-pong) as a useful example of a CPS domain, Cyber-Physical Systems: A Model-Based Approach demonstrates the intimate coupling between cyber and physical components, and how designing robots reveals several non-trivial control problems, significant embedded and real-time computation requirements, and a need to consider issues of communication and preconceptions.
    Keywords: Computer Systems Organization and Communication Networks ; Cyber-physical systems, IoT ; Simulation and Modeling ; Control, Robotics, Mechatronics ; Computer Engineering and Networks ; Cyber-Physical Systems ; Computer Science ; Control, Robotics, Automation ; CPS ; Embedded System ; model-based engineering ; hybrid systems ; Acumen ; coordinate transformations ; modeling computational systems ; modeling physical systems ; control ; sensing and actuation ; game theory ; Open Access ; Computer networking & communications ; Electrical engineering ; Cybernetics & systems theory ; Computer modelling & simulation ; Automatic control engineering ; Electronic devices & materials ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TH Energy technology and engineering::THR Electrical engineering ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation ; thema EDItEUR::T Technology, Engineering, Agriculture, Industrial processes::TJ Electronics and communications engineering::TJF Electronics engineering::TJFM Automatic control engineering
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    Publication Date: 2023-12-21
    Description: In the spring of 2011, a diverse group of scientists gathered at Cornell University to discuss their research into the nature and origin of biological information. This symposium brought together experts in information theory, computer science, numerical simulation, thermodynamics, evolutionary theory, whole organism biology, developmental biology, molecular biology, genetics, physics, biophysics, mathematics, and linguistics. This volume presents new research by those invited to speak at the conference. The contributors to this volume use their wide-ranging expertise in the area of biological information to bring fresh insights into the many explanatory difficulties associated with biological information. These authors raise major challenges to the conventional scientific wisdom, which attempts to explain all biological information exclusively in terms of the standard mutation/selection paradigm. Several clear themes emerged from these research papers: 1) Information is indispensable to our understanding of what life is; 2) Biological information is more than the material structures that embody it; 3) Conventional chemical and evolutionary mechanisms seem insufficient to fully explain the labyrinth of information that is life. By exploring new perspectives on biological information, this volume seeks to expand, encourage, and enrich research into the nature and origin of biological information. Contents: Session One — Information Theory & Biology: Introductory Comments (Robert J Marks II): Biological Information — What is It? (Werner Gitt, Robert Compton and Jorge Fernandez) A General Theory of Information Cost Incurred by Successful Search (William A Dembski, Winston Ewert and Robert J Marks II) Pragmatic Information (John W Oller, Jr) Limits of Chaos and Progress in Evolutionary Dynamics (William F Basener) Tierra: The Character of Adaptation (Winston Ewert, William A Dembski and Robert J Marks II) Multiple Overlapping Genetic Codes Profoundly Reduce the Probability of Beneficial Mutation (George Montañez, Robert J Marks II, Jorge Fernandez and John C Sanford) Entropy, Evolution and Open Systems (Granville Sewell) Information and Thermodynamics in Living Systems (Andy C McIntosh) Session Two — Biological Information and Genetic Theory: Introductory Comments (John C Sanford): Not Junk After All: Non-Protein-Coding DNA Carries Extensive Biological Information (Jonathan Wells) Can Purifying Natural Selection Preserve Biological Information? (Paul Gibson, John R Baumgardner, Wesley H Brewer and John C Sanford) Selection Threshold Severely Constrains Capture of Beneficial Mutations (John C Sanford, John R Baumgardner and Wesley H Brewer) Using Numerical Simulation to Test the “Mutation-Count” Hypothesis (Wesley H Brewer, John R Baumgardner and John C Sanford) Can Synergistic Epistasis Halt Mutation Accumulation? Results from Numerical Simulation (John R Baumgardner, Wesley H Brewer and John C Sanford) Computational Evolution Experiments Reveal a Net Loss of Genetic Information Despite Selection (Chase W Nelson and John C Sanford) Information Loss: Potential for Accelerating Natural Genetic Attenuation of RNA Viruses (Wesley H Brewer, Franzine D Smith and John C Sanford) DNA.EXE: A Sequence Comparison between the Human Genome and Computer Code (Josiah Seaman) Biocybernetics and Biosemiosis (Donald Johnson) Session Three — Theoretical Molecular Biology: Introductory Comments (Michael J Behe): An Ode to the Code: Evidence for Fine-Tuning in the Standard Codon Table (Jed C Macosko and Amanda M Smelser) A New Model of Intracellular Communication Based on Coherent, High-Frequency Vibrations in Biomolecules (L Dent) Getting There First: An Evolutionary Rate Advantage for Adaptive Loss-of-Function Mutations (Michael J Behe) The Membrane Code: A Carrier of Essential Biological Information That is Not Specified by DNA and is Inherited Apart from It (Jonathan Wells) Explaining Metabolic Innovation: Neo-Darwinism Versus Design (Douglas D Axe and Ann K Gauger) Session Four — Biological Information and Self-Organizational Complexity Theory: Introductory Comments (Bruce L Gordon): Evolution Beyond Entailing Law: The Roles of Embodied Information and Self Organization (Stuart Kauffman) Towards a General Biology: Emergence of Life and Information from the Perspective of Complex Systems Dynamics (Bruce H Weber) Readership: Academics, researchers, postgraduates and advanced undergraduates in bioinformatics. Biologists, mathematicians/statisticians, physicists and computer scientists.
    Keywords: T1-995 ; Molecular Biology ; Mutation/Selection Paradigm ; Numerical Simulation ; Mathematics ; Biophysics ; Physics ; Thermodynamics ; Information Theory ; Evolutionary Theory ; Computer Science ; Linguistics ; Genetics ; Developmental Biology ; Biological Information ; Whole Organism Biology ; bic Book Industry Communication::T Technology, engineering, agriculture::TB Technology: general issues
    Language: English
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    facet.materialart.
    Unknown
    Taylor & Francis
    Publication Date: 2024-04-14
    Description: This timely introduction to spectral feature selection illustrates the potential of this powerful dimensionality reduction technique in high-dimensional data processing. It presents the theoretical foundations of spectral feature selection, its connections to other algorithms, and its use in handling both large-scale data sets and small sample problems. Readers learn how to use spectral feature selection to solve challenging problems in real-life applications and discover how general feature selection and extraction are connected to spectral feature selection. Source code for the algorithms is available online.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UN Databases::UNF Data mining
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book discusses various aspects of agent-based modeling and simulation using FLAME (Flexible Large-scale Agent-Based Modeling Environment) which is a popular agent-based modeling environment that enables automatic parallelization of models. Along with a focus on the software engineering principles in building agent-based models, the book comprehensively discusses how models can be written for various domains including biology, economics and social networks. The book also includes examples to guide readers on how to write their own models.
    Keywords: Computer Science ; FLAME ; large scale complex system ; agent model ; agent-based model ; complex agent function ; simulation experiment ; complex simulation ; thema EDItEUR::U Computing and Information Technology::UY Computer science::UYM Computer modelling and simulation
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    facet.materialart.
    Unknown
    Taylor & Francis | CRC Press
    Publication Date: 2024-04-14
    Description: This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios, numerous illustrations, practical examples, and learning aids.
    Keywords: Computer Science ; thema EDItEUR::U Computing and Information Technology::UT Computer networking and communications
    Language: English
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2024-04-05
    Description: This open access book makes quantum computing more accessible than ever before. A fast-growing field at the intersection of physics and computer science, quantum computing promises to have revolutionary capabilities far surpassing “classical” computation. Getting a grip on the science behind the hype can be tough: at its heart lies quantum mechanics, whose enigmatic concepts can be imposing for the novice. This classroom-tested textbook uses simple language, minimal math, and plenty of examples to explain the three key principles behind quantum computers: superposition, quantum measurement, and entanglement. It then goes on to explain how this quantum world opens up a whole new paradigm of computing. The book bridges the gap between popular science articles and advanced textbooks by making key ideas accessible with just high school physics as a prerequisite. Each unit is broken down into sections labelled by difficulty level, allowing the course to be tailored to the student’s experience of math and abstract reasoning. Problem sets and simulation-based labs of various levels reinforce the concepts described in the text and give the reader hands-on experience running quantum programs. This book can thus be used at the high school level after the AP or IB exams, in an extracurricular club, or as an independent project resource to give students a taste of what quantum computing is really about. At the college level, it can be used as a supplementary text to enhance a variety of courses in science and computing, or as a self-study guide for students who want to get ahead. Additionally, readers in business, finance, or industry will find it a quick and useful primer on the science behind computing’s future.
    Keywords: Quantum Physics ; Quantum Computing ; Computer Science, general ; Science Education ; Quantum Information Technology, Spintronics ; Computer Science ; Spintronics ; Open Access ; Introduction to quantum computing ; quantum computing textbook ; quantum computing for high school students ; introduction to quantum cryptography ; quantum gates ; quantum algorithms ; quantum superposition ; what is a qubit? ; quantum key distribution ; Quantum physics (quantum mechanics & quantum field theory) ; Mathematical theory of computation ; Teaching of a specific subject ; Science: general issues ; thema EDItEUR::P Mathematics and Science::PH Physics::PHP Particle and high-energy physics ; thema EDItEUR::U Computing and Information Technology::UY Computer science ; thema EDItEUR::J Society and Social Sciences::JN Education::JNU Teaching of a specific subject
    Language: English
    Format: image/png
    Format: image/jpeg
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...