Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
39 result(s) for "COMPUTERS-General.-bisacsh"
Sort by:
Performance Modeling and Design of Computer Systems
Tackling the questions that systems designers care about, this book brings queueing theory decisively back to computer science. The book is written with computer scientists and engineers in mind and is full of examples from computer systems, as well as manufacturing and operations research. Fun and readable, the book is highly approachable, even for undergraduates, while still being thoroughly rigorous and also covering a much wider span of topics than many queueing books. Readers benefit from a lively mix of motivation and intuition, with illustrations, examples and more than 300 exercises – all while acquiring the skills needed to model, analyze and design large-scale systems with good performance and low cost. The exercises are an important feature, teaching research-level counterintuitive lessons in the design of computer systems. The goal is to train readers not only to customize existing analyses but also to invent their own.
The C++ Workshop
The C++ Workshop is designed to help you master the core concepts of C++. Each chapter features challenging exercises and hands-on projects to guide you effectively through writing and compiling clean code in a real-time environment.
Iterative Methods in Combinatorial Optimization
With the advent of approximation algorithms for NP-hard combinatorial optimization problems, several techniques from exact optimization such as the primal-dual method have proven their staying power and versatility. This book describes a simple and powerful method that is iterative in essence and similarly useful in a variety of settings for exact and approximate optimization. The authors highlight the commonality and uses of this method to prove a variety of classical polyhedral results on matchings, trees, matroids and flows. The presentation style is elementary enough to be accessible to anyone with exposure to basic linear algebra and graph theory, making the book suitable for introductory courses in combinatorial optimization at the upper undergraduate and beginning graduate levels. Discussions of advanced applications illustrate their potential for future application in research in approximation algorithms.
Energy Power Risk
The book describes both mathematical and computational tools for energy and power risk management, deriving from first principles stochastic models for simulating commodity risk and how to design robust C++ to implement these models.
Beyond the Rapist
In the United States, approximately one in five women experiences rape during college, and lesbian, gay, bisexual, transgender, and queer (LGBTQ) students experience sexual violence at higher rates than their peers. Given this context, many colleges are working to better prevent and address these assaults. This book takes up this social problem—how organizations talk about and respond to sexual violence—and considers it in proximity to a persistent theoretical dilemma in the academic field of organizational communication: How are organization and violence related, and what does that relationship have to do with communication? Guided by feminist new materialist and intersectional theories, the book examines one public U.S. university known for responding well to sexual violence. It focuses on the processes and policies that require most faculty and administrators, along with student–employees, to report sexual violence to designated campus offices, per federal laws Title IX, the Clery Act, and the Violence Against Women Act. Unfortunately, the university’s interventions in sexual violence reinforce other violent systems. The book illustrates the negative consequences of considering communication to be either separate from the physical world or indistinguishable from it. It also details problems with the notion that only individuals enact violence. Through its focus on two core ideas—communication and agency—the book encourages scholars to avoid wholly constructivist or realist arguments, and it shows the importance of questions about power and difference in organizational scholarship on posthumanism and materiality. The book concludes with suggestions for how U.S. universities can look “beyond the rapist” to generate more robust interventions in sexual violence.
Statistical Inference
This book gives a comprehensive account of density-based minimum distance methods and their use in statistical inference. It covers statistical distances, density-based minimum distance methods, discrete and continuous models, asymptotic distributions, robustness, computational issues, residual adjustment functions, graphical descriptions of robustness, penalized and combined distances, multisample methods, weighted likelihood, and multinomial goodness-of-fit tests. The book also introduces the minimum distance methodology in interdisciplinary areas, such as neural networks and image processing, as well as specialized models and problems, including regression, mixture models, survival and Bayesian analysis, and more.
Intelligent wearable interfaces
A thorough introduction to the development and applications of intelligent wearable interfaces As mobile computing, sensing technology, and artificial intelligence become more advanced and their applications more widespread, the area of intelligent wearable interfaces is growing in importance. This emerging form of human-machine interaction has infinite possibilities for enhancing humans' capabilities in communications, actions, monitoring, and control. Intelligent Wearable Interfaces is a collection of the efforts the authors have made in this area at The Chinese University of Hong Kong. They introduce methodologies to develop a variety of intelligent wearable interfaces and cover practical implementations of systems for real-life applications. A number of novel intelligent wearable interface systems are examined, including: Network architecture for wearable robots Wearable interface for automatic language translation Intelligent cap interface for wheelchair control Intelligent shoes for human-computer interface Fingertip human-computer interface Ubiquitous 3D digital writing instrument Intelligent mobile human airbag system This book is a valuable reference for researchers, designers, engineers, and upper-level undergraduate and graduate students in the fields of human-machine interactions,rehabilitation engineering, robotics, and artificial intelligence.
Perspectives on Information
Information is everywhere, and defines everything in today's society. Moreover, information is a key concept in a wide range of academic disciplines, from quantum physics to public policy. However, these disciplines all interpret the concept in quite different ways. This book looks at information in several different academic disciplines - cybernetics, ICT, communications theory, semiotics, information systems, library science, linguistics, quantum physics and public policy. Perspectives on Information brings clarity and coherence to different perspectives through promoting information as a unifying concept across the disciplinary spectrum. Though conceived as a contribution to the ongoing conversation between academic disciplines into the nature of information, the deliberately accessible style of this text (reflecting the authors' backgrounds at The Open University) will be make it valuable for anyone who needs to know something more about information. Given the ubiquity of information in the 21st century, that means everyone.
Advanced internet protocols, services, and applications
Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment.Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols.
Cybersecurity : Public Sector Threats and Responses
The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections: Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.