IT eBooks
Download, Read, Use
Distributed Graph Algorithms for Computer Networks
Distributed Graph Algorithms for Computer Networks

This hands-on textbook/reference presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Each chapter opens with a concise introduction to a specific problem, supporting the theory with numerous examples, before providing a list of relevant algorithms. These algorithms are described in detail from conceptual basis to pseudocode, complete with graph templates for the stepwise implementation of the algorithm, followed by its analysis. ...
Guide to Programming and Algorithms Using R
Guide to Programming and Algorithms Using R

When encountering difficult concepts in computer programming for the first time, many students struggle to find simple explanations in their textbooks. Information can also be hard to find on common mistakes made when implementing algorithms and writing programs. This concise and easy-to-follow textbook/guide provides a student-friendly introduction to programming and algorithms. Emphasis is placed on the threshold concepts that present barriers to learning, including the questions that students are often too embarrassed to ask. ...
Design Technologies for Green and Sustainable Computing Systems
Design Technologies for Green and Sustainable Computing Systems

This book provides a comprehensive guide to the design of sustainable and green computing systems (GSC). Coverage includes important breakthroughs in various aspects of GSC, including multi-core architectures, interconnection technology, data centers, high-performance computing (HPC), and sensor networks. The authors address the challenges of power efficiency and sustainability in various contexts, including system design, computer architecture, programming languages, compilers and networking. ...
Transactions on Pattern Languages of Programming III
Transactions on Pattern Languages of Programming III

The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the software life cycle, from requirements and design to implementation, maintenance and evolution. The primary focus of this LNCS Transactions subline is on patterns, pattern collections, and pattern languages themselves. The journal also includes reviews, survey articles, criticisms of patterns and pattern languages, as well as other research on patterns and pattern languages. This book, the third volume in the Transactions on Pattern Languages of Programming series, presents five papers that have been through a careful peer review process involving both pattern experts and domain experts. The papers present various pattern languages and a study of applying patterns and represent some of the best work that has been carried out in design patterns and pattern languages of programming over the ...
Aliasing in Object-Oriented Programming
Aliasing in Object-Oriented Programming

This book presents a survey of the state-of-the-art on techniques for dealing with aliasing in object-oriented programming. It marks the 20th anniversary of the paper The Geneva Convention On The Treatment of Object Aliasing by John Hogg, Doug Lea, Alan Wills, Dennis de Champeaux and Richard Holt. The 22 revised papers were carefully reviewed to ensure the highest quality.The contributions are organized in topical sections on the Geneva convention, ownership, concurrency, alias analysis, controlling effects, verification, programming languages, and visions. ...
Advances in Security of Information and Communication Networks
Advances in Security of Information and Communication Networks

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. ...
Computer Security - ESORICS 2013
Computer Security - ESORICS 2013

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks. ...
Nostradamus 2013
Nostradamus 2013

Prediction of behavior of the dynamical systems, analysis and modeling of its structure is vitally important problem in engineering, economy and science today. Examples of such systems can be seen in the world around us and of course in almost every scientific discipline including such “exotic” domains like the earth's atmosphere, turbulent fluids, economies (exchange rate and stock markets), population growth, physics (control of plasma), information flow in social networks and its dynamics, chemistry and complex networks. To understand such dynamics and to use it in research or industrial applications, it is important to create its models. For this purpose there is rich spectra of methods, from classical like ARMA models or Box Jenkins method to such modern ones like evolutionary computation, neural networks, fuzzy logic, fractal geometry, deterministic chaos and more. ...
Advanced Network Programming - Principles and Techniques
Advanced Network Programming - Principles and Techniques

The field of network programming is so large, and developing so rapidly, that it can appear almost overwhelming to those new to the discipline. Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. ...
Unifying Theories of Programming and Formal Engineering Methods
Unifying Theories of Programming and Formal Engineering Methods

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics such as component-based and service-oriented systems, real-time systems, hybrid systems, cyber physical systems, and present techniques such as inductive theorem proving, model checking, correction by construction through refinement and model transformations, synthesis, and computer algebra. Two of the courses are explicitly related to Hoare and He's Unifying Theories of Programming. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026