Browse Results

Showing 53,526 through 53,550 of 54,000 results

Computers, Communication, and Mental Models

by DONALD L. DAY; DIANE K. KOVACS

Computers, Commmunication, and Mental Models is a far-ranging, focused treatment of the cognitive and behavioural issues in computer-mediated communication, knowledge representation and computer-supported co- operative work. It is also an argued development of the theoretical bases for treating computerized tools as intermediaries in the communication of mental maps between tool builders and users.Empirical trails are reported in detail sufficient for representation, in computer-based instruction, fractal dimensions of cognitive mapping and group decision support. The book is a collection of multidisciplinary papers which each shed light on the complex interactions between users and systems architects, via a common medium: computerized tools.

Computing and Communications in the Extreme: Research for Crisis Management and Other Applications

by Communications Steering Committee Workshop Series on High Performance Computing

This book synthesizes the findings of three workshops on research issues in high-performance computing and communications (HPCC). It focuses on the role that computing and communications can play in supporting federal, state, and local emergency management officials who deal with natural and man-made hazards (e.g., toxic spills, terrorist bombings). The volume also identifies specific research challenges for HPCC in meeting unmet technology needs in crisis management and other nationally important application areas, such as manufacturing, health care, digital libraries, and electronic commerce and banking.

Constructionism in Practice: Designing, Thinking, and Learning in A Digital World

by Yasmin Kafai Mitchel Resnick

The digital revolution necessitates, but also makes possible, radical changes in how and what we learn. This book describes a set of innovative educational research projects at the MIT Media Laboratory, illustrating how new computational technologies can transform our conceptions of learning, education, and knowledge. The book draws on real-world education experiments conducted in formal and informal contexts: from inner-city schools and university labs to neighborhoods and after-school clubhouses. The papers in this book are divided in four interrelated sections as follows: * Perspectives in Constructionism further develops the intellectual underpinnings of constructionist theory. This section looks closely at the role of perspective-taking in learning and discusses how both cognitive and affective processes play a central role in building connections between old and new knowledge. * Learning through Design analyzes the relationship between designing and learning, and discusses ways that design activities can provide personally meaningful contexts for learning. This section investigates how and why children can learn through the processes of constructing artifacts such as games, textile patterns, robots and interactive devices. * Learning in Communities focuses on the social aspects of constructionist learning, recognizing that how people learn is deeply influenced by the communities and cultures with which they interact. It examines the nature of learning in classroom, inner-city, and virtual communities. * Learning about Systems examines how students make sense of biological, technological, and mathematical systems. This section explores the conceptual and epistemological barriers to learning about feedback, self-organization, and probability, and it discusses new technological tools and activities that can help people develop new ways of thinking about these phenomena.

Cryptography's Role In Securing The Information Society

by Committee to Study National Cryptography Policy

For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptography--the representation of messages in code--and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examples -- some alarming and all instructive -- from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.

Cscl: Theory and Practice of An Emerging Paradigm

by Timothy Koschmann

This book, about a newly emerging area of research in instructional technology, has as its title the acronym "CSCL." Initially, CSCL was chosen as an acronym for Computer-Supported Collaborative Learning. However, some would argue that "collaborative" is often not a descriptive term for what learners do in instructional settings; further, as the field develops, the technology used to support collaboration may not always involve computers, at least not in the direct ways they have been used to support instruction in the past. To avoid getting bogged down in this terminological debate, this book uses CSCL as a designation in its own right, leaving open to interpretation precisely what words it stands for. The authors talk a great deal about the theory underlying their work. In part, this is because that is what they were asked to do, but it is also an indication of the state of the field. In an established paradigm in which the theories and methods are well agreed upon, such discussion is less central. CSCL, however, has not yet reached the stage of "normal" science. There is much to be worked out yet. This book is offered with the hope that it will help to define a direction for future work in this field. The chapters appear in alphabetical order (except for the introductory chapter and the afterword) -- not for lack of a better way to organize the chapters, but rather because the organizational possibilities are too numerous and this order does not privilege one over another. By not imposing a topical organizing structure on this collection, it is hoped that readers will feel freer to explore the chapters in a way that best suits their needs. COPY FOR BIND-CARD CD-ROM info ................................. There is an accompanying CD-Rom for this proceedings that will become available September 1998. Purchasers of the proceedings may obtain a copy of this CD-ROM at no cost by contacting Lawrence Erlbaum Associates, Inc. phone: (201) 236-9500 toll-free: 1-800-9-BOOKS-9 (1-800-926-6579) 9am-5pm EST fax: (201) 236-0072 e-mail: orders@erlbaum.com Web site: www.erlbaum.com address: 10 Industrial Avenue, Mahwah, NJ 07430-2262 The CD-ROM was funded through a grant from the National Science Foundation.

Data Acquisition and Process Control Using Personal Computers

by Ozkul

""Covers all areas of computer-based data acquisition--from basic concepts to the most recent technical developments--without the burden of long theoretical derivations and proofs. Offers practical, solution-oriented design examples and real-life case studies in each chapter and furnishes valuable selection guides for specific types of hardware.

Datenbanken und SQL: Eine praxisorientierte Einführung mit Anwendungen in Oracle, SQL Server und MySQL (Informatik & Praxis #17)

by Edwin Schicker

Datenbanken entstanden ab etwa 1960 aus der Notwendigkeit, die logischen auf die immer gr#65533;#65533;er werdenden Datenmengen zu vereinfachen und Zugriffe zu normieren. Wurden diese Datenbanken #65533;ber mehr als zwei Jahrzehnte hin#65533; weg ausschlie#65533;lich auf Gro#65533;rechnern eingesetzt, so haben sie inzwischen ihren Siegeszug auch auf Kleinrechnern angetreten. Erm#65533;glicht wurde dies aus dreierlei Gr#65533;nden: erstens durch die enorm gestiegene Rechnerleistung der letzten Jahre, zweitens durch die Verwendung relationaler Datenbanken und drittens durch die Einf#65533;hrung grafischer Oberfl#65533;chen. Die Anfang der 70er Jahre entwickelten relationalen Datenbanken erm#65533;gli#65533; chen eine einfache Erstellung und Programmierung. Grafische Oberfl#65533;chen unterst#65533;tzen den Anwender und Datenbankdesigner dank einer leichten Benut#65533; zerf#65533;hrung und anschaulichen Musterbeispielen, so da#65533; auch dem interessier#65533; ten Laien diese Form der Datenhaltung mit all ihren M#65533;glichkeiten offen steht. Der Laie sei aber davor gewarnt, gr#65533;#65533;ere Datenbanken ohne theoretische Grundkenntnisse selbst zu erstellen. Denn hier leitet sich der Datenbankent#65533; wurf in der Regel nicht mehr direkt aus der AufgabensteIlung ab. Doch nur ein guter Entwurf garantiert #65533;bersichtliche und optimale Zugriffe und erm#65533;glicht je nach Bedarf Erg#65533;nzungen und Erweiterungen der Datenbank. Auch wird nur dadurch die Konsistenz und Integrit#65533;t der Datenbank erm#65533;glicht, so da#65533; feh#65533; lerhafte, widerspr#65533;chliche und nicht mehr zugreifbare Datenbest#65533;nde verhin#65533; dert werden. Grundlagen zu Datenbankentwurf und -programmierung sollten f#65533;r den Datenbankprogrammierer daher selbstverst#65533;ndlich sein. Dieses Buch entstand aus mehreren Vorlesungen zu Datenbanken, die ich an der Fachhochschule Regensburg f#65533;r Informatiker gelesen habe. Doch ich will auch den Nicht-Informatiker und interessierten Laien gezielt ansprechen. Dazu wird mit zahlreichen Beispielen die Theorie direkt in die Praxis umgesetzt.

Dave Barry in Cyberspace

by Dave Barry

"RELENTLESSLY FUNNY . . . BARRY SHINES." --People. A self-professed computer geek who actually does Windows 95, bestselling humorist Dave Barry takes us on a hilarious hard drive via the information superhighway--and into the very heart of cyberspace, asking the provocative question: If God had wanted us to be concise, why give us so many fonts? Inside you'll find juicy bytes on How to Buy and Set Up a Computer; Step One: Get Valium Nerdstock in the Desert; Or: Bill Gates Is Elvis Software: Making Your Computer Come Alive So It Can Attack You Word Processing: How to Press an Enormous Number of Keys Without Ever Actually Writing Anything Selected Web Sites, including Cursing in Swedish, Deformed Frog Pictures, and The Toilets of Melbourne, Australia And much, much more! "VERY FUNNY ... After a day spent staring at a computer monitor, think of the book as a kind of screen saver for your brain." --New York Times Book Review

Designing a Total Data Solution: Technology, Implementation, and Deployment (Best Practices Ser.)

by Roxanne E. Burkey Charles V. Breakfield

Your company's global competitiveness depends on the utilization and maintenance of information. Current data handling practices-storing, updating, and accessing data-can be either a problem or a significant strategic advantage for your company. Designing a Total Data Storage Solution: Technology, Implementation, and Deployment gives you the inform

Electronic Resources: Implications for Collection Management

by Genevieve Owens

Electronic Resources: Implications for Collection Management shows librarians the strengths and weaknesses of electronic resources and the implications these resources have on collection management. The book then helps librarians incorporate electronic resources into their collections accordingly.Contributors in Electronic Resources provide a broad look at the ways in which electronic information affects the business of building and maintaining library collections. They examine the history of electronic resources in document collections and share with readers a thorough analysis of the gains and losses libraries can expect to experience in an increasingly digital environment. Readers also learn:how to budget for both traditional and emerging information sourcesthe effects of electronic collections on the public services realmhow to assess the value of journals amidst the many different access and delivery mechanismshow to use resource sharing as a solution to the archival problems which arise as libraries collect materials in continuously proliferating formatsselection criteria for electronic resourceshow to assemble electronic resources into archivessocial implications of electronic collectionsAcademic librarians in collection management will find Electronic Resources an essential resource for finding their place in the electronic environment. Librarians will refer to this volume again and again as they adjust to increasing dependence upon electronic resources for fulfilling their patrons’needs.

Electronic Resources: Selection and Bibliographic Control

by Ling Yuh W Pattie Bonnie J Cox

The universe of electronic resources is indeed diverse, expansive, intimidating, and unstructured compared to the finite, prepackaged print world upon which the information delivery infrastructure has been constructed. Electronic Resources: Selection and Bibliographic Control addresses the resultant concerns of information professionals as they struggle to define, select, and control electronic resources in libraries and information centers today. This book offers readers an overview of issues and provides a common ground for deliberations and decisionmaking. Librarians and students concerned with the Internet and related issues will appreciate the broad scope and in-depth discussions in Electronic Resources: Selection and Bibliographic Control. From both conceptual and pragmatic standpoints, this book enlightens the reader on such topics as:Internet resourcesthe relationship between OPAC and InternetStandard Generalized Markup Language (SGML) versus USMARCText Encoding Initiative (TEI)Core Language and the Information BusDublin Core Metadata as a discovery/retrieval tooldecision-making matrix modele-texts and e-thesesdigital materials and digital librariesThis book also gives the reader an inside look at a number of specific emerging projects from around the world. Highlighted here are the CATRIONA project from the U.K.--designing an Internet discovery and retrieval system; the ALCUIN project--using traditional infrastructure to handle Internet resources; the Center for Electronic Texts in the Humanities (CETH) and the Electronic Text Center at the University of Virginia; the OCLC Internet Cataloging project; and the National Digital Library Program (NDLP), Encoded Archival Description (EAD), and electronic CIP projects at the Library of Congress.Electronic Resources: Selection and Bibliographic Control clearly illustrates the evolving role of librarian fro

Escape Velocity: Cyberculture at the End of the Century

by Mark Dery

An Unforgettable Journey into the Dark Heart of the Information Age In Escape Velocity Mark Dery takes is on an electrifying tour of the high-tech subcultures that both celebrate and critique our wired world: would-be cyborgs who believe the body is obsolete and dream of downloading their minds into computers, cyber-hippies who boost their brainpower with smart drugs and mind machines, on-line swingers seeking cybersex on electronic bulletin boards, techno-primitives who sport biomechanical tattoos of computer circuitry; and cyberpunk roboticists whose Mad Max contraptions duel to the death before howling crowds. Timely, trenchant, and provocative, Escape Velocity is the first truly critical inquiry into cyberculture-essential reading for everyone interested in computer culture and the shape of things to come.

The Froehlich/Kent Encyclopedia of Telecommunications: Volume 13 - Network-Management Technologies to NYNEX

by Fritz E. Froehlich Allen Kent

This article reviews network-management problems, technologies and standards, outlining the problems and challenges of the field. It overviews the functions and architectures, of various components of network-management systems (NMSs), describing key network-management application areas.

Genetic Algorithms for Pattern Recognition (CRC Press Revivals)

by Sankar K. Pal Paul P. Wang

Solving pattern recognition problems involves an enormous amount of computational effort. By applying genetic algorithms - a computational method based on the way chromosomes in DNA recombine - these problems are more efficiently and more accurately solved. Genetic Algorithms for Pattern Recognition covers a broad range of applications in science and technology, describing the integration of genetic algorithms in pattern recognition and machine learning problems to build intelligent recognition systems. The articles, written by leading experts from around the world, accomplish several objectives: they provide insight into the theory of genetic algorithms; they develop pattern recognition theory in light of genetic algorithms; and they illustrate applications in artificial neural networks and fuzzy logic. The cross-sectional view of current research presented in Genetic Algorithms for Pattern Recognition makes it a unique text, ideal for graduate students and researchers.

How Intranets Work

by Preston Gralla

Now you can learn how intranets work, what they can and cannot do for your organization. This is a great beginner's guide to intranets.

How to Use HTML 3.2

by Scott Arpajian Robert Mullen

A comprehensive, easy-to-use guide to html 3.2, the language of the worldwide web. If you're an aspiring web page author, an old hand or just curious about how it all works, this book is for you.

Hypermedia Learning Environments: Instructional Design and Integration

by Piet A. M. Kommers Scott Grabinger Joanna C. Dunlap

Hypermedia and multimedia have penetrated the world of computer games, Internet, and CD-ROM based reference manuals. However, the fields of education, schooling, and training ask more specific benefits from them. This book provides practical approaches to transform these media into learning tools. Crucial helping steps include the migration from expository to exploratory learning strategies, the integration of collaborative learning practices in plenary and individualistic teaching styles, and the evolution from test-driven to experience-oriented training. This volume has three goals: * to discuss the concepts of hypermedia, multimedia, and hypertext and review pertinent research lines; * to provide guidelines and suggestions for developing multimedia applications; and * to place technology within a broader context of education and training through a discussion of rich environments for active learning (REALs). The book takes a developmental focus to helpf readers set up and manage the process of developing a multimedia application. It is not a technical or a how-to manual on working with video, sound, digitized graphics, or computer code. The text takes a unique approach to the idea of media-- viewing media as delivery systems: if video is called for, use it; if sound will help in an application, use it. The fundamental guidelines presented here are usually not media specific. Media works only within the strategies with which they are used. Aimed at practitioners--people who teach about or develop multimedia and hypermedia applications--this volume carefully examines the main components and issues in developing applications. It provides suggestions and heuristics for sound, fundamental design processes.

Hypertext and Cognition

by Jean-François Rouet Rand J. Spiro Andrew Dillon Jarmo J. Levonen

The recent evolution of western societies has been characterized by an increasing emphasis on information and communication. As the amount of available information increases, however, the user -- worker, student, citizen -- faces a new problem: selecting and accessing relevant information. More than ever it is crucial to find efficient ways for users to interact with information systems in a way that prevents them from being overwhelmed or simply missing their targets. As a result, hypertext systems have been developed as a means of facilitating the interactions between readers and text. In hypertext, information is organized as a network in which nodes are text chunks (e.g., lists of items, paragraphs, pages) and links are relationships between the nodes (e.g., semantic associations, expansions, definitions, examples -- virtually any kind of relation that can be imagined between two text passages). Unfortunately, the many ways in which these hypertext interfaces can be designed has caused a complexity that extends far beyond the processing abilities of regular users. Therefore, it has become widely recognized that a more rational approach based on a thorough analysis of information users' needs, capacities, capabilities, and skills is needed. This volume seeks to meet that need. From a user-centered perspective -- between systems and users -- this volume presents theoretical and empirical research on the cognitive processes involved in using hypertext. In so doing, it illustrates three main approaches to the design of hypertext systems: *cognitive, which examines how users process multilayered hypertext structures; *ergonomical, which explores how users interact with the design characteristics of hardware and software; and *educational, which studies the learning objectives, frequency and duration of hypertext sessions, type of reading activity, and the user's learning characteristics. This volume also tries to provide answers for the questions that have plagued hypertext research: *What is hypertext good for? *Who is hypertext good for? *If it is useful for learning and instruction, then what type? *What particular cognitive skills are needed to interact successfully with a hypertext system? Anyone interested in the fields of computer science, linguistics, psychology, education, and graphic design will find this volume intriguing, informative, and a definitive starting point for future research in the field of hypertext.

innovations in Learning: New Environments for Education

by Robert Glaser Leona Schauble

This volume documents the growth of a new kind of interdisciplinary teamwork that is evolving among practitioners, researchers, teacher educators, and community partners. Its premise: the design of learning environments and the development of theory must proceed in a mutually supportive fashion. Scientific researchers have learned that a prerequisite to studying the kinds of learning that matter is helping to shoulder the responsibility for ensuring that these forms of learning occur. To support and study learning, researchers are increasingly making major and long-term investments in the design and maintenance of contexts for learning. Practitioners are assuming new roles as well, reflecting an increasing awareness of the need to move beyond skillful doing. If developing learning contexts are to be protected within and expanded beyond the systems that surround them, it is necessary to foster professional communities that will support reflection about practice, including the generation and evaluation of rich and flexible environments for student thinking. One consequence of recent reforms is that teachers are increasingly regarding such tasks as central to their professional development. Innovations in Learning: New Environments for Education describes coordinated interaction between educational design on the one hand, and the development of learning theory on the other, through a series of examples. These examples have been chosen because they are continuing, proven programs with evidence of success. Contributors to the volume are researchers and practitioners who have played a role in inventing these programs and have guided their development over a period of years. Rather than choosing illustrations of a pipeline or "application model of research" from research and then to practice, the editors of this volume have selected interventions in which researchers and practitioners work together persistently to forge common understanding. Such activity is necessarily interdisciplinary, often encompassing long spans of time, and is more akin to engineering in the field than to laboratory science. The common themes that emerge from this activity -- for example, the role of tools, talk, and community -- belong exclusively neither to theory nor to practice, but to their intersection in commitment to specific contexts of learning and continuing contributions to practice and underlying theory. This volume is organized into three sections that reflect different levels and kinds of learning contexts. Each of these levels has been the focus of recent cognitive and reform applications to learning and schooling. The first offers examples of effective learning in informal settings; the second discusses innovative approaches to schooling at the classroom level; and the third reviews reforms that regard the entire school as the appropriate unit of change.

Insider Power Techniques for Microsoft® Windows® XP

by Paul Mcfedries Geoff Winslow Scott Andersen Austin Wilson

Accept no limits! Tweak Windows XP for ultimate performance with the undocumented secrets and hidden gems of the experts who work with the technology every day. Three Microsoft Consulting Services (MCS) professionals have teamed with well-known Windows book author Paul McFedries to reveal their best from-the-field techniques, practices, hacks, tricks, and workarounds for putting all of your PC's muscle to work. Smart, straightforward, and uncompromisingly practical, this book is the ultimate insider's guide to pushing Windows XP as far as it can go! Put professional-level practices to work for you: Tweak registry settings without getting burned Employ lethal techniques to help fight viruses, intruders, and spam Customize startup and shutdown--get work done behind the scenes Install devices and drivers--painlessly Learn 10 ways to help give your system rock-solid stability Write your own scripts--or run the ones inside Share your PC using group policies, account lock-outs, and other management tools Optimize memory, performance, and usability Easily synchronize files between your mobile and desktop PCs Troubleshoot problems the way the experts do

Intelligent Methods and Big Data in Industrial Applications (Studies in Big Data #40)

by Henryk Rybinski Marzena Kryszkiewicz Grzegorz Protaziuk Łukasz Skonieczny Robert Bembenik

The inspiration for this book came from the Industrial Session of the ISMIS 2017 Conference in Warsaw. It covers numerous applications of intelligent technologies in various branches of the industry. Intelligent computational methods and big data foster innovation and enable the industry to overcome technological limitations and explore the new frontiers. Therefore it is necessary for scientists and practitioners to cooperate and inspire each other, and use the latest research findings to create new designs and products. As such, the contributions cover solutions to the problems experienced by practitioners in the areas of artificial intelligence, complex systems, data mining, medical applications and bioinformatics, as well as multimedia- and text processing. Further, the book shows new directions for cooperation between science and industry and facilitates efficient transfer of knowledge in the area of intelligent information systems.

International Perspectives on the Design of Technology-supported Learning Environments

by Robert Glaser Stella Vosniadou Erik De Corte Heinz Mandl

In recent years, the use of technology for the purposes of improving and enriching traditional instructional practices has received a great deal of attention. However, few works have explicitly examined cognitive, psychological, and educational principles on which technology-supported learning environments are based. This volume attempts to cover the need for a thorough theoretical analysis and discussion of the principles of system design that underlie the construction of technology-enhanced learning environments. It presents examples of technology-supported learning environments that cover a broad range of content domains, from the physical sciences and mathematics to the teaching of language and literacy. The emphasis in this book is not on the design of educational software but on the design of learning environments. A great deal of research on learning and instruction has recently moved out of the laboratory into the design of applications in instructional settings. By designing technology-supported learning environments instructional scientists attempt to better understand the theories and principles that are explicit in their theories of learning. The contributors to this volume examine how factors such as social interaction, the creation of meaningful activities, the use of multiple perspectives, and the construction of concrete representations influence the acquisition of new information and transfer.

An Introduction To Artificial Intelligence

by Janet Finlay

An authoritative and accessible one-stop resource, An Introduction to Artificial Intelligence presents the first full examination of AI. Designed to provide an understanding of the foundations of artificial intelligence, it examines the central computational techniques employed by AI, including knowledge representation, search, reasoning, and learning, as well as the principal application domains of expert systems, natural language, vision, robotics, software agents and cognitive modeling. Many of the major philosophical and ethical issues of AI are also introduced.Throughout the volume, the authors provide detailed, well-illustrated treatments of each topic with abundant examples and exercises. The authors bring this exciting field to life by presenting a substantial and robust introduction to artificial intelligence in a clear and concise coursebook form. This book stands as a core text for all computer scientists approaching AI for the first time.

An Introduction to Distributed Algorithms

by Valmir C. Barbosa

An Introduction to Distributed Algorithms takes up some of the main concepts and algorithms, ranging from basic to advanced techniques and applications, that underlie the programming of distributed-memory systems such as computer networks, networks of workstations, and multiprocessors. Written from the broad perspective of distributed-memory systems in general it includes topics such as algorithms for maximum flow, program debugging, and simulation that do not appear in more orthodox texts on distributed algorithms. Moving from fundamentals to advances and applications, ten chapters--with exercises and bibliographic notes--cover a variety of topics. These include models of distributed computation, information propagation, leader election, distributed snapshots, network synchronization, self- stability, termination detection, deadlock detection, graph algorithms, mutual exclusion, program debugging, and simulation. All of the algorithms are presented in a clear, template- based format for the description of message-passing computations among the nodes of a connected graph. Such a generic setting allows the treatment of problems originating from many different application areas. The main ideas and algorithms are described in a way that balances intuition and formal rigor--most are preceded by a general intuitive discussion and followed by formal statements as to correctness complexity or other properties.

KILLER.app

by Barbara D'Amato

To Chicago cop Suze Figueroa, cyberspy is not in her job description--until a mysterious accident sends her computer engineer sister into a coma. Did the "accident" have anything to do with the secret database her sister discovered at the mega-corporation where she worked? SJR Computer Systems doesn't want the Figueroa sisters or anyone else alive to ask that question. Targeted by a network of on-line henchmen and ruthless flesh-and-blood assassins, Suze uncovers a plan far more sophisticated and insidious than she could have imagined, and finds herself in a race to stop a computer genius from taking control of the information age. Barbara D'amato's books not only present complex investigations and gripping suspense, each abounds in information about a specific topic as diverse as The Wizard of Oz and Christmas tree farming. All of the 9 books in the Cat Marsala series are in the Bookshare collection as well as four others.

Refine Search

Showing 53,526 through 53,550 of 54,000 results