Browse Results

Showing 50,876 through 50,900 of 60,741 results

Scandalous Leadership: Prime Ministers' and Presidents' Scandals and the Press

by M. J. Trow

An exploration of the moral blemishes that have dogged the leaders of Great Britain and the United States. Before Britain had a prime minister – and before they invented America – the dictator Oliver Cromwell urged the artist Lely to paint him ‘warts and all’. This book deals with some of the ‘all’, but is mostly about the warts, the moral blemishes that have dogged the leaders of two of the greatest countries on earth for 300 years. Scandalously, there are still no qualifications necessary for the job of prime minister or president, two of the most important positions in the world. And that lack of ability shows itself in spades throughout these pages. Robert Walpole knew that ‘every man has his price’ and bought people accordingly. Viscount Goderich broke down in tears, begging the king to fire him. George Washington, the revered saint of American creation, blew with the wind and owned slaves. Abraham Lincoln was prepared to send African Americans back to Africa to save the Union. William Gladstone popped out from Downing street to ‘save’ prostitutes. David Lloyd George gave people titles for money. Warren Harding had a string of mistresses, as did John Kennedy. And all this happened before Donald Trump! Thank God the fourth estate was there, the free press watching every move of politicians. Who was watching them, of course, is another story. If you thought – and prayed – that the occupants of No. 10 and the White House were honorable, competent people, you’re in for a bit of a shock.

Scanning Negatives and Slides: Digitizing Your Photographic Archive, 2nd Edition

by Sascha Steinhoff

<p>Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor can it be archived in a digital format. Increasingly, photographers are trying to bridge this gap with the use of high-performance film scanners. <br/><br/>\nIn this 2nd edition, you will learn how to achieve the best possible digital image from a negative or a slide, and how to build a workflow to make this process efficient, repeatable, and reliable. The author uses Nikon's film scanners, but all steps can easily be accomplished while using a different scanner. The most common software tools for scanning (SilverFast, VueScan, NikonScan) are not only covered extensively in the book, but trial versions are also provided on a DVD, which also contains other useful tools for image editing, as well as numerous sample scans.</p>

Scanning Technologies for Autonomous Systems

by Oleg Sergiyenko Wendy Flores-Fuentes Julio C. Rodríguez-Quiñonez Moises J. Castro-Toscano

This book provides the theory, methodology, and uses of scanning technologies for the application of autonomous systems. The authors provide readers with an understanding of different technologies and methods to perform scanning technologies and their optimal application depending on the kind of autonomous system. Also, the book presents a compilation of original high-quality contributions and research results from worldwide authors on emerging new autonomous systems based on different scanning technologies. This book is a valuable reference for engineering professionals and the scientific community.

Scared Little Rabbits

by A. V. Geiger

We stand in a tight cluster, high above the lake. One-by-one, we made our way up the narrow trail from the edge of campus. Now, we wait shoulder to shoulder behind the police tape. Nineteen summer students. All but one. <P><P>When Nora gets accepted into her dream summer program at the prestigious Winthrop Academy, she jumps at the chance to put her coding skills to use. But then a fellow student goes missing-and the tech trail for the crime leads back to Nora. Running scared, Nora must race to clear her name and uncover the sordid truth...or she might be the next to disappear.

Scenario-Based Training with X-Plane and Microsoft Flight Simulator

by Bruce Williams

Fly toward pilot certification with these real-world scenario exercises Although PC-based flight simulations have been available for 30 years, many pilots, instructors, and flight schools don't understand how best to use these tools in real-world flight training and pilot proficiency programs. This invaluable reference bridges the gap between simulation tools and real-world situations by presenting hands-on, scenario-based exercises and training tips for the private pilot certificate and instrument rating. As the first of its kind based on FAA-Industry Training Standards (FITS), this book steers its focus on a scenario-based curriculum that emphasizes real-world situations. Experienced pilot and author Bruce Williams ultimately aims to engage the pilot, reinforce the "realistic" selling point of PC-based flight simulations, while also complementing the FAA-approved FITS syllabi. Serves as essential reading for pilots who want to make effective use of simulation in their training while expanding their skill level and enjoyment of flying Covers private pilot real-world scenarios and instrument rating scenarios Includes a guide to recommended websites and other resources Features helpful charts as well as a glossary You'll take off towards pilot certification with this invaluable book by your side.

Scenarios, Fictions, and Imagined Possibilities in Science, Engineering, and Education: XXIV Professional Culture of the Specialist of the Future, Volume 2 (Lecture Notes in Networks and Systems #1204)

by Daria Bylieva Alfred Nordmann

This book presents the proceedings of the 24th International Conference Professional Culture of the Specialist of the Future. Professionals and experts in all fields need to be prepared to handle unfamiliar situations. Some of these are unexpected events that may occur quite suddenly out of the blue, and others may emerge in the course of technological development or predicted trends. In order to successfully confront the future, professionals therefore need to engage in hypothetical thinking as they entertain concrete scenarios or fictitious possibilities. Scientists and engineers lead the way when they employ thought experiments and systematically consider alternative realities. Educators come up with creative approaches to foster the “art of the as-if.” This highly interdisciplinary collection of 50 papers discusses the theoretical challenge of hypothetical thinking and presents practical strategies for its promotion.

Scenarios, Fictions, and Imagined Possibilities in Science, Engineering, and Education: XXIV Professional Culture of the Specialist of the Future, Volume 1 (Lecture Notes in Networks and Systems #1203)

by Daria Bylieva Alfred Nordmann

This book presents the proceedings of the 24th International Conference Professional Culture of the Specialist of the Future. Professionals and experts in all fields need to be prepared to handle unfamiliar situations. Some of these are unexpected events that may occur quite suddenly out of the blue, and others may emerge in the course of technological development or predicted trends. In order to successfully confront the future, professionals therefore need to engage in hypothetical thinking as they entertain concrete scenarios or fictitious possibilities. Scientists and engineers lead the way when they employ thought experiments and systematically consider alternative realities. Educators come up with creative approaches to foster the “art of the as-if.” This highly interdisciplinary collection of 50 papers discusses the theoretical challenge of hypothetical thinking and presents practical strategies for its promotion.

Scheduling and Congestion Control for Wireless Internet

by Xin Wang

This brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underlying optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP congestion control and wireless-link scheduling schemes for wireless applications over Internet with centralized and distributed (multi-hop) wireless links. Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployed with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.

Scheduling and Reconfiguration of Real-Time Systems: A Supervisory Control Approach

by Xi Wang ZhiWu Li

This book presents a methodology for the real-time scheduling problems of real-time systems (RTS) from the viewpoint of control theory. Generally, any system can be viewed as an RTS if it performs real-time application functions and behaves correctly depending on given logical activities and satisfying specified deadlines for the activities. This monograph provides broad views and detailed introductions to supervisory control theory (SCT) and its application in real-time scheduling and reconfiguration. Based on three popular SCT modelling frameworks, discrete-event system (DES), timed DES (TDES), and state-tree structures (STS), the authors provide RTS modelling frameworks; thereafter, SCT is used to find their safe execution sequences. As the main contribution, we use (untimed) DES events to represent the execution and preemption of each individual RTS task. This modelling formalism brings the possibilities to model the preemptions of tasks’ executions. Furthermore, in some cases, priorities cannot be assigned to real-time tasks. In order to solve this problem, a matrix-based priority-free conditional-preemption (PFCP) relation is provided, which generalizes fixed-priority (FP) RTS scheduling. As a natural extension, a generalized modular modelling framework is presented to model the task parameters instead of the global real-time task. The modular models are taken to be generic entities, which also considers the exact execution time of real-time tasks. STS are undoubtedly recognized as a computationally efficient SCT framework which manages the state explosion problem significantly. Hence, building on the (untimed) modular RTS models, a novel STS-based RTS modeling framework is formulated, by assigning dynamic priorities as specified optimality criteria, which can be utilized to model sporadic RTS processing both sporadic and (multi-period) periodic tasks, providing a small set of the safe execution sequences which rank at the top.

Scheduling for Parallel Processing

by Maciej Drozdowski

This book presents scheduling models for parallel processing, problems defined on the grounds of certain scheduling models, and algorithms solving the scheduling problems. The book also provides helpful generalizations about scheduling models. Features: Introduces the fundamental scheduling concepts; Discusses the technological aspects of scheduling for parallel processing; Presents the notions, concepts, and algorithms that are most immediately applicable in parallel processing; Examines the parallel task model; Outlines the methodology of computational complexity theory and introduces the basic metrics of parallel application performance; Explores scheduling with communication delays; Examines scheduling divisible loads in systems with limited memory, various interconnection types, and cost of usage; Includes detailed illustrations, a bibliography, and a notation section. This text will be valuable for researchers in parallel computing, operating systems, management science, and applied mathematics.

Scheduling of Large-scale Virtualized Infrastructures: Toward Cooperative Management

by Flavien Quesnel

System virtualization has become increasingly common in distributed systems because of its functionality and convenience for the owners and users of these infrastructures. In Scheduling of Large-scale Virtualized Infrastructures, author Flavien Quesnel examines the management of large-scale virtual infrastructures with an emphasis on scheduling up to 80,000 virtual machines on 8,000 nodes. The text fills a need for updated software managing to meet the increasing size of virtual infrastructures. Virtual machine managers and virtual operators will appreciate this guide to improvement in cooperative software management.

Scheduling Real-Time Streaming Applications onto an Embedded Multiprocessor

by Orlando Moreira Henk Corporaal

This book provides a comprehensive overview of the state-of-the-art, data flow-based techniques for the analysis, modeling and mapping technologies of concurrent applications on multi-processors The authors present a flow for designing embedded hard/firm real-time multiprocessor streaming applications, based on data flow formalisms, with a particular focus on wireless modem applications. Architectures are described for the design tools and run-time scheduling and resource management of such a platform.

Schema generale di un’applicazione Mobile

by Mark Weston Alessandro Consorti

La rivoluzione delle app mobile è qui, quindi perché non unirsi e scaricare la tua copia di "Schema generale di un'applicazione Mobile" in questo momento! Avete mai pensato di far soldi attraverso la pubblicazione di un'app? Lo sapevate che chiunque può facilmente ed economicamente farlo ora? Dal momento in cui l'iPhone è apparso sul mercato nel 2007 le applicazioni mobile sono rapidamente diventate la prossima corsa all'oro del mondo della tecnologia. Con la quantità di soldi che sono spesi per telefoni cellulari e applicazioni mobili non è una sorpresa che ci siano nuovi milionari ogni giorno in questo settore. Io non sono qui per dirvi che caricando un'app diventerete ricchi come loro, ma per offrirvi un modo per costruire gradualmente una fonte di reddito passivo. Nel mio libro, Schema generale di un'applicazione Mobile, vi mostro esattamente cosa dovete fare per iniziare a costruire un portafoglio di applicazioni mobile e guadagnare passivamente giorno dopo giorno. Probabilmente avete sentito parlare di Angry Birds o Plants vs Zombies? Questi sono giochi per mobile che hanno avuto un grande successo. Non è tuttavia necessario creare un gioco superstar per fare soldi con le app. Anche la maggior parte delle applicazioni di base ha la possibilità di fare soldi per merito del volume di persone che possiedono un telefono cellulare e scaricano applicazioni. Vi mostrerò come iniziare il vostro impero delle app mobile, sfruttando la leva finanziaria che Internet comporta per avviare un business, sia economico che rapido. Non avete nemmeno bisogno di avere alcuna conoscenza di programmazione. In realtà io sconsiglio a tutti di svolgere qualsiasi tipo di programmazione salvo che non si abbiate una fantastica idea che vi appassiona. Se desiderate un business per fare soldi, allora accettate il mio consiglio, vi farà andare molto più spediti. In poche parole, Vi darò una carrellata su tutto ciò che c'è da sapere per lanci

Schema Matching and Mapping

by Erhard Rahm Angela Bonifati Zohra Bellahsene

Schema Matching and Mapping provides an overview of the ways in which the schema and ontology matching and mapping tools have addressed information systems requirements. Topics include effective methods for matching data, mapping transformation verification, mapping-driven schema evolution and merging.

The Scheme Programming Language, fourth edition

by R. Kent Dybvig

A thoroughly updated and expanded edition brings this popular introductory text and reference up to date with the current Scheme standard, the Revised6 Report on Scheme.Scheme is a general-purpose programming language, descended from Algol and Lisp, widely used in computing education and research and a broad range of industrial applications. This thoroughly updated edition of The Scheme Programming Language provides an introduction to Scheme and a definitive reference for standard Scheme, presented in a clear and concise manner. Written for professionals and students with some prior programming experience, it begins by leading the programmer gently through the basics of Scheme and continues with an introduction to some of the more advanced features of the language. The fourth edition has been substantially revised and expanded to bring the content up to date with the current Scheme standard, the Revised6 Report on Scheme. All parts of the book were updated and three new chapters were added, covering the language's new library, exception handling, and record-definition features. The book offers three chapters of introductory material with numerous examples, eight chapters of reference material, and one chapter of extended examples and additional exercises. All of the examples can be entered directly from the keyboard into an interactive Scheme session. Answers to many of the exercises, a complete formal syntax of Scheme, and a summary of forms and procedures are provided in appendixes. The Scheme Programming Language is the only book available that serves both as an introductory text in a variety of courses and as an essential reference for Scheme programmers.

Schlüsselfaktoren im E-Commerce: Innovationen, Skaleneffekte, Datenorientierung und Kundenzentrierung (essentials)

by Dominik Große Holtforth Richard C. Geibel Robin Kracht

Das essential zeigt, wie digitale Innovationen, Customer Centricity, Skaleneffekte und Data Driven Marketing zu nachhaltigen Kundenbeziehungen und Wettbewerbsvorteilen im E-Commerce führen. Dazu werden die vier Schlüsselfaktoren im E-Commerce umfassend dargestellt. Leser und Leserinnen erhalten grundlegende Impulse für die Neuausrichtung von Geschäftsmodellen, zur Gestaltung von Wachstumsprozessen und zur Erzielung nachhaltiger Erträge. Das essential geht dabei über die übliche Auflistung von operativen To-dos hinaus und zeigt Faktoren auf, die digitalen Technologien und E-Commerce zu disruptiver Wirkung verhelfen.

Schlüsselfaktoren im E-Commerce: Innovationen, Skaleneffekte, Daten und Kundenzentrierung (essentials)

by Dominik Große Holtforth

Das essential zeigt, wie digitale Innovationen, Customer Centricity, Skaleneffekte und Data Driven Marketing zu nachhaltigen Kundenbeziehungen und Wettbewerbsvorteilen im E-Commerce führen. Dazu werden die vier Schlüsselfaktoren im E-Commerce umfassend dargestellt. Leser und Leserinnen erhalten grundlegende Impulse für die Neuausrichtung von Geschäftsmodellen, zur Gestaltung von Wachstumsprozessen und zur Erzielung nachhaltiger Erträge. Das essential geht dabei über die übliche Auflistung von operativen To-dos hinaus und zeigt Faktoren auf, die digitalen Technologien und E-Commerce zu disruptiver Wirkung verhelfen.

SCHMERZEN FORMEN: Agentielles Design in der Schmerzerfassung

by Johannes Maria Breuer

Wie stark sind die Schmerzen auf einer Skala von 1 bis 10? Sind sie pochend, stechend, pulsierend? Adäquate Schmerzerfassung stellt schon immer eine Herausforderung dar. Oftmals sind die Kategorien aktueller Instrumente allzu vereinfachend. Umfassendere, multidimensionale Assessments sind wiederum aufwendig und können für die Patient*innen eine Überforderung darstellen. Daher wird die Entwicklung einer intuitiven visuellen Form der Schmerzerfassung empfohlen. Sie berücksichtigt die Wechselwirkung zwischen Schmerzerleben und Schmerzrepräsentation in der Agentialität des Designs. Das Ergebnis ist ein digitales System, das durch die Modellierung multipler grafischer Parameter Schmerzen fluide, körperbezogen und mehrdimensional erfasst. Das System ermöglicht eine präzisere Verfolgung des Therapieverlaufs, kann die Körperwahrnehmung der Patient*innen verbessern und liefert Daten für eine patientenzentrierte und datengetriebene Medizin.

Schneier on Security

by Bruce Schneier

Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay -- figuratively and literally -- when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level -- business, technical, or personal.

Schnelles und skalierbares Cloud-Datenmanagement

by Felix Gessert Wolfram Wingerath Norbert Ritter

Die enorme Datenmenge erfordert skalierbare Datenverwaltung für weltweiten Zugriff. Zahlreiche NoSQL-Systeme prägen die komplexe Landschaft. Dieses Buch bietet Überblick und Klassifikation im Cloud-Datenmanagement. Themen umfassen NoSQL-Speichersysteme, polyglotte Architekturen, verteilte Transaktionen, Web-Caching, Datenzugriff und Rendering-Performance. Die Klassifikation ermöglicht eine Betrachtung des Gesamtentwurfs und der Positionen jedes Systems. Ein anwendungsorientiertes Entscheidungshilfetool erleichtert die Auswahl geeigneter Systemkandidaten für bestimmte Anwendungsszenarien.

Schnellstart Python: Ein Einstieg ins Programmieren für MINT-Studierende (essentials)

by Christoph Schäfer

Christoph Schäfer stellt die großartige Welt der Programmierung mit Python vor und ermöglicht einen schnellen Einstieg zur eigenständigen Entwicklung von Skripten. Er verweist darauf, wie die Programmiersprache Python sich in den letzten Jahren neben MATLAB und R als Standard an naturwissenschaftlichen Arbeitsplätzen in Forschung und Entwicklung etabliert hat, und zeigt, dass die große Popularität von Python sich in der leichten Erweiterbarkeit begründet: So lassen sich sehr einfach Module von anderen Entwicklern in eigenen Skripten und Programmen verwenden. Der Autor stellt insbesondere die Module NumPy, SciPy und Matplotlib vor, die Naturwissenschaftlern und Ingenieuren eine perfekte Entwicklungsumgebung für Wissenschaftliches und Technisches Rechnen, für Anwendungen in der Physik, Chemie, Biologie und Informatik bieten. Auch in den neuesten Applikationen in den hochaktuellen Gebieten Big Data Science und Machine Learning kommt Python zum Einsatz.Der Autor: Dr. Christoph Schäfer lehrt und forscht in der Abteilung Computational Physics am Institut für Astronomie und Astrophysik an der Eberhard Karls Universität Tübingen.

Scholarship in the Digital Age: Information, Infrastructure, and the Internet (The\mit Press Ser.)

by Christine L. Borgman

An exploration of the technical, social, legal, and economic aspects of the scholarly infrastructure needed to support research activities in all fields in the twenty-first century.Scholars in all fields now have access to an unprecedented wealth of online information, tools, and services. The Internet lies at the core of an information infrastructure for distributed, data-intensive, and collaborative research. Although much attention has been paid to the new technologies making this possible, from digitized books to sensor networks, it is the underlying social and policy changes that will have the most lasting effect on the scholarly enterprise. In Scholarship in the Digital Age, Christine Borgman explores the technical, social, legal, and economic aspects of the kind of infrastructure that we should be building for scholarly research in the twenty-first century.Borgman describes the roles that information technology plays at every stage in the life cycle of a research project and contrasts these new capabilities with the relatively stable system of scholarly communication, which remains based on publishing in journals, books, and conference proceedings. No framework for the impending “data deluge” exists comparable to that for publishing. Analyzing scholarly practices in the sciences, social sciences, and humanities, Borgman compares each discipline's approach to infrastructure issues. In the process, she challenges the many stakeholders in the scholarly infrastructure—scholars, publishers, libraries, funding agencies, and others—to look beyond their own domains to address the interaction of technical, legal, economic, social, political, and disciplinary concerns. Scholarship in the Digital Age will provoke a stimulating conversation among all who depend on a rich and robust scholarly environment.

The School in the Cloud: The Emerging Future of Learning (Corwin Teaching Essentials)

by Sugata Mitra

The Science and the Story of the Future of Learning In 1999, Sugata Mitra conducted the famous "Hole in the Wall" experiment that inspired three TED Talks and earned him the first million-dollar TED prize for research in 2013. Since then, he has conducted new research around self-organized learning environments (SOLE), building "Schools in the Cloud" all over the world. This new book shares the results of this research and offers • Examples of thriving Schools in the Cloud in unlikely places • Mitra’s predictions on the future of learning • How to design assessments for self-organizing learning • How to build your own School in the Cloud • Clips from the documentary, The School in the Cloud

The School in the Cloud: The Emerging Future of Learning (Corwin Teaching Essentials)

by Sugata Mitra

The Science and the Story of the Future of Learning In 1999, Sugata Mitra conducted the famous "Hole in the Wall" experiment that inspired three TED Talks and earned him the first million-dollar TED prize for research in 2013. Since then, he has conducted new research around self-organized learning environments (SOLE), building "Schools in the Cloud" all over the world. This new book shares the results of this research and offers • Examples of thriving Schools in the Cloud in unlikely places • Mitra’s predictions on the future of learning • How to design assessments for self-organizing learning • How to build your own School in the Cloud • Clips from the documentary, The School in the Cloud

Schooled (Codename: Winger #2)

by Jeff Adams

Theo Reese is a high school student who’s also a secret agent. Usually those lives are kept separate, but now he must be both at once. <p><p> Theo lends his expertise to his school’s computer science club as they gear up for a competition, but his talents are also required by the covert agency he works for. Someone has stolen an encrypted key that can allow them to control the nation’s energy grids. The possibilities are catastrophic unless Theo and his team can reclaim the file. <p> Theo locates the file in an unexpected place—the computer science competition. As Winger, his secret identity, he must recover the file and keep his teammates safe from the unscrupulous thieves…. But can he do it without revealing his secrets? He can’t blow his cover, especially with so many of his classmates around.

Refine Search

Showing 50,876 through 50,900 of 60,741 results