Account
Orders
Advanced search
Formal Languages, Automaton and Numeration Systems presents readers with a review of research related to formal language theory, combinatorics on words or numeration systems, such as Words, DLT (Developments in Language Theory), ICALP, MFCS (Mathematical Foundation of...
System virtualization has become increasingly common in distributed systems because of its functionality and convenience for the owners and users of these infrastructures. In Scheduling of Large-scale Virtualized Infrastructures, author Flavien Quesnel examines the...
Computer-assisted translation (CAT) has always used translation memories, which require the translator to have a corpus of previous translations that the CAT software can use to generate bilingual lexicons. This can be problematic when the translator does not have such...
This book presents real-world examples of formal techniques in an industrial context. It covers formal methods such as SCADE and/or the B Method, in various fields such as railways, aeronautics, and the automotive industry. The purpose of this book is to present a...
Reconciliation of Geometry and Perception in Radiation Physics approaches the topic of projective geometry as it applies to radiation physics and attempts to negate its negative reputation. With an original outlook and transversal approach, the book emphasizes common...
A presentation of real examples of industrial uses for formal methods such as SCADE, the B-Method, ControlBuild, Matelo, etc. in various fields, such as railways, aeronautics, and the automotive industry, the purpose of this book is to present a summary of experience on...
This book covers local search for combinatorial optimization and its extension to mixed-variable optimization. Although not yet understood from the theoretical point of view, local search is the paradigm of choice for tackling large-scale real-life optimization...
This book is a summary of more than a decade of research in the area of backend optimization. It contains the latest fundamental research results in this field. While existing books are often more oriented toward Masters students, this book is aimed more towards...
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its...
An increasing number of business executives, managers and political leaders are using the concept of "weak signals" nowadays. There are also an increasing number of people trying to find out exactly what this concept means, as well as when and how to use it. Such...
Quantum networks build on entanglement and quantum measurement to achieve tasks that are beyond the reach of classical systems. Using quantum effects, we can detect the presence of eavesdroppers, raise the sensitivity of scientific instruments such as telescopes, or...
In a fast changing global economy governed by Enterprise Services and the Future Internet, enterprises and virtual factories will self-organize in distributed, interoperable, innovation Ecosystems where the issues of Enterprise Interoperability need to be solved in a...
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their experience and accumulated knowledge about the firm activities. However, considering the large amount of knowledge created...
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...
Building computers that can be used to design embedded real-time systems is the subject of this title. Real-time embedded software requires increasingly higher performances. The authors therefore consider processors that implement advanced mechanisms such as pipelining,...
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much...
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode...
Bistatic radar consists of a radar system which comprises a transmitter and receiver which are separated by a distance comparable to the expected target distance. This book provides a general theoretical description of such bistatic technology in the context of...
Crowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new business opportunities....
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers