Account
Orders
Advanced search
With 11 invited submissions from leading researchers and teams of researchers sharing one common characteristic ? all have worked with Dr. Judith Bishop during her long and continuing career as a leader in computer science education and research ? this book reflects on...
This book introduces resource-aware data fusion algorithms to gather and combine data from multiple sources (e.g., sensors) in order to achieve inferences. These techniques can be used in centralized and distributed systems to overcome sensor failure, technological...
Software and Systems Traceability provides a comprehensive description of the practices and theories of software traceability across all phases of the software development lifecycle. The term software traceability is derived from the concept of requirements...
Cloud computing is the latest market-oriented computing paradigm which brings software design and development into a new era characterized by “XaaS”, i.e. everything as a service.Cloud workflows, as typical software applications in the cloud, are composed of a set of...
Why have a book about the relation between requirements and software architecture? Understanding the relation between requirements and architecture is important because the requirements, be they explicit or implicit, represent the function, whereas the architecture...
How is it that one system is more effective, appealing, satisfying and/or more beautiful than another to its stakeholder community? This question drove Christopher Alexander’s fifty-year quest to explain great physical architecture and gave birth to pattern-languages...
Making the most ef?cient use of computer systems has rapidly become a leading topic of interest for the computer industry and its customers alike. However, the focus of these discussions is often on single, isolated, and speci?c architectural and technological...
Service-Oriented Computing (SOC) allows software development time to be shortened by the composition of existing services across the Internet. Further exploitation of this revolutionary trend is feasible through automation, thanks to the use of software agents and...
Agile methods are gaining more and more interest both in industry and in research. Many industries are transforming their way of working from traditional waterfall projects with long duration to more incremental, iterative and agile practices. At the same time, the need...
Motivation for This Book The OPC Foundation provides specifications for data exchange in industrial au- mation. There is a long history of COM/DCOM-based specifications, most pro- nent OPC Data Access (DA), OPC Alarms and Events (A&E), and OPC Historical Data Access...
Parsing, also referred to as syntax analysis, has been and continues to be an essential part of computer science and linguistics. Today, parsing techniques are also implemented in a number of other disciplines, including but not limited to, document preparation and...
Model-driven development has become the most important new paradigm in software development and has already demonstrated considerable impact in reducing time to market and improving product quality. However, the development of high-quality systems not only requires...
This book was written as a companion to my book on modelling operating system kernels. It is intended to demonstrate that the formal derivation of kernels is possible (and, actually, quite easy, or so I have found thus far)....
Genetic Programming Theory and Practice IV was developed from the fourth workshop at the University of Michigan’s Center for the Study of Complex Systems to facilitate the exchange of ideas and information related to the rapidly advancing field ofGenetic Programming...
As Ambient Intelligence (AmI) ecosystems are rapidly becoming a reality, they raise new research challenges. Unlike predefined static architectures as we know them today, AmI ecosystems are bound to contain a large number of heterogeneous computing, communication...
Metrics are paramount in every engineering discipline. Software engineering, however, is not considered a classical engineering activity for several reasons. In general, if a software system is seen to deliver the required functionality, only few people if any care...
In order to build a successful, Java-based application it is important to have a clear understanding of the principles underlying the various financial models. Those models guide the application designer in choosing the most appropriate Java data structures and...
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embeddedJava security. It is compared with the security model of theJava 2 Standard Edition in order...
During maintenance of a software system, not all questions can be answered directly by resorting to otherwise reliable and accurate source code. Reverse engineering aims at extracting abstract, goal-oriented views of the system, able to summarize relevant properties of...
Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machine learning method of...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers