« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 
 RSS

Computer Science - Concordia University Libraries Recent Acquisitions

Titles in the call number range QA 75 - QA 76 (Computer Science) that were added to the Concordia University Libraries collection in the last 60 days.


  • Structural information and communication complexity : 24th International Colloquium, SIROCCO 2017, Porquerolles, France, June 19-22, 2017, Revised Selected Papers / Shantanu Das, Sebastien Tixeuil (editions.)
    QA76.9.A43

  • Mathematical aspects of computer and information sciences : 7th International Conference, MACIS 2017, Vienna, Austria, November 15-17, 2017, Proceedings / Johannes Blömer, Ilias S. Kotsireas, Temur Kutsia, Dimitris E. Simos (editions.)
    QA76.9.M35

  • Security, Privacy, and Applied Cryptography Engineering : 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings / edited by Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth
    QA76.9.A25

  • Metadata and Semantic Research : 11th International Conference, MTSR 2017, Tallinn, Estonia, November 28 – December 1, 2017, Proceedings / edited by Emmanouel Garoufallou, Sirje Virkus, Rania Siatri, Damiana Koutsomiha
    QA76.95

  • Simulating Social Complexity : A Handbook / edited by Bruce Edmonds, Ruth Meyer
    QA76.76.A65

  • Queueing Theory and Network Applications : 12th International Conference, QTNA 2017, Qinhuangdao, China, August 21-23, 2017, Proceedings / edited by Wuyi Yue, Quan-Lin Li, Shunfu Jin, Zhanyou Ma
    QA76.76.A65

  • Adventures in Computer Science : From Classical Bits to Quantum Bits / by Vicente Moret-Bonillo
    QA76.95

  • Progress in Cryptology – INDOCRYPT 2017 : 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings / edited by Arpita Patra, Nigel P. Smart
    QA76.9.A25

  • Big Data Analytics : 5th International Conference, BDA 2017, Hyderabad, India, December 12-15, 2017, Proceedings / edited by P. Krishna Reddy, Ashish Sureka, Sharma Chakravarthy, Subhash Bhalla
    QA76.9.D343

  • Critical Information Infrastructures Security : 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers / edited by Grigore Havarneanu, Roberto Setola, Hypatia Nassopoulos, Stephen Wolthusen
    QA76.9.A25

  • Games and Learning Alliance : 6th International Conference, GALA 2017, Lisbon, Portugal, December 5–7, 2017, Proceedings / edited by João Dias, Pedro A. Santos, Remco C. Veltkamp
    QA76.95

  • Personal Analytics and Privacy. An Individual and Collective Perspective : First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers / edited by Riccardo Guidotti, Anna Monreale, Dino Pedreschi, Serge Abiteboul
    QA76.95

  • Combinatorial Optimization and Applications : 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part I / edited by Xiaofeng Gao, Hongwei Du, Meng Han
    QA76.9.A43

  • Theory and Practice of Natural Computing : 6th International Conference, TPNC 2017, Prague, Czech Republic, December 18-20, 2017, Proceedings / edited by Carlos Martín-Vide, Roman Neruda, Miguel A. Vega-Rodríguez
    QA76.9.A43

  • Combinatorial Optimization and Applications : 11th International Conference, COCOA 2017, Shanghai, China, December 16-18, 2017, Proceedings, Part II / edited by Xiaofeng Gao, Hongwei Du, Meng Han
    QA76.9.A43

  • Research advances in cloud computing / Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya, editors
    QA76.585

  • Verified software : theories, tools, and experiments : 9th International Conference, VSTTE 2017, Heidelberg, Germany, July 22-23, 2017, Revised selected papers / edited by Andrei Paskevich, Thomas Wies
    QA76.76.V47

  • Security, privacy, and anonymity in computation, communication, and storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings / Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo (editions.)
    QA76.9.A25

  • Beginning Ractive.js : a practical introduction to Ractive.js using real-world examples / Alex Libby
    QA76.76.A65

  • Foundations of programming languages / Kent D. Lee
    QA76.7

  • Information security practice and experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings / Joseph K. Liu, Pierangela Samarati (editions.)
    QA76.9.A25

  • Information systems security : 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings / Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (editions.)
    QA76.9.A25

  • Virtual reality and augmented reality : 14th EuroVR International Conference, EuroVR 2017, Laval, France, December 12-14, 2017, Proceedings / Jernej Barbic, Mirabelle D'Cruz, Marc Erich Latoschik, Mel Slater, Patrick Bourdot (editions.)
    QA76.9.V5

  • Security, privacy, and anonymity in computation, communication, and storage : 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings / edited by Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo (editions.)
    QA76.9.A25

  • Recent trends in algebraic development techniques : 23rd IFIP WG 1.3 International Workshop, WADT 2016, Gregynog, UK, September 21-24, 2016, Revised selected papers / Phillip James, Markus Roggenbach (editions.)
    QA76.76.D47

  • Mining intelligence and knowledge exploration : 5th International Conference, MIKE 2017, Hyderabad, India, December 13-15, 2017, Proceedings / Ashish Ghosh, Rajarshi Pal, Rajendra Prasath (editions.)
    QA76.9.D343

  • Cryptography and coding : 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings / Máire O'Neill (edition)
    QA76.9.A25

  • Python 2 and 3 compatibility : with Six and Python-future libraries / Joannah Nanjekye
    QA76.73.P98

  • A psychology of user experience : involvement, affect and aesthetics / Phil Turner
    QA76.9.H85

  • Learn microservices with Spring Boot : a practical approach to RESTful Services using RabbitMQ, Eureka, Ribbon, Zuul and Cucumber / Moises Macero
    QA76.76.A65

  • Intelligent human computer interaction : 9th International Conference, IHCI 2017, Evry, France, December 11-13, 2017, Proceedings / Patrick Horain, Catherine Achard, Malik Mallem (editions.)
    QA76.9.H85

  • Introducing JavaScript game development : build a 2D game from the ground up / Graeme Stuart
    QA76.76.C672

  • Java EE web application primer : building Bullhorn : a messaging app with JSP, Servlets, JavaScript, Bootstrap and Oracle / Dave Wolf, A.J. Henley
    QA76.73.J38

  • Companion technology : a paradigm shift in human-technology interaction / Biundo, Susanne, Andreas Wendemuth, editors
    QA76.9.H85

  • Parsing with Perl 6 Regexes and Grammars : a recursive descent into Parsing / Moritz Lenz
    QA76.73.P22

  • Full stack AngularJS for Java developers : build a full-featured web application from scratch using AngularJS with Spring RESTful / Ravi Kant Soni
    QA76.76.A65

  • Audio visualization using ThMAD : realtime graphics rendering for Ubuntu Linux / Peter Späth
    QA76.9.I52

  • Reusable firmware development : a practical approach to APIs, HALs and drivers / Jacob Beningo
    QA76.765

  • C# programming for absolute beginners / Radek Vystavěl
    QA76.73.C154

  • Xamarin.Forms essentials : first steps toward cross-platform mobile apps / Gerald Versluis
    QA76.76.A65

  • Compact representations for the design of quantum logic / Philipp Niemann, Robert Wille
    QA76.889

  • The mathematical-function computation handbook : programming using the MathCW portable software library / Nelson H.F. Beebe
    QA76.9.M35

  • From variability tolerance to approximate computing in parallel integrated architectures and accelerators / Abbas Rahimi, Luca Benini, Rajesh K. Gupta
    QA76.9.A73

  • Cybersecurity for industry 4.0 : analysis for design and manufacturing / Lane Thames, Dirk Schaefer, editors
    QA76.9.A25

  • Privately and publicly verifiable computing techniques : a survey / Denise Demirel, Lucas Schabhüser, Johannes Buchmann
    QA76.6

  • Network role mining and analysis / Derek Doran
    QA76.9.D343

  • Python for graph and network analysis / Mohammed Zuhair Al-Taie, Seifedine Kadry
    QA76.73.P98

  • Advances in neuromorphic hardware exploiting emerging nanoscale devices / Manan Suri, editor
    QA76.87

  • Fundamentals of IP and SoC security : design, verification, and debug / Swarup Bhunia, Sandip Ray, Susmita Sur-Kolay, editors
    QA76.9.A25

  • Information security practices : emerging threats and perspectives / Issa Traoré, Ahmed Awad, Isaac Woungang, editors
    QA76.9.A25

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.


  • Recent advances on soft computing and data mining : the second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016 Proceedings / Tutut Herawan, Rozaida Ghazali, Nazri Mohd Nawi, Mustafa Mat Deris, editors
    QA76.9.S63

  • Digital storytelling : form and content / edited by Mark Dunford and Tricia Jenkins
    QA76.76.I59

  • Social media shaping e-Publishing and academia / Nashrawan Taha, Rizik Al-Sayyed, Ja'far Alqatawna, Ali Rodan, editors
    QA76.76.A65

  • Sex robots : the future of desire / Jason Lee
    QA 76.9 H85 L44 2017eb
    This book reveals that the way we perceive sex robots is how we perceive ourselves, overcoming the false human/non-human binary. From Greek myths, to the film Ex Machina, to Japanese technology, non-human sexuality has been at the heart of culture. In Sex Robots, the history of this culture is explored. This text sheds new light on what the sex robot represents and signifies, examining its philosophical implications within the context of today's society. This volume will be of interest to scholars of technology, cultural studies, the social sciences and philosophy.

  • Open source innovation : the phenomenon, participant's behavior, business implications / edited by Cornelius Herstatt and Daniel Ehls
    QA 76.76 S46 H47 2015eb

  • Natural language processing for social media / Atefeh Farzindar, Diana Inkpen
    QA76.9.N38 F275 2018eb

  • Answering queries using views / Foto Afrati, Rada Chirkova
    QA76.9.D3 A372 2018eb
    The topic of using views to answer queries has been popular for a few decades now, as it cuts across domains such as query optimization, information integration, data warehousing, website design, and, recently, database-as-a-service and data placement in cloud systems. This book assembles foundational work on answering queries using views in a self-contained manner, with an effort to choose material that constitutes the backbone of the research. It presents efficient algorithms and covers the following problems: query containment; rewriting queries using views in various logical languages; equivalent rewritings and maximally contained rewritings; and computing certain answers in the data-integration and data-exchange settings. Query languages that are considered are fragments of SQL, in particular, select-project-join queries, also called conjunctive queries (with or without arithmetic comparisons or negation), and aggregate SQL queries.

  • The state of the art in intrusion prevention and detection / edited by Al-Sakib Khan Pathan
    QA76.9.A25 S7354 2014

    The State of the Art in Intrusion Prevention and Detectionanalyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.

    Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective.

    The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection.

    The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.


  • Adaptive, dynamic, and resilient systems / edited by Niranjan Suri, Giacomo Cabri
    QA76.9.A3 A34 2014

    As the complexity of today's networked computer systems grows, they become increasingly difficult to understand, predict, and control. Addressing these challenges requires new approaches to building these systems. Adaptive, Dynamic, and Resilient Systems supplies readers with various perspectives of the critical infrastructure that systems of networked computers rely on. It introduces the key issues, describes their interrelationships, and presents new research in support of these areas.

    The book presents the insights of a different group of international experts in each chapter. Reporting on recent developments in adaptive systems, it begins with a survey of application fields. It explains the requirements of such fields in terms of adaptation and resilience. It also provides some abstract relationship graphs that illustrate the key attributes of distributed systems to supply you with a better understanding of these factors and their dependencies.

    The text examines resilient adaptive systems from the perspectives of mobile, infrastructure, and enterprise systems and protecting critical infrastructure. It details various approaches for building adaptive, dynamic, and resilient systems--including agile, grid, and autonomic computing; multi-agent-based and biologically inspired approaches; and self-organizing systems.

    The book includes many stories of successful applications that illustrate a diversified range of cutting-edge approaches. It concludes by covering related topics and techniques that can help to boost adaptation and resilience in your systems.


  • Software patterns, knowledge maps, and domain analysis / Mohamed E. Fayad, Huascar A. Sanchez, Srikanth G.K. Hegde, Anshu Basia, Ashka Vakil
    QA76.76.P37 F39 2015

    Software design patterns are known to play a vital role in enhancing the quality of software systems while reducing development time and cost. However, the use of these design patterns has also been known to introduce problems that can significantly reduce the stability, robustness, and reusability of software. This book introduces a new process for creating software design patterns that leads to highly stable, reusable, and cost-effective software. The basis of this new process is a topology of software patterns called knowledge maps .

    This book provides readers with a detailed view of the art and practice of creating meaningful knowledge maps. It demonstrates how to classify software patterns within knowledge maps according to their application rationale and nature. It provides readers with a clear methodology in the form of step-by-step guidelines, heuristics, and quality factors that simplify the process of creating knowledge maps.

    This book is designed to allow readers to master the basics of knowledge maps from their theoretical aspects to practical application. It begins with an overview of knowledge map concepts and moves on to knowledge map goals, capabilities, stable design patterns, development scenarios, and case studies. Each chapter of the book concludes with an open research issue, review questions, exercises, and a series of projects.


  • Visualization analysis & design / Tamara Munzner, Department of Computer Science, University of British Columbia ; illustrations by Eamonn Maguire
    QA76.9.I52 M86 2015

    Learn How to Design Effective Visualization Systems

    Visualization Analysis and Designprovides a systematic, comprehensive framework for thinking about visualization in terms of principles and design choices. The book features a unified approach encompassing information visualization techniques for abstract data, scientific visualization techniques for spatial data, and visual analytics techniques for interweaving data transformation and analysis with interactive visual exploration. It emphasizes the careful validation of effectiveness and the consideration of function before form.

    The book breaks down visualization design according to three questions: what data users need to see, why users need to carry out their tasks, and how the visual representations proposed can be constructed and manipulated. It walks readers through the use of space and color to visually encode data in a view, the trade-offs between changing a single view and using multiple linked views, and the ways to reduce the amount of data shown in each view. The book concludes with six case studies analyzed in detail with the full framework.

    The book is suitable for a broad set of readers, from beginners to more experienced visualization designers. It does not assume any previous experience in programming, mathematics, human-computer interaction, or graphic design and can be used in an introductory visualization course at the graduate or undergraduate level.


  • Hardware security : design, threats, and safeguards / Debdeep Mukhopadhyay, Rajat Subhra, Chakraborty Indian Institute of Technology Kharagpur West Bengal, India
    QA76.9.A25 M85 2015

    Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with state-of-the-art research and strategies for the design of very large scale integrated (VLSI) circuits and symmetric cryptosystems, complete with examples of Advanced Encryption Standard (AES) ciphers, asymmetric ciphers, and elliptic curve cryptography (ECC).

    Gain a Comprehensive Understanding of Hardware Security--from Fundamentals to Practical Applications

    Since most implementations of standard cryptographic algorithms leak information that can be exploited by adversaries to gather knowledge about secret encryption keys, Hardware Security: Design, Threats, and Safeguards :

    Details algorithmic- and circuit-level countermeasures for attacks based on power, timing, fault, cache, and scan chain analysis Describes hardware intellectual property piracy and protection techniques at different levels of abstraction based on watermarking Discusses hardware obfuscation and physically unclonable functions (PUFs), as well as Trojan modeling, taxonomy, detection, and prevention

    Design for Security and Meet Real-Time Requirements

    If you consider security as critical a metric for integrated circuits (ICs) as power, area, and performance, you'll embrace the design-for-security methodology of Hardware Security: Design, Threats, and Safeguards .


  • Simulation technologies in networking and communications : selecting the best tool for the test / edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Shafiullah Khan
    QA76.9.C65 S56 2015

    Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials.

    Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Testaddresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world.

    Considers superefficient Monte Carlo simulations Describes how to simulate and evaluate multicast routing algorithms Covers simulation tools for cloud computing and broadband passive optical networks Reports on recent developments in simulation tools for WSNs Examines modeling and simulation of vehicular networks

    The book compiles expert perspectives about the simulation of various networking and communications technologies. These experts review and evaluate popular simulation modeling tools and recommend the best tools for your specific tests. They also explain how to determine when theoretical modeling would be preferred over simulation.

    This book does not provide a verdict on the best suitable tool for simulation. Instead, it supplies authoritative analyses of the different kinds of networks and systems. Presenting best practices and insights from global experts, the book provides you with an understanding of what to simulate, where to simulate, whether to simulate or not, when to simulate, and how to simulate for a wide range of issues.


  • Mobile social networking and computing : a multidisciplinary integrated perspective / Yufeng Wang and Jianhua Ma
    QA76.59 .W36 2015

    Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution.

    Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspectivenot only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs.

    In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life.

    The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing.

    Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.


  • Combinatorial maps : efficient data structures for computer graphics and image processing / Guillaume Damiand, Pascal Lienhardt
    QA76.9.D35 D35 2015

    A Versatile Framework for Handling Subdivided Geometric Objects

    Combinatorial Maps: Efficient Data Structures for Computer Graphics and Image Processinggathers important ideas related to combinatorial maps and explains how the maps are applied in geometric modeling and image processing. It focuses on two subclasses of combinatorial maps: n -Gmaps and n -maps.

    Suitable for researchers and graduate students in geometric modeling, computational and discrete geometry, computer graphics, and image processing and analysis, the book presents the data structures, operations, and algorithms that are useful in handling subdivided geometric objects. It shows how to study data structures for the explicit representation of subdivided geometric objects and describes operations for handling the structures. The book also illustrates results of the design of data structures and operations.


  • Approximate iterative algorithms / Anthony Almudevar, Department of Biostatistics and Computational Biology, University of Rochester, Rochester, NY, USA
    QA76.9.A43 A46 2014

  • Software and systems architecture in action / Raghvinder S. Sangwan
    QA76.9.A73 S29 2015

    Modern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance, and evolution of these architectures.

    Software and Systems Architecture in Actionexplores practices that can be helpful in the development of architectures of large-scale systems in which software is a major component. Examining the synergies that exist between the disciplines of software and systems engineering, it presents concepts, techniques, and methods for creating and documenting architectures.

    The book describes an approach to architecture design that is driven from systemic quality attributes determined from both the business and technical goals of the system, rather than just its functional requirements. This architecture-centric design approach utilizes analytically derived patterns and tactics for quality attributes that inform the architect's design choices and help shape the architecture of a given system.

    The book includes coverage of techniques used to assess the impact of architecture-centric design on the structural complexity of a system. After reading the book, you will understand how to create architectures of systems and assess their ability to meet the business goals of your organization.

    Ideal for anyone involved with large and complex software-intensive systems, the book details powerful methods for engaging the software and systems engineers on your team. The book is also suitable for use in undergraduate and graduate-level courses on software and systems architecture as it exposes students to the concepts and techniques used to create and manage architectures of software-intensive systems.


  • Discrete and continuous simulation : theory and practice / Susmita Bandyopadhyay, Ranjan Bhattacharya
    QA76.9.C65 B36 2014

    When it comes to discovering glitches inherent in complex systems--be it a railway or banking, chemical production, medical, manufacturing, or inventory control system--developing a simulation of a system can identify problems with less time, effort, and disruption than it would take to employ the original. Advantageous to both academic and industrial practitioners, Discrete and Continuous Simulation: Theory and Practiceoffers a detailed view of simulation that is useful in several fields of study.

    This text concentrates on the simulation of complex systems, covering the basics in detail and exploring the diverse aspects, including continuous event simulation and optimization with simulation. It explores the connections between discrete and continuous simulation, and applies a specific focus to simulation in the supply chain and manufacturing field. It discusses the Monte Carlo simulation, which is the basic and traditional form of simulation. It addresses future trends and technologies for simulation, with particular emphasis given to .NET technologies and cloud computing, and proposes various simulation optimization algorithms from existing literature.

    Includes chapters on input modeling and hybrid simulation Introduces general probability theory Contains a chapter on Microsoft#65533;Excel(tm)and MATLAB#65533;/Simulink#65533; Discusses various probability distributions required for simulation Describes essential random number generators

    Discrete and Continuous Simulation: Theory and Practice defines the simulation of complex systems. This text benefits academic researchers in industrial/manufacturing/systems engineering, computer sciences, operations research, and researchers in transportation, operations management, healthcare systems, and human-machine systems.


  • Reactive web applications : covers Play, Akka, and Reactive Streams / Manuel Bernhardt
    QA 76.76 A65 B47 2016

    Summary

    Reactive Web Applications teaches web developers how to benefit from the reactive application architecture and presents hands-on examples using the Play framework.

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    About the Technology

    Reactive applications build on top of components that communicate asynchronously as they react to user and system events. As a result, they become scalable, responsive, and fault-tolerant. Java and Scala developers can use the Play Framework and the Akka concurrency toolkit to easily implement reactive applications without building everything from scratch.

    About the Book

    Reactive Web Applications teaches web developers how to benefit from the reactive application architecture and presents hands-on examples using Play, Akka, Scala, and Reactive Streams. This book starts by laying out the fundamentals required for writing functional and asynchronous applications and quickly introduces Play as a framework to handle the plumbing of your application. The book alternates between chapters that introduce reactive ideas (asynchronous programming with futures and actors, managing distributed state with CQRS) and practical examples that show you how to build these ideas into your applications.

    What's Inside

    Reactive application architecture Basics of Play and Akka Examples in Scala Functional and asynchronous programming

    About Reader Description

    For readers comfortable programming with a higher-level language such as Java or C#, and who can read Scala code. No experience with Play or Akka needed.

    About the Author

    Manuel Bernhardt is a passionate engineer, author, and speaker. As a consultant, he guides companies through the technological and organizational transformation to distributed computing.

    Table of Contents

    PART 1 GETTING STARTED WITH REACTIVE WEB APPLICATIONS Did you say reactive? Your first reactive web application Functional programming primer Quick introduction to Play PART 2 CORE CONCEPTS Futures Actors Dealing with state Responsive user interfaces PART 3 ADVANCED TOPICS Reactive Streams Deploying reactive Play applications Testing reactive web applications

  • A data scientist's guide to acquiring, cleaning, and managing data in R / Samuel E. Buttrey and Lyn R. Whitaker, Naval Postgraduate School, California, United States
    QA 76.9 D26 B895 2018

    The only how-to guide offering a unified, systemic approach to acquiring, cleaning, and managing data in R

    Every experienced practitioner knows that preparing data for modeling is a painstaking, time-consuming process. Adding to the difficulty is that most modelers learn the steps involved in cleaning and managing data piecemeal, often on the fly, or they develop their own ad hoc methods. This book helps simplify their task by providing a unified, systematic approach to acquiring, modeling, manipulating, cleaning, and maintaining data in R.

    Starting with the very basics, data scientists Samuel E. Buttrey and Lyn R. Whitaker walk readers through the entire process. From what data looks like and what it should look like, they progress through all the steps involved in getting data ready for modeling. They describe best practices for acquiring data from numerous sources; explore key issues in data handling, including text/regular expressions, big data, parallel processing, merging, matching, and checking for duplicates; and outline highly efficient and reliable techniques for documenting data and recordkeeping, including audit trails, getting data back out of R, and more.

    The only single-source guide to R data and its preparation, it describes best practices for acquiring, manipulating, cleaning, and maintaining data Begins with the basics and walks readers through all the steps necessary to get data ready for the modeling process Provides expert guidance on how to document the processes described so that they are reproducible Written by seasoned professionals, it provides both introductory and advanced techniques Features case studies with supporting data and R code, hosted on a companion website

    A Data Scientist's Guide to Acquiring, Cleaning and Managing Data in R is a valuable working resource/bench manual for practitioners who collect and analyze data, lab scientists and research associates of all levels of experience, and graduate-level data mining students.


  • Mathematica companion for finite mathematics and business calculus / Fred E. Szabo
    QA 76.95 S93 2018

  • Java 8 in action : lambdas, streams, and functional-style programming / Raoul-Gabriel Urma, Mario Fusco, Alan Mycroft
    QA 76.73 J38 U75 2015

    Summary

    Java 8 in Action is a clearly written guide to the new features of Java 8. The book covers lambdas, streams, and functional-style programming. With Java 8's functional features you can now write more concise code in less time, and also automatically benefit from multicore architectures. It's time to dig in!

    Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

    About the Book

    Every new version of Java is important, but Java 8 is a game changer. Java 8 in Action is a clearly written guide to the new features of Java 8. It begins with a practical introduction to lambdas, using real-world Java code. Next, it covers the new Streams API and shows how you can use it to make collection-based code radically easier to understand and maintain. It also explains other major Java 8 features including default methods, Optional, CompletableFuture, and the new Date and Time API.

    This book is written for programmers familiar with Java and basic OO programming.

    What's Inside

    How to use Java 8's powerful new features Writing effective multicore-ready applications Refactoring, testing, and debugging Adopting functional-style programming Quizzes and quick-check questions

    About the Authors

    Raoul-Gabriel Urma is a software engineer, speaker, trainer, and PhD candidate at the University of Cambridge. Mario Fusco is an engineer at Red Hat and creator of the lambdaj library. Alan Mycroft is a professor at Cambridge and cofounder of the Raspberry Pi Foundation.

    Table of Contents

    PART 1 FUNDAMENTALS Java 8: why should you care? Passing code with behavior parameterization Lambda expressions PART 2 FUNCTIONAL-STYLE DATA PROCESSING Introducing streams Working with streams Collecting data with streams Parallel data processing and performance PART 3 EFFECTIVE JAVA 8 PROGRAMMING Refactoring, testing, and debugging Default methods Using Optional as a better alternative to null CompletableFuture: composable asynchronousprogramming New Date and Time API PART 4 BEYOND JAVA 8 Thinking functionally Functional programming techniques Blending OOP and FP: comparing Java 8 and Scala Conclusions and where next for Java APPENDIXES Miscellaneous language updates Miscellaneous library updates Performing multiple operations in parallelon a stream Lambdas and JVM bytecode

  • Advances in cryptology -- ASIACRYPT 2017 : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Tsuyoshi Takagi, Thomas Peyrin (eds.)
    QA76.9.A25

  • Critical infrastructure protection XI : 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised selected papers / Mason Rice, Sujeet Shenoi (eds.)
    QA76.9.A25

  • Information theoretic security : 10th International Conference, ICITS 2017, Hong Kong, China, November 29-December 2, 2017, Proceedings / Junji Shikata (ed.)
    QA76.9.A25

  • Advances in cryptology -- ASIACRYPT 2017 : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Tsuyoshi Takagi, Thomas Peyrin (eds.)
    QA76.9.A25

  • Advances in cryptology -- ASIACRYPT 2017 : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings. Tsuyoshi Takagi, Thomas Peyrin (eds.)
    QA76.9.A25

  • Knowledge and Systems Sciences 18th International Symposium, KSS 2017, Bangkok, Thailand, November 17–19, 2017, Proceedings / edited by Jian Chen, Thanaruk Theeramunkong, Thepachai Supnithi, Xijin Tang
    QA76.9.D343

  • Service-Oriented Computing 15th International Conference, ICSOC 2017, Malaga, Spain, November 13–16, 2017, Proceedings / edited by Michael Maximilien, Antonio Vallecillo, Jianmin Wang, Marc Oriol
    QA76.758

  • Trusted computing and information security : 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings / Ming Xu, Zheng Qin, Fei Yan, Shaojing Fu (eds.)
    QA76.9.A25
page last updated on: Saturday 17 February 2018
Back to top Back to top