« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 
 RSS

Computer Science - Concordia University Libraries Recent Acquisitions

Titles in the call number range QA 75 - QA 76 (Computer Science) that were added to the Concordia University Libraries collection in the last 60 days.


  • Cloud computing for optimization : foundations, applications, and challenges / Bhabani Shankar Prasad Mishra, Himansu Das, Satchidananda Dehuri, Alok Kumar Jagadev, editors
    QA76.585

  • Practical Python AI projects mathematical models of optimization problems with Google OR-tools
    QA76.73.P98

  • Internet multimedia computing and service : 9th International Conference, ICIMCS 2017, Qingdao, China, August 23-25, 2017, Revised selected papers / Benoit Huet, Liqiang Nie, Richang Hong (eds.)
    QA76.575

  • Requirements engineering : foundation for software quality : 24th International Working Conference, REFSQ 2018, Utrecht, The Netherlands, March 19-22, 2018, Proceedings / Erik Kamsties, Jennifer Horkoff, Fabiano Dalpiaz (eds.)
    QA76.758 .R44 2018eb

  • Automatic syntactic analysis based on selectional preferences / Alexander Gelbukh, Hiram Calvo
    QA76.9.N38

  • Reversibility and universality essays presented to Kenichi Morita on the occasion of his 70th birthday / Andrew Adamatzky, editor
    QA76.9.R48

  • Accelerator Programming Using Directives 4th International Workshop, WACCPD 2017, Held in Conjunction with the International Conference for High Performance Computing, Networking, Storage and Analysis, SC 2017, Denver, CO, USA, November 13, 2017, Proceedings / edited by Sunita Chandrasekaran, Guido Juckeland
    QA76.76.C65

  • Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
    QA76.9.A25

  • Euro-Par 2017: Parallel Processing Workshops Euro-Par 2017 International Workshops, Santiago de Compostela, Spain, August 28-29, 2017, Revised Selected Papers / edited by Dora B. Heras, Luc Bougé
    QA76.9.E94

  • Introduction to Deep Learning From Logical Calculus to Artificial Intelligence / by Sandro Skansi
    QA76.9.D343

  • Semantic Keyword-Based Search on Structured Data Sources Third International KEYSTONE Conference, IKC 2017, Gdańsk, Poland, September 11-12, 2017, Revised Selected Papers and COST Action IC1302 Reports / edited by Julian Szymański, Yannis Velegrakis
    QA75.5

  • Lectures on Runtime Verification Introductory and Advanced Topics / edited by Ezio Bartocci, Yliès Falcone
    QA76.758

  • Digital TV and Wireless Multimedia Communication 14th International Forum, IFTC 2017, Shanghai, China, November 8-9, 2017, Revised Selected Papers / edited by Guangtao Zhai, Jun Zhou, Xiaokang Yang
    QA76.575

  • Emotion in Video Game Soundtracking edited by Duncan Williams, Newton Lee
    QA76.9.U83

  • Algorithms and Discrete Applied Mathematics 4th International Conference, CALDAM 2018, Guwahati, India, February 15-17, 2018, Proceedings / edited by B.S. Panda, Partha P. Goswami
    QA76.9.A43

  • Software Engineering and Formal Methods SEFM 2017 Collocated Workshops: DataMod, FAACS, MSE, CoSim-CPS, and FOCLASA, Trento, Italy, September 4-5, 2017, Revised Selected Papers / edited by Antonio Cerone, Marco Roveri
    QA76.9.L63

  • Illustrated C# 7 : the C# language presented clearly, concisely, and visually / Daniel Solis, Cal Schrotenboer
    QA76.73.C154

  • Practical data science : a guide to building the technology stack for turning data lakes into business assets / Andreas François Vermeulen
    QA76.9.D35

  • Advances in internet, data & web technologies : the 6th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2018) / Leonard Barolli, Fatos Xhafa, Nadeem Javaid, Evjola Spaho, Vladi Kolici (eds.)
    QA76.76.I58

  • The Huawei and Snowden questions : Can electronic equipment from untrusted vendors be verified? Can an untrusted vendor build trust into electronic equipment? / Olav Lysne
    QA76.9.A25

  • Artificial adaptive systems using auto contractive maps : theory, applications and extensions / Paolo Massimo Buscema, Giulia Massini, Marco Breda, Weldon A. Lodwick, Francis Newman, Masoud Asadi-Zeydabadi
    QA76.9.A3

  • Java language features : with modules, streams, threads, I/O, and lambda expressions / Kishori Sharan
    QA76.73.J38

  • Augmented reality art : from an emerging technology to a novel creative medium / edited by Vladimir Geroimenko
    QA76.9.A94

  • Advances in computer algebra : in honour of Sergei Abramov's' 70th birthday, WWCA 2016, Waterloo, Ontario, Canada / Carsten Schneider, Eugene Zima, editors
    QA76.9.M35

  • Cooperative coordination and formation control for multi-agent systems / Zhiyong Sun
    QA76.76.I58

  • Bridging the semantic gap in image and video analysis / Halina Kwaśnicka, Lakhmi C. Jain, editors
    QA76.5913

  • Intelligent technologies for interactive entertainment : 9th International Conference, INTETAIN 2017, Funchal, Portugal, June 20-22, 2017, Proceedings / Yoram Chisik, Jussi Holopainen, Rilla Khaled, José Luis Silva, Paula Alexandra Silva (eds.)
    QA76.76.I59

  • Data science analytics and applications : first International Conference, DaSAA 2017, Chennai, India, January 4-6, 2017, Revised selected papers / Shriram R, Mak Sharma (eds.)
    QA76.9.D343

  • Optimized cloud based scheduling / Rong Kun Jason Tan, John A. Leong, Amandeep S. Sidhu
    QA76.585

  • WALCOM : algorithms and computation : 12th International Conference, WALCOM 2018, Dhaka, Bangladesh, March 3-5, 2018, Proceedings / edited by M. Sohel Rahman, Wing-Kin Sung, Ryuhei Uehara
    QA76.9.A43

  • Graphical models for security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised selected papers / Peng Liu, Sjouke Mauw, Ketil Stølen (eds.)
    QA76.9.A25

  • Services computing for language resources / Yohei Murakami, Donghui Lin, Toru Ishida, editors
    QA76.9.N38

  • Symbolic parallelization of nested loop programs / Alexandru-Petru Tanase, Frank Hannig, Jürgen Teich
    QA76.642

  • Learn data analysis with Python : lessons in coding / A.J. Henley, Dave Wolf
    QA76.73.P98

  • Ruby data processing : using map, reduce, and select / Jay Godse
    QA76.73.R83

  • High performance computing in science and engineering '17 : transactions of the High Performance Computing Center, Stuttgart (HLRS) 2017 / Wolfgang E. Nagel, Dietmar H. Kröner, Michael M. Resch, editors
    QA76.88

  • Embedded operating systems : a practical approach / Alan Holt, Chi-Yu Huang
    QA76.76.O63

  • Foundations and practice of security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised selected papers / Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.)
    QA76.9.A25

  • Knowledge computing and its applications : knowledge manipulation and processing techniques. S. Margret Anouncia, Uffe Kock Wiil, editors
    QA76.76.E95

  • Modern data strategy / Mike Fleckenstein, Lorraine Fellows
    QA76.9.D3

  • Economic models for managing cloud services / Sajib Mistry, Athman Bouguettaya, Hai Dong
    QA76.585

  • Pro iPhone development with Swift 4 : design and manage top quality apps / Molly Maskrey, Wallace Wang
    QA76.73.S95

  • Bad programming practices 101 : become a better coder by learning how (not) to program / Karl Beecher
    QA76.6

  • New classification method based on modular neural networks with the LVQ algorithm and type-2 fuzzy logic / Jonathan Amezcua, Patricia Melin, Oscar Castillo
    QA76.87

  • Learn Android Studio 3 : efficient Android app development / Ted Hagos
    QA76.76.A65

  • Parallel genetic algorithms for financial pattern discovery using GPUs / João Baúto, Rui Neves, Nuno Horta
    QA76.623

  • Pro JPA 2 in Java EE 8 : an in-depth guide to Java persistence APIs / Mike Keith, Merrick Schincariol, Massimo Nardone
    QA76.9.D3

  • Mobile agent-based anomaly detection and verification system for smart home sensor networks / Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu, Surraya Khanum
    QA76.76.I58

  • Formal modeling and analysis of distributed systems : an introduction based on executable modeling in Maude / Peter Csaba Ölveczky
    QA 76.9 F67 U456 2017eb
    This book introduces formal modeling and analysis of distributed systems by means of executable formal modeling in rewriting logic and model checking analyses in the tool Maude. The first part of the book introduces "classical" equational algebraic specification and term rewrite systems, including reasoning about confluence and termination, as well as equational logic. The second part introduces rewriting logic and deals with the executable formal modeling of distributed systems. The book develops executable formal Maude models of classic distributed systems, which are then simulated and are further analysed through reachability analysis in Maude. In particular, the book shows how Maude can be used to break the Needham-Schroeder Public Key cryptographic protocol. Finally, the book introduces (linear) temporal logic that can be used to express complex requirements that distributed systems must satisfy and it uses Maude LTL model checker to analyze whether our models satisfy desired temporal properties.

  • Python for data analysis : data wrangling with pandas, NumPy, and IPython / Wes McKinney
    QA 76.73 P98 M42 2018

    Get complete instructions for manipulating, processing, cleaning, and crunching datasets in Python. Updated for Python 3.6, the second edition of this hands-on guide is packed with practical case studies that show you how to solve a broad set of data analysis problems effectively. You'll learn the latest versions of pandas, NumPy, IPython, and Jupyter in the process.

    Written by Wes McKinney, the creator of the Python pandas project, this book is a practical, modern introduction to data science tools in Python. It's ideal for analysts new to Python and for Python programmers new to data science and scientific computing. Data files and related material are available on GitHub.

    Use the IPython shell and Jupyter notebook for exploratory computing Learn basic and advanced features in NumPy (Numerical Python) Get started with data analysis tools in the pandas library Use flexible tools to load, clean, transform, merge, and reshape data Create informative visualizations with matplotlib Apply the pandas groupby facility to slice, dice, and summarize datasets Analyze and manipulate regular and irregular time series data Learn how to solve real-world data analysis problems with thorough, detailed examples

  • Data science from scratch : first principles with Python / Joel Grus
    QA 76.73 P98 G78 2015

    Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they're also a good way to dive into the discipline without actually understanding data science. In this book, you'll learn how many of the most fundamental data science tools and algorithms work by implementing them from scratch .

    If you have an aptitude for mathematics and some programming skills, author Joel Grus will help you get comfortable with the math and statistics at the core of data science, and with hacking skills you need to get started as a data scientist. Today's messy glut of data holds answers to questions no one's even thought to ask. This book provides you with the know-how to dig those answers out.

    Get a crash course in Python Learn the basics of linear algebra, statistics, and probability--and understand how and when they're used in data science Collect, explore, clean, munge, and manipulate data Dive into the fundamentals of machine learning Implement models such as k-nearest Neighbors, Naive Bayes, linear and logistic regression, decision trees, neural networks, and clustering Explore recommender systems, natural language processing, network analysis, MapReduce, and databases

  • The essentials of computer organization and architecture / Linda Null, Julia Lobur
    QA 76.9 C643 N85 2019
    The Essentials of Computer Organization and Architecture was awarded a "Textbook Excellence Award" ("Texty") in it's second, third, and fourth editions from the Text and Academic Authors Association (TAA) the only association devoted solely to serving textbook and academic authors since 1987 (www.TAAonline.net). The "Textbook Excellence Award" recognizes works for their excellence in the areas of content, presentation, appeal, and teachability.Bestselling text, The Essentials of Computer Organization and Architecture, Fifth Edition, is comprehensive enough to address all necessary organization and architecture topics, but concise enough to be appropriate for a single-term course. Its focus on real-world examples and practical applications encourages students to develop a "big-picture" understanding of how essential organization and architecture concepts are applied in the computing world. In addition to direct correlation with the ACM/IEEE guidelines for computer organization and architecture, the text exposes readers to the inner workings of a modern digital computer through an integrated presentation of fundamental concepts and principles.Each new print copy of Essentials of Computer Organization and Architecture also includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

  • Reactive programming with RxJS 5 : untangle your asynchronous Javascript code / Sergi Mansilla
    QA 76.73 J39 M36 2018

    Reactive programming is revolutionary. It makes asynchronous programming clean, intuitive, and robust. Use RxJS 5 to write complex programs in a simple way, and master the Observable: a powerful data type that substitutes callbacks and promises. Think about your programs as streams of data that change and adapt to produce what you want. Manage real-world concurrency and write complex flows of events in your applications with ease. Take advantage of Schedulers to make asynchronous testing easier. The code in this new edition is completely updated for RxJS 5 and ES6.

    Create concurrent applications with ease using RxJS 5, a powerful event composition library. Real-world JavaScript applications require you to master asynchronous programming, and chances are that you'll spend more time coordinating asynchronous events than writing actual functionality. This book introduces concepts and tools that will greatly simplify the process of writing asynchronous programs.

    Find out about Observables, a unifying data type that simplifies concurrent code and eases the pain of callbacks. Learn how Schedulers change the concept of time itself, making asynchronous testing sane again. Find real-world examples for the browser and Node.js along the way: how about a real-time earthquake visualization in 20 lines of code, or a frantic shoot-'em-up space videogame? You'll also use Cycle.js - a modern, reactive, web framework - to make a new breed of web applications.

    By the end of the book, you'll know how to think in a reactive way, and to use RxJS 5 to build complex programs and create amazing reactive user interfaces. You'll also understand how to integrate it with your existing projects and use it with the frameworks you already know. All the code in this new edition has been thoroughly revised and updated for RxJS 5, ES6, and Cycle.js Unified.

    What You Need:





    NodeJS 6.x and a modern web browser


  • Rails 5 Test Prescriptions : build a healthy codebase / Noel Rappin
    QA 76.73 R83 R37 2018

    Does your Rails code suffer from bloat, brittleness, or inaccuracy? Cure these problems with the regular application of test-driven development. You'll use Rails 5.1, Minitest 5, and RSpec 3.6, as well as popular testing libraries such as factory_girl and Cucumber. Updates include Rails 5.1 system tests and Webpack integration. Do what the doctor ordered to make your applications feel all better. Side effects may include better code, fewer bugs, and happier developers.

    Your Ruby on Rails application is sick. Deadlines are looming, but every time you make the slightest change to the code, something else breaks. Nobody remembers what that tricky piece of code was supposed to do, and nobody can tell what it actually does. Plus, it has bugs. You need test-driven development: a process for improving the design, maintainability, and long-term viability of software.

    With both practical code examples and discussion of why testing works, this book starts with the most basic features delivered as part of core Ruby on Rails. Once you've integrated those features into your coding practice, work with popular third-party testing tools such as RSpec, Jasmine, Cucumber, and factory_girl. Test the component parts of a Rails application, including the back-end model logic and the front-end display logic. With Rails examples, use testing to enable your code to respond better to future change. Plus, see how to handle real-world testing situations.

    This new edition has been updated to Rails 5.1 and RSpec 3.6 and contains full coverage of new Rails features, including system tests and the Webpack-based JavaScript setup.

    What You Need:

    Ruby 2.4, Rails 5.1


  • Node.js 8 the right way : practical, server-side JavaScript that scales / Jim R. Wilson
    QA 76.73 J39 W53 2018

    Node.js is the platform of choice for creating modern web services. This fast-paced book gets you up to speed on server-side programming with Node.js 8, as you develop real programs that are small, fast, low-profile, and useful. Take JavaScript beyond the browser, explore dynamic language features, and embrace evented programming.Harness the power of the event loop and non-blocking I/O to create highly parallel microservices and applications. This expanded and updated second edition showcases the latest ECMAScript features, current best practices, and modern development techniques.

    JavaScript is the backbone of the modern web, powering nearly every web app's user interface. Node.js is JavaScript for the server. This greatly expanded second edition introduces new language features while dramatically increasing coverage of core topics. Each hands-on chapter offers progressively more challenging topics and techniques, broadening your skill set and enabling you to think in Node.js.

    Write asynchronous, non-blocking code using Node.js's style and patterns. Cluster and load balance services with Node.js core features and third-party tools. Harness the power of databases such as Elasticsearch and Redis. Work with many protocols, create RESTful web services, TCP socket clients and servers, and more. Test your code's functionality with Mocha, and manage its life cycle with npm. Discover how Node.js pairs a server-side event loop with a JavaScript runtime to produce screaming fast, non-blocking concurrency. Through a series of practical programming domains, use the latest available ECMAScript features and harness key Node.js classes and popular modules. Create rich command-line tools and a web-based UI using modern web development techniques.

    Join the smart and diverse community that's rapidly advancing the state of the art in JavaScript development.

    What You Need:

    Node.js 8.x Operating system with bash-like shell OMQ (pronounced "Zero-M-Q") library, version 3.2 or higher Elasticsearch version 5.0 or higher jq version 1.5 or higher Redis version 3.2 or higher

  • The materiality of interaction : notes on the materials of interaction design / Mikael Wiberg
    QA 76.9 H85 W486 2017

    A new approach to interaction design that moves beyond representation and metaphor to focus on the material manifestations of interaction.

    Smart watches, smart cars, the Internet of things, 3D printing: all signal a trend toward combining digital and analog materials in design. Interaction with these new hybrid forms is increasingly mediated through physical materials, and therefore interaction design is increasingly a material concern. In this book, Mikael Wiberg describes the shift in interaction design toward material interactions. He argues that the "material turn" in human-computer interaction has moved beyond a representation-driven paradigm, and he proposes "material-centered interaction design" as a new approach to interaction design and its materials. He calls for interaction design to abandon its narrow focus on what the computer can do and embrace a broader view of interaction design as a practice of imagining and designing interaction through material manifestations. A material-centered approach to interaction design enables a fundamental design method for working across digital, physical, and even immaterial materials in interaction design projects.

    Wiberg looks at the history of material configurations in computing and traces the shift from metaphors in the design of graphical user interfaces to materiality in tangible user interfaces. He examines interaction through a material lens; suggests a new method and foundation for interaction design that accepts the digital as a design material and focuses on interaction itself as the form being designed; considers design across substrates; introduces the idea of "interactive compositions"; and argues that the focus on materiality transcends any distinction between the physical and digital.


  • Data mining in time series and streaming databases / editors, Mark Last (Ben-Gurion University of the Negev, Israel), Horst Bunke (University of Bern, Switzerland), Abraham Kandel (University of South Florida, USA)
    QA 76.9 D343 D38328 2018

  • Experience on demand : what virtual reality is, how it works, and what it can do / Jeremy Bailenson
    QA 76.9 C65 B345 2018
    Virtual reality is able to effectively blur the line between reality and illusion, pushing the limits of our imagination and granting us access to any experience imaginable. With well-crafted simulations, these experiences, which are so immersive that the brain believes they're real, are already widely available with a VR headset and will only become more accessible and commonplace. But how does this new medium affect its users, and does it have a future beyond fantasy and escapism?In Experience on Demand, Jeremy Bailenson draws on two decades spent researching the psychological effects of VR and other mass media to help readers understand this powerful new tool. He offers expert guidelines for interacting with VR and describes the profound ways this technology can be put to use--not to distance ourselves from reality, but to enrich our lives and influence us to treat others, the environment, and even ourselves better. In the world of VR, a football quarterback plays a game against a competing team hundreds of times before even stepping onto the field; members of the United Nations embody a young girl in a refugee camp going through her day-to-day life; and veterans once again walk through the streets where they had experienced trauma.There are dangers and many unknowns in using VR, but it also can help us hone our performance, recover from trauma, improve our learning and communication abilities, and enhance our empathic and imaginative capacities. Like any new technology, its most incredible uses might be waiting just around the corner. Experience on Demand is the definitive look at the risks and potential of VR--a must-read for navigating both the virtual and the physical worlds ahead.

  • Domain modeling made functional : tackle software complexity with domain-driven design and F♯ / Scott Wlaschin ; edited by Brian MacDonald
    QA 76.76 D47 W63 2018

    You want increased customer satisfaction, faster development cycles, and less wasted work. Domain-driven design (DDD) combined with functional programming is the innovative combo that will get you there. In this pragmatic, down-to-earth guide, you'll see how applying the core principles of functional programming can result in software designs that model real-world requirements both elegantly and concisely - often more so than an object-oriented approach. Practical examples in the open-source F# functional language, and examples from familiar business domains, show you how to apply these techniques to build software that is business-focused, flexible, and high quality.

    Domain-driven design is a well-established approach to designing software that ensures that domain experts and developers work together effectively to create high-quality software. This book is the first to combine DDD with techniques from statically typed functional programming. This book is perfect for newcomers to DDD or functional programming - all the techniques you need will be introduced and explained.

    Model a complex domain accurately using the F# type system, creating compilable code that is also readable documentation---ensuring that the code and design never get out of sync. Encode business rules in the design so that you have "compile-time unit tests," and eliminate many potential bugs by making illegal states unrepresentable. Assemble a series of small, testable functions into a complete use case, and compose these individual scenarios into a large-scale design. Discover why the combination of functional programming and DDD leads naturally to service-oriented and hexagonal architectures. Finally, create a functional domain model that works with traditional databases, NoSQL, and event stores, and safely expose your domain via a website or API.

    Solve real problems by focusing on real-world requirements for your software.

    What You Need:

    The code in this book is designed to be run interactively on Windows, Mac and Linux.You will need a recent version of F# (4.0 or greater), and the appropriate .NET runtime for your platform.Full installation instructions for all platforms at fsharp.org.


  • Big data : a very short introduction / Dawn E. Holmes
    QA 76.9 B45 H66 2017
    Since long before computers were even thought of, data has been collected and organized by diverse cultures across the world. Once access to the Internet became a reality for large swathes of the world's population, the amount of data generated each day became huge, and continues to growexponentially. It includes all our uploaded documents, video, and photos, all our social media traffic, our online shopping, even the GPS data from our cars."Big Data" represents a qualitative change, not simply a quantitative one. The term refers both to the new technologies involved, and to the way it can be used by business and government. Dawn E. Holmes uses a variety of case studies to explain how data is stored, analysed, and exploited by avariety of bodies from big companies to organizations concerned with disease control. Big data is transforming the way businesses operate, and the way medical research can be carried out. At the same time, it raises important ethical issues; Holmes discusses cases such as the Snowden affair, datasecurity, and domestic smart devices which can be hijacked by hackers. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, andenthusiasm to make interesting and challenging topics highly readable.

  • Archaeologies of touch : interfacing with haptics from electricity to computing / David Parisi
    QA 76.9 U83 P37 2018

    A material history of haptics technology that raises new questions about the relationship between touch and media

    Since the rise of radio and television, we have lived in an era defined increasingly by the electronic circulation of images and sounds. But the flood of new computing technologies known as haptic interfaces--which use electricity, vibration, and force feedback to stimulate the sense of touch--offering an alternative way of mediating and experiencing reality.

    In Archaeologies of Touch , David Parisi offers the first full history of these increasingly vital technologies, showing how the efforts of scientists and engineers over the past three hundred years have gradually remade and redefined our sense of touch. Through lively analyses of electrical machines, videogames, sex toys, sensory substitution systems, robotics, and human-computer interfaces, Parisi shows how the materiality of touch technologies has been shaped by attempts to transform humans into more efficient processors of information.

    With haptics becoming ever more central to emerging virtual-reality platforms (immersive bodysuits loaded with touch-stimulating actuators), wearable computers (haptic messaging systems like the Apple Watch's Taptic Engine), and smartphones (vibrations that emulate the feel of buttons and onscreen objects), Archaeologies of Touch offers a timely and provocative engagement with the long history of touch technology that helps us confront and question the power relations underpinning the project of giving touch its own set of technical media.


  • Passwords : philology, security, authentication / Brian Lennon
    QA 76.9 A25 L485 2018

    Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing's humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.

    Lennon's history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.

    Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist's scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing--passwords--that many of us use every day.


  • Release it! : design and deploy production-ready software / Michael T. Nygard
    QA 76.76 A65 N96 2018

    A single dramatic software failure can cost a company millions of dollars - but can be avoided with simple changes to design and architecture. This new edition of the best-selling industry standard shows you how to create systems that run longer, with fewer failures, and recover better when bad things happen. New coverage includes DevOps, microservices, and cloud-native architecture. Stability antipatterns have grown to include systemic problems in large-scale systems. This is a must-have pragmatic guide to engineering for production systems.

    If you're a software developer, and you don't want to get alerts every night for the rest of your life, help is here. With a combination of case studies about huge losses - lost revenue, lost reputation, lost time, lost opportunity - and practical, down-to-earth advice that was all gained through painful experience, this book helps you avoid the pitfalls that cost companies millions of dollars in downtime and reputation. Eighty percent of project life-cycle cost is in production, yet few books address this topic.

    This updated edition deals with the production of today's systems - larger, more complex, and heavily virtualized - and includes information on chaos engineering, the discipline of applying randomness and deliberate stress to reveal systematic problems. Build systems that survive the real world, avoid downtime, implement zero-downtime upgrades and continuous delivery, and make cloud-native applications resilient. Examine ways to architect, design, and build software - particularly distributed systems - that stands up to the typhoon winds of a flash mob, a Slashdotting, or a link on Reddit. Take a hard look at software that failed the test and find ways to make sure your software survives.

    To skip the pain and get the experience...get this book.


  • Distributed algorithms : an intuitive approach / Wan Fokkink
    QA 76.58 F647 2018

    The new edition of a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models.

    This book offers students and researchers a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models. It avoids mathematical argumentation, often a stumbling block for students, teaching algorithmic thought rather than proofs and logic. This approach allows the student to learn a large number of algorithms within a relatively short span of time. Algorithms are explained through brief, informal descriptions, illuminating examples, and practical exercises. The examples and exercises allow readers to understand algorithms intuitively and from different perspectives. Proof sketches, arguing the correctness of an algorithm or explaining the idea behind fundamental results, are also included. The algorithms presented in the book are for the most part "classics," selected because they shed light on the algorithmic design of distributed systems or on key issues in distributed computing and concurrent programming.

    This second edition has been substantially revised. A new chapter on distributed transaction offers up-to-date treatment of database transactions and the important evolving area of transactional memory. A new chapter on security discusses two exciting new topics: blockchains and quantum cryptography. Sections have been added that cover such subjects as rollback recovery, fault-tolerant termination detection, and consensus for shared memory. An appendix offers pseudocode descriptions of many algorithms. Solutions and slides are available for instructors.

    Distributed Algorithms can be used in courses for upper-level undergraduates or graduate students in computer science, or as a reference for researchers in the field.


  • The Wiley handbook of human computer interaction / edited by Kent L. Norman and Jurek Kirakowski
    QA 76.9 H85 W487 2018

    Once, human-computer interaction was limited to a privileged few. Today, our contact with computing technology is pervasive, ubiquitous, and global. Work and study is computer mediated, domestic and commercial systems are computerized, healthcare is being reinvented, navigation is interactive, and entertainment is computer generated. As technology has grown more powerful, so the field of human-computer interaction has responded with more sophisticated theories and methodologies. Bringing these developments together, The Wiley Handbook of Human-Computer Interaction explores the many and diverse aspects of human-computer interaction while maintaining an overall perspective regarding the value of human experience over technology.


  • Quantum-inspired intelligent systems for multimedia data analysis / Siddhartha Bhattacharyya
    QA 76.9 D343 Q365 2018
    As multimedia data advances in technology and becomes more complex, the hybridization of soft computing tools allows for more robust and safe solutions in data processing and analysis. Quantum-Inspired Intelligent Systems for Multimedia Data Analysis provides emerging research on techniques used in multimedia information processing using intelligent paradigms including swarm intelligence, neural networks, and deep learning. While highlighting topics such as clustering techniques, neural network architecture, and text data processing, this publication explores the methods and applications of computational intelligent tools. This book is an important resource for academics, computer engineers, IT professionals, students, and researchers seeking current research in the field of multimedia data processing and quantum intelligent systems.

  • Practical data science : a guide to building the technology stack for turning data lakes into business assets / Andreas François Vermeulen
    QA 76.9 D35 V47 2018
    Learn how to build a data science technology stack and perform good data science with repeatable methods. You will learn how to turn data lakes into business assets. The data science technology stack demonstrated in Practical Data Science is built from components in general use in the industry. Data scientist Andreas Vermeulen demonstrates in detail how to build and provision a technology stack to yield repeatable results. He shows you how to apply practical methods to extract actionable business knowledge from data lakes consisting of data from a polyglot of data types and dimensions. What You'll Learn Become fluent in the essential concepts and terminology of data science and data engineering Build and use a technology stack that meets industry criteria Master the methods for retrieving actionable business knowledge Coordinate the handling of polyglot data types in a data lake for repeatable results Who This Book Is For Data scientists and data engineers who are required to convert data from a data lake into actionable knowledge for their business, and students who aspire to be data scientists and data engineers

  • A practical guide to XLIFF 2.0 / Bryan Schnabel, JoAnn T. Hackos, Rodolfo M. Raya
    QA 76.76 H94 S36 2015
    A Practical Guide to XLIFF 2.0 introduces the OASIS XLIFF standard. Companies use XLIFF to standardize the exchange of source and localized content with localization and translation vendors.You will learn how to get the most from the XLIFF standard, use best practices in your translation workflow, extend XLIFF, and use the XLIFF modules.

  • Refining the concept of scientific inference when working with big data : proceedings of a workshop / Ben A. Wender, rapporteur ; Committee on Applied and Theoretical Statistics, Board on Mathematical Sciences and their Applications, Division on Engineering and Physical Sciences, the National Academies of Sciences, Engineering, Medicine
    QA 76.9 B45 W46 2017

    The concept of utilizing big data to enable scientific discovery has generated tremendous excitement and investment from both private and public sectors over the past decade, and expectations continue to grow. Using big data analytics to identify complex patterns hidden inside volumes of data that have never been combined could accelerate the rate of scientific discovery and lead to the development of beneficial technologies and products. However, producing actionable scientific knowledge from such large, complex data sets requires statistical models that produce reliable inferences (NRC, 2013). Without careful consideration of the suitability of both available data and the statistical models applied, analysis of big data may result in misleading correlations and false discoveries, which can potentially undermine confidence in scientific research if the results are not reproducible. In June 2016 the National Academies of Sciences, Engineering, and Medicine convened a workshop to examine critical challenges and opportunities in performing scientific inference reliably when working with big data. Participants explored new methodologic developments that hold significant promise and potential research program areas for the future. This publication summarizes the presentations and discussions from the workshop.


  • Bio-inspired algorithms for engineering / Alma Y. Alanis, Nancy Arana-Daniel, Carlos López-Franco
    QA 76.9 A43 A43 2018

    Bio-inspired Algorithms for Engineering builds a bridge between the proposed bio-inspired algorithms developed in the past few decades and their applications in real-life problems, not only in an academic context, but also in the real world. The book proposes novel algorithms to solve real-life, complex problems, combining well-known bio-inspired algorithms with new concepts, including both rigorous analyses and unique applications. It covers both theoretical and practical methodologies, allowing readers to learn more about the implementation of bio-inspired algorithms. This book is a useful resource for both academic and industrial engineers working on artificial intelligence, robotics, machine learning, vision, classification, pattern recognition, identification and control.


  • Expert one-on-one Microsoft Access application development / Helen Feddema
    QA 76.9 D3 F4365 2004eb
    What is this book about?

    If you are developing databases for your own use, the process need not be complicated. But when you build databases for clients, many of whom may not be familiar with Access or comfortable with databases in general, you have a lot more work to do. Expert One-on-One Microsoft Access Application Development makes that process easier.

    In these pages, you discover how to set up tables and relationships to ensure that the database is properly normalized. Then you write VBA code to create the connective tissue that turns a bunch of tables, queries, forms, and reports into a complete and coherent application. You also find out about the important but often inadequately documented area of Automation code, which is used to communicate with other Office applications.

    Over years of working with Access, the author has created some add-ins to save time when developing applications. She shows you how to use them to create a main menu for an application, automatically apply a naming convention to database objects, and ensure a consistent and professional appearance of the application's forms.

    This book helps you write VBA code that unites database components into an application that works.

    What does this book cover?

    Here's what you'll discover in this book:

    How to build integrated Access-based applications that support multiple clients and databases Tips for streamlining application creation Maintenance required throughout an application's life cycle, including migrating data from legacy systems and upgrading Office How to use Automation code to exchange data among Office components and even some non-Office programs Ways to avoid glitches when building Access applications that work with Excel, Word, and Outlook

    Who is this book for?

    This book is for experienced Access users who are familiar with creating Access objects and writing VBA code, but who need help transitioning from competent users/programmers to full-fledged Access developers.

page last updated on: Wednesday 23 May 2018
Back to top Back to top