Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Advances in Computers

      • 1st Edition
      • Volume 65
      • July 12, 2005
      • Marvin Zelkowitz
      • English
      • Paperback
        9 7 8 0 1 2 4 1 1 3 3 4 3
      • eBook
        9 7 8 0 0 8 0 4 5 9 6 7 7
      This present volume describes some of the latest advances in the computer science field today. This current volume emphasizes information processing with chapters on artificial intelligence, data bases and software engineering. In particular it looks at the interfaces between AI and software development with chapters on how AI affects the development of correct programs, and conversely, how software engineering can affect the development of correct AI programs.Key Features:* In-depth surveys and tutorials on new computer technology.* Well-known authors and researchers in the field.* Extensive bibliographies with most chapters.* Impact of AI on software development and impact of software development on correct AI programs.* What is the educational role of mathematics in the development of the next generation of computer professional?
    • IM Instant Messaging Security

      • 1st Edition
      • June 15, 2005
      • John Rittinghouse PhD CISM + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 3 8 5
      • eBook
        9 7 8 0 0 8 0 4 6 0 7 2 7
      There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today’s corporate environment.
    • Programming the PIC Microcontroller with MBASIC

      • 1st Edition
      • June 14, 2005
      • Jack Smith
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 9 4 6 6
      • eBook
        9 7 8 0 0 8 0 4 6 0 7 4 1
      The Microchip PIC family of microcontrollers is the most popular series of microcontrollers in the world. However, no microcontroller is of any use without software to make it perform useful functions. This comprehensive reference focuses on designing with Microchip’s mid-range PIC line using MBASIC, a powerful but easy to learn programming language. It illustrates MBASIC’s abilities through a series of design examples, beginning with simple PIC-based projects and proceeding through more advanced designs. Unlike other references however, it also covers essential hardware and software design fundamentals of the PIC microcontroller series, including programming in assembly language when needed to supplement the capabilities of MBASIC. Details of hardware/software interfacing to the PIC are also provided.BENEFIT TO THE READER: This book provides one of the most thorough introductions available to the world’s most popular microcontroller, with numerous hardware and software working design examples which engineers, students and hobbyists can directly apply to their design work and studies. Using MBASIC, it is possible to develop working programs for the PIC in a much shorter time frame than when using assembly language.
    • Data Mining

      • 2nd Edition
      • June 8, 2005
      • Ian H. Witten + 1 more
      • English
      • eBook
        9 7 8 0 0 8 0 4 7 7 0 2 2
      Data Mining, Second Edition, describes data mining techniques and shows how they work. The book is a major revision of the first edition that appeared in 1999. While the basic core remains the same, it has been updated to reflect the changes that have taken place over five years, and now has nearly double the references. The highlights of this new edition include thirty new technique sections; an enhanced Weka machine learning workbench, which now features an interactive interface; comprehensive information on neural networks; a new section on Bayesian networks; and much more. This text is designed for information systems practitioners, programmers, consultants, developers, information technology managers, specification writers as well as professors and students of graduate-level data mining and machine learning courses.
    • Virtual Machines

      • 1st Edition
      • June 3, 2005
      • Jim Smith + 1 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 7 6 2
      • Hardback
        9 7 8 1 5 5 8 6 0 9 1 0 5
      • eBook
        9 7 8 0 0 8 0 5 2 5 4 0 2
      Virtual Machine technology applies the concept of virtualization to an entire machine, circumventing real machine compatibility constraints and hardware resource constraints to enable a higher degree of software portability and flexibility. Virtual machines are rapidly becoming an essential element in computer system design. They provide system security, flexibility, cross-platform compatibility, reliability, and resource efficiency. Designed to solve problems in combining and using major computer system components, virtual machine technologies play a key role in many disciplines, including operating systems, programming languages, and computer architecture. For example, at the process level, virtualizing technologies support dynamic program translation and platform-independent network computing. At the system level, they support multiple operating system environments on the same hardware platform and in servers.Historically... individual virtual machine techniques have been developed within the specific disciplines that employ them (in some cases they aren’t even referred to as “virtual machines”), making it difficult to see their common underlying relationships in a cohesive way. In this text, Smith and Nair take a new approach by examining virtual machines as a unified discipline. Pulling together cross-cutting technologies allows virtual machine implementations to be studied and engineered in a well-structured manner. Topics include instruction set emulation, dynamic program translation and optimization, high level virtual machines (including Java and CLI), and system virtual machines for both single-user systems and servers.
    • Comprehensive Functional Verification

      • 1st Edition
      • May 26, 2005
      • Bruce Wile + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 7 5 1 8 0 3 9
      • eBook
        9 7 8 0 0 8 0 4 7 6 6 4 3
      One of the biggest challenges in chip and system design is determining whether the hardware works correctly. That is the job of functional verification engineers and they are the audience for this comprehensive text from three top industry professionals.As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functi... verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for engineers, and none that cover the subject as comprehensively as this text. A key strength of this book is that it describes the entire verification cycle and details each stage. The organization of the book follows the cycle, demonstrating how functional verification engages all aspects of the overall design effort and how individual cycle stages relate to the larger design process. Throughout the text, the authors leverage their 35 plus years experience in functional verification, providing examples and case studies, and focusing on the skills, methods, and tools needed to complete each verification task.
    • Advances in Computers

      • 1st Edition
      • Volume 64
      • May 11, 2005
      • Marvin Zelkowitz
      • English
      • Hardback
        9 7 8 0 1 2 0 1 2 1 6 4 9
      • Paperback
        9 7 8 0 1 2 3 9 9 2 9 2 5
      • eBook
        9 7 8 0 0 8 0 4 5 9 5 8 5
      Advances in Computers covers new developments in computer technology. Most chapters present an overview of a current subfield within computer science, with many citations and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes the role of the internet, the world wide web and other aspects of a distributed computing environment. Open source development as well as computing for the handicapped are additional important topics. Key Features: In-depth surveys and tutorials on new computer technology Well-known authors are researchers in the field Extensive bibliographies with most chapters Important chapters on new technologies for software development: open source development and the technology needed to use the web for electronic commerce
    • Advanced Computer-Aided Fixture Design

      • 1st Edition
      • May 9, 2005
      • Yiming (Kevin) Rong + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 5 9 4 7 5 1 0
      • Paperback
        9 7 8 0 1 2 3 9 9 6 0 2 2
      • eBook
        9 7 8 0 0 8 0 4 8 8 2 7 1
      Fixtures--the component or assembly that holds a part undergoing machining--must be designed to fit the shape of that part and the type of machining being done. This book discusses the fundamentals of Computer-Aided Fixture Design (CAFD) techniques and covers fixture planning, fixture design (both modular and dedicated fixtures), fixture design verifications, and the overall integration with CAD/CAM. The book shows how CAFD may lead to a significant reduction of product and process development time and production cost, and how CAFD can increase quality assurance through simulation and science-based technical specification and cost estimation in business quoting, especially in current supplier-based manufacturing. It also provides case study examples.
    • Advanced Systems Design with Java, UML and MDA

      • 1st Edition
      • April 21, 2005
      • Kevin Lano
      • English
      • Paperback
        9 7 8 0 7 5 0 6 6 4 9 6 7
      • eBook
        9 7 8 0 0 8 0 4 5 6 9 1 1
      The Model Driven Architecture defines an approach where the specification of the functionality of a system can be separated from its implementation on a particular technology platform. The idea being that the architecture will be able to easily be adapted for different situations, whether they be legacy systems, different languages or yet to be invented platforms.MDA is therefore, a significant evolution of the object-oriented approach to system development.Advanced System Design with Java, UML and MDA describes the factors involved in designing and constructing large systems, illustrating the design process through a series of examples, including a Scrabble player, a jukebox using web streaming, a security system, and others. The book first considers the challenges of software design, before introducing the Unified Modelling Language and Object Constraint Language. The book then moves on to discuss systems design as a whole, covering internet systems design, web services, Flash, XML, XSLT, SOAP, Servlets, Javascript and JSP.In the final section of the book, the concepts and terminology of the Model Driven Architecture are discussed. To get the most from this book, readers will need introductory knowledge of software engineering, programming in Java and basic knowledge of HTML.
    • Advances in Computers

      • 1st Edition
      • Volume 63
      • April 19, 2005
      • Suyel Namasudra + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 9 2 9 5 6
      • Hardback
        9 7 8 0 1 2 0 1 2 1 6 3 2
      • eBook
        9 7 8 0 0 8 0 4 5 9 1 4 1
      The term computation gap has been defined as the difference between the computational power demanded by the application domain and the computational power of the underlying computer platform. Traditionally, closing the computation gap has been one of the major and fundamental tasks of computer architects. However, as technology advances and computers become more pervasive in the society, the domain of computer architecture has been extended. The scope of research in the computer architecture is no longer restricted to the computer hardware and organization issues. A wide spectrum of topics ranging from algorithm design to power management is becoming part of the computer architecture. Based on the aforementioned trend and to reflect recent research efforts, attempts were made to select a collection of articles that covers different aspects of contemporary computer architecture design. This volume of the Advances in Computers contains six chapters on different aspects of computer architecture. Key features: Wide range of research topics Coverage of new topics such as power management, Network on Chip, Load balancing in distributed systems, and pervasive computing Simple writing style