Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

    • Digital Guide To Developing International Software

      • 1st Edition
      • June 28, 2014
      • Grou
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 0 6 3 6
      • eBook
        9 7 8 1 4 8 3 2 9 7 4 1 5
      Already in use by hundreds of independent vendors and developers, here at your fingertips are the groundbreaking packaging and design guidelines that Digital recommends and uses for products headed overseas.
    • Readings in Computer Vision

      • 1st Edition
      • June 28, 2014
      • Martin A. Fischler + 1 more
      • English
      • Paperback
        9 7 8 0 9 3 4 6 1 3 3 3 0
      • eBook
        9 7 8 0 0 8 0 5 1 5 8 1 6
      The field of computer vision combines techniques from physics, mathematics, psychology, artificial intelligence, and computer science to examine how machines might construct meaningful descriptions of their surrounding environment. The editors of this volume, prominent researchers and leaders of the SRI International AI Center Perception Group, have selected sixty papers, most published since 1980, with the viewpoint that computer vision is concerned with solving seven basic problems:Reconstruct... 3D scenes from 2D imagesDecomposing images into their component partsRecognizing and assigning labels to scene objectsDeducing and describing relations among scene objectsDetermining the nature of computer architectures that can support the visual functionRepresenting abstractions in the world of computer memoryMatching stored descriptions to image representationEach chapter of this volume addresses one of these problems through an introductory discussion, which identifies major ideas and summarizes approaches, and through reprints of key research papers. Two appendices on crucial assumptions in image interpretation and on parallel architectures for vision applications, a glossary of technical terms, and a comprehensive bibliography and index complete the volume.
    • COLT '89

      • 1st Edition
      • June 28, 2014
      • COLT
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 0 8 6 7
      • eBook
        9 7 8 0 0 8 0 9 4 8 2 9 4
      Computational Learning Theory presents the theoretical issues in machine learning and computational models of learning. This book covers a wide range of problems in concept learning, inductive inference, and pattern recognition. Organized into three parts encompassing 32 chapters, this book begins with an overview of the inductive principle based on weak convergence of probability measures. This text then examines the framework for constructing learning algorithms. Other chapters consider the formal theory of learning, which is learning in the sense of improving computational efficiency as opposed to concept learning. This book discusses as well the informed parsimonious (IP) inference that generalizes the compatibility and weighted parsimony techniques, which are most commonly applied in biology. The final chapter deals with the construction of prediction algorithms in a situation in which a learner faces a sequence of trials, with a prediction to be given in each and the goal of the learner is to make some mistakes. This book is a valuable resource for students and teachers.
    • Using C-Kermit

      • 1st Edition
      • June 28, 2014
      • Frank da Cruz + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 1 0 8 4
      • eBook
        9 7 8 1 4 8 3 2 9 7 3 4 7
      An introduction and tutorial as well as a comprehensive reference Using C-Kermit describes the new release, 5A, of Columbia University's popular C-Kermit communication software - the most portable of all communication software packages. Available at low cost on a variety of magnetic media from Columbia University,C-Kermit can be used on computers of all sizes - ranging from desktop workstations to minicomputers to mainframes and supercomputers. The numerous examples, illustrations, and tables in Using C-Kermit make the powerful and versatile C-Kermit functionsaccessible for new and experienced users alike.
    • The Digital Guide To Software Development

      • 1st Edition
      • June 28, 2014
      • Christine Dickinson
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 0 3 5 3
      • eBook
        9 7 8 1 4 8 3 2 9 7 4 2 2
      Here is the first published description of the processes and practices, tools, and methods this industry giant uses to develop its software products. This 'shirt-sleeves' guide is packed with diagrams and tables that illustrate each step in the complexsoftware development process. You'll learn all about Digital's standard 'phase review process,' the role of teams and their leaders, how CASE tools work, and how to control a project while improving productivity and product quality.
    • NETBIOS Report and Reference

      • 1st Edition
      • June 28, 2014
      • Architecture Technology Architecture Technology Corpor
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 1 2 8 1
      • eBook
        9 7 8 1 4 8 3 2 9 5 6 4 0
      Please note this is a Short Discount publication.NETBIOS Report and Reference is essential reading for managers, implementors and serious users of PC local area networks. It covers NETBIOS and related technology issues.The report beings with a history and conceptual view of NETBIOS, and its relationship to the OSI Reference Model, continues with the command and packet structure of NETBIOS, details the server message block protocols, looks at various NETBIOS products from several vendors, and closes with a chapter on NETBIOS standards efforts.
    • Data Protection and Security for Personal Computers

      • 1st Edition
      • June 28, 2014
      • R. Schifreen
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 1 6 3 2
      • eBook
        9 7 8 1 4 8 3 2 9 4 7 4 2
      Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practic... comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.
    • Computer Risk Manager

      • 1st Edition
      • June 28, 2014
      • K.R. Pursall
      • English
      • Paperback
        9 7 8 1 8 5 6 1 7 1 7 2 4
      • eBook
        9 7 8 1 4 8 3 2 9 6 7 8 4
      Please note this is a Short Discount publication.A comprehensive guide to EDP contingency planning and disaster recovery.Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the latest thinking on contingency planning.The new third edition follows the same step–by–step practical guidance as the last edition – presenting an immediate source of reference for anyone wanting to develop their own contingency plan BEFORE a systems disaster. As well as a useful check for those assessing the security of their present systems.Who should read it:★ IT Managers★ Operations Managers★ Computer Security Managers★ MIS Managers★ Technical Support Managers★ Computer Manufacturers and Suppliers★ Computer Auditors★ General Managers
    • Machine Learning Proceedings 1992

      • 1st Edition
      • June 28, 2014
      • Peter Edwards + 1 more
      • English
      • Paperback
        9 7 8 1 5 5 8 6 0 2 4 7 2
      • eBook
        9 7 8 1 4 8 3 2 9 8 5 3 5
      Machine Learning: Proceedings of the Ninth International Workshop (ML92) covers the papers and posters presented at ML92, the Ninth International Machine Learning Conference, held at Aberdeen, Scotland on July 1-3, 1992. The book focuses on the advancements of practices, methodologies, approaches, and techniques in machine learning. The selection first offers information on the principal axes method for constructive induction; learning by incomplete explanations of failures in recursive domains; and eliminating redundancy in explanation-based learning. Topics include means-ends analysis search in recursive domains, description space transformation, distance metric, generating similarity matrix, and learning principal axes. The text then examines trading off consistency and efficiency in version-space induction; improving path planning with learning; finding the conservation of momentum; and learning to predict in uncertain continuous tasks. The manuscript elaborates on a teaching method for reinforcement learning, compiling prior knowledge into an explicit bias, spatial analogy and subsumption, and multistrategy learning with introspective meta-explanations. The publication also ponders on selecting typical instances in instance-based learning and temporal difference learning of backgammon strategy. The selection is a valuable source of information for researchers interested in machine learning.
    • Microprocessor Architectures

      • 2nd Edition
      • June 28, 2014
      • Steve Heath
      • English
      • Paperback
        9 7 8 0 7 5 0 6 2 3 0 3 2
      • eBook
        9 7 8 1 4 8 3 2 9 5 5 3 4
      'Why are there all these different processor architectures and what do they all mean? Which processor will I use? How should I choose it?' Given the task of selecting an architecture or design approach, both engineers and managers require a knowledge of the whole system and an explanation of the design tradeoffs and their effects. This is information that rarely appears in data sheets or user manuals. This book fills that knowledge gap.Section 1 provides a primer and history of the three basic microprocessor architectures. Section 2 describes the ways in which the architectures react with the system. Section 3 looks at some more commercial aspects such as semiconductor technology, the design cycle, and selection criteria. The appendices provide benchmarking data and binary compatibility standards. Since the first edition of this book was published, much has happened within the industry. The Power PC architecture has appeared and RISC has become a more significant challenger to CISC. The book now includes new material on Power PC, and a complete chapter devoted to understanding the RISC challenge. The examples used in the text have been based on Motorola microprocessor families, but the system considerations are also applicable to other processors. For this reason comparisons to other designs have been included, and an overview of other processors including the Intel 80x86 and Pentium, DEC Alpha, SUN Sparc, and MIPS range has been given. Steve Heath has been involved in the design and development of microprocessor based systems since 1982. These designs have included VMEbus systems, microcontrollers, IBM PCs, Apple Macintoshes, and both CISC and RISC based multiprocessor systems, while using operating systems as varied as MS-DOS, UNIX, Macintosh OS and real time kernels. An avid user of computer systems, he has written numerous articles and papers for the electronics press, as well as books from Butterworth-Heineman... including VMEbus: A Practical Companion; PowerPC: A Practical Companion; MAC User's Pocket Book; UNIX Pocket Book; Upgrading Your PC Pocket Book; Upgrading Your MAC Pocket Book; and Effective PC Networking.