Skip to main content

Books in Computer science

The Computing collection presents a range of foundational and applied content across computer and data science, including fields such as Artificial Intelligence; Computational Modelling; Computer Networks, Computer Organization & Architecture, Computer Vision & Pattern Recognition, Data Management; Embedded Systems & Computer Engineering; HCI/User Interface Design; Information Security; Machine Learning; Network Security; Software Engineering.

  • Computational Morphology

    A Computational Geometric Approach to the Analysis of Form
    • 1st Edition
    • Volume 6
    • G.T. Toussaint
    • English
    Computational Geometry is a new discipline of computer science that deals with the design and analysis of algorithms for solving geometric problems. There are many areas of study in different disciplines which, while being of a geometric nature, have as their main component the extraction of a description of the shape or form of the input data. This notion is more imprecise and subjective than pure geometry. Such fields include cluster analysis in statistics, computer vision and pattern recognition, and the measurement of form and form-change in such areas as stereology and developmental biology.This volume is concerned with a new approach to the study of shape and form in these areas. Computational morphology is thus concerned with the treatment of morphology from the computational geometry point of view. This point of view is more formal, elegant, procedure-oriented, and clear than many previous approaches to the problem and often yields algorithms that are easier to program and have lower complexity.
  • Machine Learning Proceedings 1989

    • 1st Edition
    • Alberto Maria Segre
    • English
    Proceedings of the Sixth International Workshop on Machine Learning covers the papers presented at the Sixth International Workshop of Machine Learning, held at Cornell University, Ithaca, New York (USA) on June 26-27, 1989. The book focuses on the processes, methodologies, techniques, and approaches involved in machine learning. The selection first offers information on unifying themes in empirical and explanation-based learning; integrated learning of concepts with both explainable and conventional aspects; conceptual clustering of explanations; and tight integration of deductive and inductive learning. The text then examines multi-strategy learning in nonhomogeneous domain theories; description of preference criterion in constructive learning; and combining case-based reasoning, explanation-based learning, and learning from instruction. Discussions focus on causal explanation of actions, constructive learning, learning in a weak theory domain, learning problem, and individual criteria and their relationships. The book elaborates on learning from plausible explanations, augmenting domain theory for explanation-based generalization, reducing search and learning goal preferences, and using domain knowledge to improve inductive learning algorithms for diagnosis. The selection is a dependable reference for researchers interested in the dynamics of machine learning.
  • Uncertainty in Artificial Intelligence 2

    • 1st Edition
    • Volume 5
    • L.N. Kanal + 1 more
    • English
    This second volume is arranged in four sections: Analysis contains papers which compare the attributes of various approaches to uncertainty. Tools provides sufficient information for the reader to implement uncertainty calculations. Papers in the Theory section explain various approaches to uncertainty. The Applications section describes the difficulties involved in, and the results produced by, incorporating uncertainty into actual systems.
  • NETBIOS Report and Reference

    1991 Edition
    • 1st Edition
    • Architecture Technology Architecture Technology Corpor
    • English
    Please note this is a Short Discount publication.NETBIOS Report and Reference is essential reading for managers, implementors and serious users of PC local area networks. It covers NETBIOS and related technology issues.The report beings with a history and conceptual view of NETBIOS, and its relationship to the OSI Reference Model, continues with the command and packet structure of NETBIOS, details the server message block protocols, looks at various NETBIOS products from several vendors, and closes with a chapter on NETBIOS standards efforts.
  • Readings in Human-Computer Interaction

    Toward the Year 2000
    • 1st Edition
    • Ronald M. Baecker
    • English
    The effectiveness of the user-computer interface has become increasingly important as computer systems have become useful tools for persons not trained in computer science. In fact, the interface is often the most important factor in the success or failure of any computer system. Dealing with the numerous subtly interrelated issues and technical, behavioral, and aesthetic considerations consumes a large and increasing share of development time and a corresponding percentage of the total code for any given application. A revision of one of the most successful books on human-computer interaction, this compilation gives students, researchers, and practitioners an overview of the significant concepts and results in the field and a comprehensive guide to the research literature. Like the first edition, this book combines reprints of key research papers and case studies with synthesizing survey material and analysis by the editors. It is significantly reorganized, updated, and enhanced; over 90% of the papers are new. An invaluable resource for systems designers, cognitive scientists, computer scientists, managers, and anyone concerned with the effectiveness of user-computer interfaces, it is also designed for use as a primary or supplementary text for graduate and advanced undergraduate courses in human-computer interaction and interface design.
  • Data Protection and Security for Personal Computers

    A manager's guide to improving the confidentiality, availability and integrity of data on Personal Computers and Local Area Networks
    • 1st Edition
    • R. Schifreen
    • English
    Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practic... comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.
  • Advanced Neural Computers

    • 1st Edition
    • R. Eckmiller
    • English
    This book is the outcome of the International Symposium on Neural Networks for Sensory and Motor Systems (NSMS) held in March 1990 in the FRG. The NSMS symposium assembled 45 invited experts from Europe, America and Japan representing the fields of Neuroinformatics, Computer Science, Computational Neuroscience, and Neuroscience.As a rapidly-published report on the state of the art in Neural Computing it forms a reference book for future research in this highly interdisciplinary field and should prove useful in the endeavor to transfer concepts of brain function and structure to novel neural computers with adaptive, dynamical neural net topologies.A feature of the book is the completeness of the references provided. An alphabetical list of all references quoted in the papers is given, as well as a separate list of general references to help newcomers to the field. A subject index and author index also facilitate access to various details.
  • Production Software That Works

    A Guide To The Concurrent Development Of Realtime Manufacturing Systems
    • 1st Edition
    • Ann Courtright + 2 more
    • English
    This useful reference addresses the key tasks that are integral to realtime software development in manufacturing plants: managing the design of the system, setting up and coordinating a development organization, and implementing tools for successfulcompletion and management. Both new and experienced project managers will discover how to use concurrent methodologies to create realtime systems in half the time it usually takes.
  • Campus Strategies for Libraries and Electronic Information

    • 1st Edition
    • Caroline Arms
    • English
    A look at how ten American colleges and Universities bridged the gap between computing, administrative, and library organisationsDetaile... case studies from ten American colleges and universities will prepare you to make better plans and decisions for an electronic library, integrated information management system, or unified information resource. You'll find models and guidelines covering reference services, latest philosophies and strategies, management and organization issues, delivery mechanisms, and more.
  • Computer Security in Financial Organizations

    • 1st Edition
    • J. Essinger
    • English
    This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of computer security.Written in an easy to read, non technical style the book is essential reading for all those involved in the management of this sensitive area, from computer security managers, financial directors and managers to analysts and designers in financial software houses.The report analyses the computer security requirements of a wide variety of organizations in the financial services sector, ranging from retail, commercial and investment banks to financial trading and investment management organizations.