Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (16)
  • 2005-2009  (8)
  • Safari, an O’Reilly Media Company  (24)
  • Guth, Karl-Maria
  • [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann  (24)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780128024195
    Language: English
    Pages: 1 online resource (154 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual reality, and entertainment. The development of efficient and effective content-based 3-D object retrieval techniques has enabled the use of fast 3-D reconstruction and model design. Recent technical progress, such as the development of camera technologies, has made it possible to capture the views of 3-D objects. As a result, view-based 3-D object retrieval has become an essential but challenging research topic. View-based 3-D Object Retrieval introduces and discusses the fundamental challenges in view-based 3-D object retrieval, proposes a collection of selected state-of-the-art methods for accomplishing this task developed by the authors, and summarizes recent achievements in view-based 3-D object retrieval. Part I presents an Introduction to View-based 3-D Object Retrieval, Part II discusses View Extraction, Selection, and Representation, Part III provides a deep dive into View-Based 3-D Object Comparison, and Part IV looks at future research and developments including Big Data application and geographical location-based applications. Systematically introduces view-based 3-D object retrieval, including problem definitions and settings, methodologies, and benchmark testing beds Discusses several key challenges in view-based 3-D object retrieval, and introduces the state-of-the-art solutions Presents the progression from general image retrieval techniques to view-based 3-D object retrieval Introduces future research efforts in the areas of Big Data, feature extraction, and geographical location-based applications
    Note: Online resource; Title from title page (viewed December 4, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780128013977
    Language: English
    Pages: 1 online resource (258 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Awareness of design smells – indicators of common design problems – helps developers or software engineers understand mistakes made while designing, what design principles were overlooked or misapplied, and what principles need to be applied properly to address those smells through refactoring. Developers and software engineers may "know" principles and patterns, but are not aware of the "smells" that exist in their design because of wrong or mis-application of principles or patterns. These smells tend to contribute heavily to technical debt – further time owed to fix projects thought to be complete – and need to be addressed via proper refactoring. Refactoring for Software Design Smells presents 25 structural design smells, their role in identifying design issues, and potential refactoring solutions. Organized across common areas of software design, each smell is presented with diagrams and examples illustrating the poor design practices and the problems that result, creating a catalog of nuggets of readily usable information that developers or engineers can apply in their projects. The authors distill their research and experience as consultants and trainers, providing insights that have been used to improve refactoring and reduce the time and costs of managing software projects. Along the way they recount anecdotes from actual projects on which the relevant smell helped address a design issue. Contains a comprehensive catalog of 25 structural design smells (organized around four fundamental design principles) that contribute to technical debt in software projects Presents a unique naming scheme for smells that helps understand the cause of a smell as well as points toward its potential refactoring Includes illustrative examples that showcase the poor design practices underlying a smell and the problems that result Covers pragmatic techniques for refactoring design smells to manage technical debt and to create and maintain high-quality software in practice Presents insightful anecdotes and case studies drawn from the trenches of real-world projects
    Note: Online resource; Title from title page (viewed November 11, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780934613125
    Language: English
    Pages: 1 online resource (624 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Readings in Artificial Intelligence and Software Engineering covers the main techniques and application of artificial intelligence and software engineering. The ultimate goal of artificial intelligence applied to software engineering is automatic programming. Automatic programming would allow a user to simply say what is wanted and have a program produced completely automatically. This book is organized into 11 parts encompassing 34 chapters that specifically tackle the topics of deductive synthesis, program transformations, program verification, and programming tutors. The opening parts provide an introduction to the key ideas to the deductive approach, namely the correspondence between theorems and specifications and between constructive proofs and programs. These parts also describes automatic theorem provers whose development has be designed for the programming domain. The subsequent parts present generalized program transformation systems, the problems involved in using natural language input, the features of very high level languages, and the advantages of the programming by example system. Other parts explore the intelligent assistant approach and the significance and relation of programming knowledge in other programming system. The concluding parts focus on the features of the domain knowledge system and the artificial intelligence programming. Software engineers and designers and computer programmers, as well as researchers in the field of artificial intelligence will find this book invaluable.
    Note: Online resource; Title from title page (viewed June 28, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780934613507
    Language: English
    Pages: 1 online resource (518 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The most frequently used words in English are highly ambiguous; for example, Webster's Ninth New Collegiate Dictionary lists 94 meanings for the word "run" as a verb alone. Yet people rarely notice this ambiguity. Solving this puzzle has commanded the efforts of cognitive scientists for many years. The solution most often identified is "context": we use the context of utterance to determine the proper meanings of words and sentences. The problem then becomes specifying the nature of context and how it interacts with the rest of an understanding system. The difficulty becomes especially apparent in the attempt to write a computer program to understand natural language. Lexical ambiguity resolution (LAR), then, is one of the central problems in natural language and computational semantics research. A collection of the best research on LAR available, this volume offers eighteen original papers by leading scientists. Part I, Computer Models, describes nine attempts to discover the processes necessary for disambiguation by implementing programs to do the job. Part II, Empirical Studies, goes into the laboratory setting to examine the nature of the human disambiguation mechanism and the structure of ambiguity itself. A primary goal of this volume is to propose a cognitive science perspective arising out of the conjunction of work and approaches from neuropsychology, psycholinguistics, and artificial intelligence--thereby encouraging a closer cooperation and collaboration among these fields. Lexical Ambiguity Resolution is a valuable and accessible source book for students and cognitive scientists in AI, psycholinguistics, neuropsychology, or theoretical linguistics.
    Note: Online resource; Title from title page (viewed October 22, 2013)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780124096738
    Language: English
    Pages: 1 online resource (631 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: This sequel to Graphics Gems (Academic Press, 1990), and Graphics Gems II (Academic Press, 1991) is a practical collection of computer graphics programming tools and techniques. Graphics Gems III contains a larger percentage of gems related to modeling and rendering, particularly lighting and shading. This new edition also covers image processing, numerical and programming techniques, modeling and transformations, 2D and 3D geometry and algorithms,ray tracing and radiosity, rendering, and more clever new tools and tricks for graphics programming. Volume III also includes a disk containing source codes for either the IBM or Mac versions featuring all code from Volumes I, II, and III. Author David Kirk lends his expertise to the Graphics Gems series in Volume III with his far-reaching knowledge of modeling and rendering, specifically focusing on the areas of lighting and shading. Volume III includes a disk containing source codes for both the IBM and Mac versions featuring all code from volumes I, II, and III. Graphics Gems I, II, and III are sourcebooks of ideas for graphics programmers. They also serve as toolboxes full of useful tricks and techniques for novice programmers and graphics experts alike. Each volume reflects the personality and particular interests of its respective editor. Includes a disk containing source codes for both the IBM and Mac versions featuring code from volumes I, II, and III Features all new graphics gems Explains techniques for making computer graphics implementations more efficient Emphasizes physically based modeling, rendering, radiosity, and ray tracing Presents techniques for making computer graphics implementations more efficient
    Note: Online resource; Title from title page (viewed December 2, 2012)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780124058651
    Language: English
    Pages: 1 online resource (370 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Human-Computer Interaction: An Empirical Research Perspective is the definitive guide to empirical research in HCI. The book begins with foundational topics including historical context, the human factor, interaction elements, and the fundamentals of science and research. From there, you'll progress to learning about the methods for conducting an experiment to evaluate a new computer interface or interaction technique. There are detailed discussions and how-to analyses on models of interaction, focusing on descriptive models and predictive models. Writing and publishing a research paper is explored with helpful tips for success. Throughout the book, you'll find hands-on exercises, checklists, and real-world examples. This is your must-have, comprehensive guide to empirical and experimental research in HCI—an essential addition to your HCI library. Master empirical and experimental research with this comprehensive, A-to-Z guide in a concise, hands-on reference Discover the practical and theoretical ins-and-outs of user studies Find exercises, takeaway points, and case studies throughout
    Note: Online resource; Title from title page (viewed December 31, 2012)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123851277
    Language: English
    Pages: 1 online resource (448 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Data Architecture: From Zen to Reality explains the principles underlying data architecture, how data evolves with organizations, and the challenges organizations face in structuring and managing their data. Using a holistic approach to the field of data architecture, the book describes proven methods and technologies to solve the complex issues dealing with data. It covers the various applied areas of data, including data modelling and data model management, data quality, data governance, enterprise information management, database design, data warehousing, and warehouse design. This text is a core resource for anyone customizing or aligning data management systems, taking the Zen-like idea of data architecture to an attainable reality. The book presents fundamental concepts of enterprise architecture with definitions and real-world applications and scenarios. It teaches data managers and planners about the challenges of building a data architecture roadmap, structuring the right team, and building a long term set of solutions. It includes the detail needed to illustrate how the fundamental principles are used in current business practice. The book is divided into five sections, one of which addresses the software-application development process, defining tools, techniques, and methods that ensure repeatable results. Data Architecture is intended for people in business management involved with corporate data issues and information technology decisions, ranging from data architects to IT consultants, IT auditors, and data administrators. It is also an ideal reference tool for those in a higher-level education process involved in data or information technology management. Presents fundamental concepts of enterprise architecture with definitions and real-world applications and scenarios Teaches data managers and planners about the challenges of building a data architecture roadmap, structuring the right team, and building a long term set of solutions Includes the detail needed to illustrate how the fundamental principles are used in current business practice
    Note: Online resource; Title from title page (viewed May 9, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123849205
    Language: English
    Pages: 1 online resource (424 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you'll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit. Describes next-generation data center architectures such as the virtual access-layer, the unified data center fabric and the "rack-and-roll" deployment model Provides an overview of cloud security and cloud management from the server virtualization perspective Presents real-world case studies, configuration and examples that allow you to easily apply practical know-how to your existing enterprise environment Offers effective private cloud computing solutions to simplify the costly and problematic challenge of enterprise networking and branch server consolidation
    Note: Online resource; Title from title page (viewed November 26, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123819734
    Language: English
    Pages: 1 online resource (256 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Entity Resolution and Information Quality presents topics and definitions, and clarifies confusing terminologies regarding entity resolution and information quality. It takes a very wide view of IQ, including its six-domain framework and the skills formed by the International Association for Information and Data Quality {IAIDQ). The book includes chapters that cover the principles of entity resolution and the principles of Information Quality, in addition to their concepts and terminology. It also discusses the Fellegi-Sunter theory of record linkage, the Stanford Entity Resolution Framework, and the Algebraic Model for Entity Resolution, which are the major theoretical models that support Entity Resolution. In relation to this, the book briefly discusses entity-based data integration (EBDI) and its model, which serve as an extension of the Algebraic Model for Entity Resolution. There is also an explanation of how the three commercial ER systems operate and a description of the non-commercial open-source system known as OYSTER. The book concludes by discussing trends in entity resolution research and practice. Students taking IT courses and IT professionals will find this book invaluable. First authoritative reference explaining entity resolution and how to use it effectively Provides practical system design advice to help you get a competitive advantage Includes a companion site with synthetic customer data for applicatory exercises, and access to a Java-based Entity Resolution program.
    Note: Online resource; Title from title page (viewed January 14, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123850171
    Language: English
    Pages: 1 online resource (480 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Information technology supports efficient operations, enterprise integration, and seamless value delivery, yet itself is too often inefficient, un-integrated, and of unclear value. This completely rewritten version of the bestselling Architecture and Patterns for IT Service Management, Resource Planning and Governance retains the original (and still unique) approach: apply the discipline of enterprise architecture to the business of large scale IT management itself. Author Charles Betz applies his deep practitioner experience to a critical reading of ITIL 2011, COBIT version 4, the CMMI suite, the IT portfolio management literature, and the Agile/Lean IT convergence, and derives a value stream analysis, IT semantic model, and enabling systems architecture (covering current topics such as CMDB/CMS, Service Catalog, and IT Portfolio Management). Using the concept of design patterns, the book then presents dozens of visual models documenting challenging problems in integrating IT management, showing how process, data, and IT management systems must work together to enable IT and its business partners. The edition retains the fundamental discipline of traceable process, data, and system analysis that has made the first edition a favored desk reference for IT process analysts around the world. This best seller is a must read for anyone charged with enterprise architecture, IT planning, or IT governance and management. Lean-oriented process analysis of IT management, carefully distinguished from an IT functional model Field-tested conceptual information model with definitions and usage scenarios, mapped to both the process and system architectures Integrated architecture for IT management systems Synthesizes Enterprise Architecture, IT Service Management, and IT Portfolio Management in a practical way
    Note: Online resource; Title from title page (viewed November 2, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123706041
    Language: English
    Pages: 1 online resource (552 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The polygon-mesh approach to 3D modeling was a huge advance, but today its limitations are clear. Longer render times for increasingly complex images effectively cap image complexity, or else stretch budgets and schedules to the breaking point. Comprised of contributions from leaders in the development and application of this technology, Point-Based Graphics examines it from all angles, beginning with the way in which the latest photographic and scanning devices have enabled modeling based on true geometry, rather than appearance. From there, it’s on to the methods themselves. Even though point-based graphics is in its infancy, practitioners have already established many effective, economical techniques for achieving all the major effects associated with traditional 3D Modeling and rendering. You’ll learn to apply these techniques, and you’ll also learn how to create your own. The final chapter demonstrates how to do this using Pointshop3D, an open-source tool for developing new point-based algorithms. The first book on a major development in computer graphics by the pioneers in the field Shows how 3D images can be manipulated as easily as 2D images are with Photoshop
    Note: Online resource; Title from title page (viewed May 4, 2011)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780124477513
    Language: English
    Pages: 1 online resource (968 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago. This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges. Covering a snapshot version of KAME dated April 2003 based on FreeBSD 4.8 Extensive line-by-line code listings with meticulous explanation of their rationale and use for the KAME snapshot implementation, which is generally applicable to most recent versions of the KAME IPv6 stack including those in recent releases of BSD variants Numerous diagrams and illustrations help in visualizing the implementation In-depth discussion of the standards provides intrinsic understanding of the specifications
    Note: Online resource; Title from title page (viewed August 3, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123704887
    Language: English
    Pages: 1 online resource (632 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: IT Manager's Handbook, Second Edition, provides essential information to help students understand the responsibilities of today’s IT Management professionals: not only planning network security and implementing disaster recovery plans, but also such vital tasks as creating budgets, administering compliance, and managing staff. In particular, the book discusses business practices that are most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendor. This updated version includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulatory compliance, and project management. Information is organized modularly so that instructors and students can delve directly into only the topics needed. Each chapter contains additional resources sections for books, articles, and websites relevant to that topic. It contains new material on key technology topics such as open source, outsourcing, offshoring, and handhelds, plus updated coverage of e-commerce, remote access, intranets, and LAN/WAN management. A completely updated and expanded second edition that provides practical, easily accessible management advice written specifically for new IT managers: · Brings you up to speed on those business practices most critical to effective IT operations: recruiting, budgeting, resource planning, managing personnel, and working with vendors. · Includes expanded coverage on such critical IT management topics as security, disaster recovery, storage, government/regulatory compliance, and project management. · Organizes information modularly so you can delve directly into only the topics that you need. · Provides a unique management perspective on those specific technical issues with the most significant business ramifications. · Includes new material on key technology topics such as open source, wireless, handhelds, outsourcing, offshoring, and operations, as well as updated coverage of e-commerce, remote access, intranets, and LAN/WAN management.
    Note: Online resource; Title from title page (viewed July 26, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123797513
    Language: English
    Pages: 1 online resource (900 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Is your memory hierarchy stopping your microprocessor from performing at the high level it should be? Memory Systems: Cache, DRAM, Disk shows you how to resolve this problem. The book tells you everything you need to know about the logical design and operation, physical design and operation, performance characteristics and resulting design trade-offs, and the energy consumption of modern memory hierarchies. You learn how to to tackle the challenging optimization problems that result from the side-effects that can appear at any point in the entire hierarchy. As a result you will be able to design and emulate the entire memory hierarchy. Understand all levels of the system hierarchy -Xcache, DRAM, and disk. Evaluate the system-level effects of all design choices. Model performance and energy consumption for each component in the memory hierarchy.
    Note: Online resource; Title from title page (viewed July 28, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123737441
    Language: English
    Pages: 1 online resource (352 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media. Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then Ethernet Networking for the Small Office and Professional Home Office will give you an in-depth understanding of the technology involved in an Ethernet network. One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms. In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided. This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected. Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks
    Note: Online resource; Title from title page (viewed July 28, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780120885688
    Language: English
    Pages: 1 online resource (624 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Effective Prototyping for Software Makers is a practical, informative resource that will help anyone—whether or not one has artistic talent, access to special tools, or programming ability—to use good prototyping style, methods, and tools to build prototypes and manage for effective prototyping. This book features a prototyping process with guidelines, templates, and worksheets; overviews and step-by-step guides for nine common prototyping techniques; an introduction with step-by-step guidelines to a variety of prototyping tools that do not require advanced artistic skills; templates and other resources used in the book available on the Web for reuse; clearly-explained concepts and guidelines; and full-color illustrations and examples from a wide variety of prototyping processes, methods, and tools. This book is an ideal resource for usability professionals and interaction designers; software developers, web application designers, web designers, information architects, information and industrial designers. * A prototyping process with guidelines, templates, and worksheets; * Overviews and step-by-step guides for 9 common prototyping techniques; * An introduction with step-by-step guidelines to a variety of prototyping tools that do not require advanced artistic skills; * Templates and other resources used in the book available on the Web for reuse; * Clearly-explained concepts and guidelines; * Full-color illustrations, and examples from a wide variety of prototyping processes, methods, and tools. * www.mkp.com/prototyping
    Note: Online resource; Title from title page (viewed July 19, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123704764
    Language: English
    Pages: 1 online resource (424 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: The Bayesian network is one of the most important architectures for representing and reasoning with multivariate probability distributions. When used in conjunction with specialized informatics, possibilities of real-world applications are achieved. Probabilistic Methods for BioInformatics explains the application of probability and statistics, in particular Bayesian networks, to genetics. This book provides background material on probability, statistics, and genetics, and then moves on to discuss Bayesian networks and applications to bioinformatics. Rather than getting bogged down in proofs and algorithms, probabilistic methods used for biological information and Bayesian networks are explained in an accessible way using applications and case studies. The many useful applications of Bayesian networks that have been developed in the past 10 years are discussed. Forming a review of all the significant work in the field that will arguably become the most prevalent method in biological data analysis. Unique coverage of probabilistic reasoning methods applied to bioinformatics data--those methods that are likely to become the standard analysis tools for bioinformatics. Shares insights about when and why probabilistic methods can and cannot be used effectively; Complete review of Bayesian networks and probabilistic methods with a practical approach.
    Note: Online resource; Title from title page (viewed June 12, 2009)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780080921945
    Language: English
    Pages: 1 online resource (875 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.
    Note: Online resource; Title from title page (viewed May 4, 2009)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123745156
    Language: English
    Pages: 1 online resource (544 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Why Programs Fail: A Guide to Systematic Debugging is proof that debugging has graduated from a black art to a systematic discipline. It demystifies one of the toughest aspects of software programming, showing clearly how to discover what caused software failures, and fix them with minimal muss and fuss. The fully updated second edition includes 100+ pages of new material, including new chapters on Verifying Code, Predicting Erors, and Preventing Errors. Cutting-edge tools such as FindBUGS and AGITAR are explained, techniques from integrated environments like Jazz.net are highlighted, and all-new demos with ESC/Java and Spec#, Eclipse and Mozilla are included. This complete and pragmatic overview of debugging is authored by Andreas Zeller, the talented researcher who developed the GNU Data Display Debugger(DDD), a tool that over 250,000 professionals use to visualize the data structures of programs while they are running. Unlike other books on debugging, Zeller's text is product agnostic, appropriate for all programming languages and skill levels. The book explains best practices ranging from systematically tracking error reports, to observing symptoms, reproducing errors, and correcting defects. It covers a wide range of tools and techniques from hands-on observation to fully automated diagnoses, and also explores the author's innovative techniques for isolating minimal input to reproduce an error and for tracking cause and effect through a program. It even includes instructions on how to create automated debugging tools. The text includes exercises and extensive references for further study, and a companion website with source code for all examples and additional debugging resources is available. The new edition of this award-winning productivity-booster is for any developer who has ever been frustrated by elusive bugs Brand new chapters demonstrate cutting-edge debugging techniques and tools, enabling readers to put the latest time-saving developments to work for them Learn by doing. New exercises and detailed examples focus on emerging tools, languages and environments, including AGITAR, FindBUGS, Python and Eclipse
    Note: Online resource; Title from title page (viewed July 22, 2009)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780123742544
    Language: English
    Pages: 1 online resource (448 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From cellular mobile telephony to the ubiquitous “WiFi networks in coffee-shops and airports, to the emerging WiMAX wireless broadband access networks, the menu of wireless access systems has become so comprehensive that wireline access to user devices may soon become a relic of the past. Wireless Networking serves as a one-stop view of cellular, WiFi, and WiMAX networks, as well as the emerging wireless ad hoc and sensor networks. Rather than provide descriptive accounts of these technologies and standards, the book emphasizes conceptual perspectives on the modeling, analysis, design and optimization of such networks. Furthermore, the authors present wireless networking within the unifying framework of resource allocation, using simple abstractions of the underlying physical wireless communication. In short, Wireless Networking is an in-depth, exhaustive, and invaluable asset to anyone working in this rapidly evolving field. Goes beyond descriptive and qualitative treatments, by presenting the foundations underlying the various wireless networking technologies Provides abstractions, models and analyses of established and emerging wireless networks, thereby supplying the reader with a conceptual and quantitative treatment, thus ensuring longevity of the learning from this material Aids comprehension by including over 120 figures, four appendices on the mathematics of the various models, several inline exercises, and extensive problem sets at the end of each chapter
    Note: Online resource; Title from title page (viewed May 9, 2008)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9781558608177
    Language: English
    Pages: 1 online resource (464 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are not limited by platform. This emerging field is now poised to become a cornerstone for new Web-based ubiquitous computing environments. Mobile Agents provides a practical introduction to mobile agent technology and surveys the state of the art in mobile agent research. Students and researchers can use the book as an introduction to the concepts and possibilities of this field and as an overview of ongoing research. Developers can use it to identify the capabilities of the technology to decide if mobile agents are the right solution for them. Practioners can also gain hands-on experience in programming mobile agents through exploration of the source code for a complete mobile agent environment available through the companion website. *Summarizes the state of the art in mobile agent research *Identifies the benefits and limitations of current mobile agent technology to help developers understand the possibilities of this new field *Extensive mobile agents web portal ( www.mobile-agents.org ) with the Java source code for a complete industrial-quality environment for mobile agents, with significant parts of the system open source
    Note: Online resource; Title from title page (viewed January 21, 2005)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9780120884070
    Language: English
    Pages: 1 online resource (560 pages)
    Edition: 2nd edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Data Mining, Second Edition, describes data mining techniques and shows how they work. The book is a major revision of the first edition that appeared in 1999. While the basic core remains the same, it has been updated to reflect the changes that have taken place over five years, and now has nearly double the references. The highlights of this new edition include thirty new technique sections; an enhanced Weka machine learning workbench, which now features an interactive interface; comprehensive information on neural networks; a new section on Bayesian networks; and much more. This text is designed for information systems practitioners, programmers, consultants, developers, information technology managers, specification writers as well as professors and students of graduate-level data mining and machine learning courses. Algorithmic methods at the heart of successful data mining—including tried and true techniques as well as leading edge methods Performance improvement techniques that work by transforming the input or output
    Note: Online resource; Title from title page (viewed July 13, 2005)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9781558607019
    Language: English
    Pages: 1 online resource (600 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Most Perl programmers were originally trained as C and Unix programmers, so the Perl programs that they write bear a strong resemblance to C programs. However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience. * Introduces powerful programming methodsnew to most Perl programmersthat were previously the domain of computer scientists * Gradually builds up confidence by describing techniques of progressive sophistication * Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods
    Note: Online resource; Title from title page (viewed March 31, 2005)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Morgan Kaufmann | Boston, MA : Safari
    ISBN: 9781558609358
    Language: English
    Pages: 1 online resource (704 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local ; Electronic books
    Abstract: Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test. Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the UCD process. This book is focused on the requirements gathering stage, which often receives less attention than usability testing, but is equally as important. Understanding user requirements is critical to the development of a successful product. Understanding Your Users is an easy to read, easy to implement, how-to guide on usability in the real world. It focuses on the "user requirements gathering" stage of product development and it provides a variety of techniques, many of which may be new to usability professionals. For each technique, readers will learn how to prepare for and conduct the activity, as well as analyze and present the data —all in a practical and hands-on way. In addition, each method presented provides different information about the user and their requirements (e.g., functional requirements, information architecture, task flows). The techniques can be used together to form a complete picture of the users’ requirements or they can be used separately to address specific product questions. These techniques have helped product teams understand the value of user requirements gathering by providing insight into how users work and what they need to be successful at their tasks. Case studies from industry-leading companies demonstrate each method in action. In addition, readers are provided with the foundation to conduct any usability activity (e.g., getting buy-in from management, legal and ethical considerations, setting up your facilities, recruiting, moderating activities) and to ensure the incorporation of the results into their products. ·Covers all of the significant requirements gathering methods in a readable, practical way ·Presents the foundation readers need to prepare for any requirements gathering activity and ensure that the results are incorporated into their products ·Includes invaluable worksheet and template appendices ·Includes a case study for each method from industry leaders ·Written by experienced authors who teach conference courses on this subject to usability professionals and new product designers alike
    Note: Online resource; Title from title page (viewed January 19, 2005)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...