Angebote zu "International" (122 Treffer)

Introduction to the Theory of Computation, Inte...
€ 64.99 *
ggf. zzgl. Versand

Gain a clear understanding of even the most complex, highly theoretical computational theory topics in the approachable presentation found only in the market-leading INTRODUCTION TO THE THEORY OF COMPUTATION, 3E, International Edition. The number one choice for today´s computational theory course, this revision continues the book´s well-known, approachable style with timely revisions, additional practice, and more memorable examples in key areas. A new first-of-its-kind theoretical treatment of deterministic context-free languages is ideal for a better understanding of parsing and LR grammars. You gain a solid understanding of the fundamental mathematical properties of computer hardware, software, and applications with a blend of practical and philosophical coverage and mathematical treatments, including advanced theorems and proofs. INTRODUCTION TO THE THEORY OF COMPUTATION, 3E, International Edition´s comprehensive coverage makes this a valuable reference for your continued studies in theoretical computing.

Anbieter: buecher.de
Stand: Oct 7, 2018
Zum Angebot
Algorithm Design: Pearson New International Edi...
€ 82.99 *
ggf. zzgl. Versand

August 6, 2009 Author, Jon Kleinberg, was recently cited in the New York Times for his statistical analysis research in the Internet age. Algorithm Design introduces algorithms by looking at the real-world problems that motivate them. The book teaches students a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the role of algorithms in the broader field of computer science. Features + Benefits Focus on problem analysis and design techniques. Discussion is grounded in concrete problems and examples rather than abstract presentation of principles, with representative problems woven throughout the text. Over 200 well crafted problems from companies such as Yahoo!® and Oracle®. Each problem has been class tested for usefulness and accuracy in the authors´ own undergraduate algorithms courses. Broad coverage of algorithms for dealing with NP-hard problems and the application of randomization, increasingly important topics in algorithms. Algorithm Design Jon Kleinberg and Eva Tardos Table of Contents 1 Introduction: Some Representative Problems 1.1 A First Problem: Stable Matching 1.2 Five Representative Problems Solved Exercises Excercises Notes and Further Reading 2 Basics of Algorithms Analysis 2.1 Computational Tractability 2.2 Asymptotic Order of Growth Notation 2.3 Implementing the Stable Matching Algorithm using Lists and Arrays 2.4 A Survey of Common Running Times 2.5 A More Complex Data Structure: Priority Queues Solved Exercises Exercises Notes and Further Reading 3 Graphs 3.1 Basic Definitions and Applications 3.2 Graph Connectivity and Graph Traversal 3.3 Implementing Graph Traversal using Queues and Stacks 3.4 Testing Bipartiteness: An Application of Breadth-First Search 3.5 Connectivity in Directed Graphs 3.6 Directed Acyclic Graphs and Topological Ordering Solved Exercises Exercises Notes and Further Reading 4 Divide and Conquer 4.1 A First Recurrence: The Mergesort Algorithm 4.2 Further Recurrence Relations 4.3 Counting Inversions 4.4 Finding the Closest Pair of Points 4.5 Integer Multiplication 4.6 Convolutions and The Fast Fourier Transform Solved Exercises Exercises Notes and Further Reading 5 Greedy Algorithms 5.1 Interval Scheduling: The Greedy Algorithm Stays Ahead 5.2 Scheduling to Minimize Lateness: An Exchange Argument 5.3 Optimal Caching: A More Complex Exchange Argument 5.4 Shortest Paths in a Graph 5.5 The Minimum Spanning Tree Problem 5.6 Implementing Kruskal´s Algorithm: The Union-Find Data Structure 5.7 Clustering 5.8 Huffman Codes and the Problem of Data Compression *5.9 Minimum-Cost Arborescences: A Multi-Phase Greedy Algorithm Solved Exercises Excercises Notes and Further Reading 6 Dynamic Programming 6.1 Weighted Interval Scheduling: A Recursive Procedure 6.2 Weighted Interval Scheduling: Iterating over Sub-Problems 6.3 Segmented Least Squares: Multi-way Choices 6.4 Subset Sums and Knapsacks: Adding a Variable 6.5 RNA Secondary Structure: Dynamic Programming Over Intervals 6.6 Sequence Alignment 6.7 Sequence Alignment in Linear Space 6.8 Shortest Paths in a Graph 6.9 Shortest Paths and Distance Vector Protocols *6.10 Negative Cycles in a Graph Solved Exercises Exercises Notes and Further Reading 7 Network Flow 7.1 The Maximum Flow Problem and the Ford-Fulkerson Algorithm 7.2 Maximum Flows and Minimum Cuts in a Network 7.3 Choosing Good Augmenting Paths *7.4 The Preflow-Push Maximum Flow Algorithm 7.5 A First Application: The Bipartite Matching Problem 7.6 Disjoint Paths in Directed and Undirected Graphs 7.7 Extensions to the Maximum Flow Problem 7.8 Survey Design 7.9 Airline Scheduling 7.10 Image Segmentation 7.11 Project Selection 7.12 Baseball Elimination *7.13 A Further Direction: Adding Costs to the Matching Problem Solved Exercises Exercises Notes and Further Reading 8 NP and Computational Intractability 8.1 Polynomial-Time Reductions 8.2 Reductions via ´´Gadgets´´: The Satisfiability Problem 8.3 Efficient Certification and the Definition of NP 8.4 NP-Complete Problems 8.5 Sequencing Problems 8.6 Partitioning Problems 8.7 Graph Coloring 8.8 Numerical Problems 8.9 Co-NP and the Asymmetry of NP 8.10 A Partial Taxonomy of Hard Problems Solved Exercises Exercises Notes and Further Reading 9 PSPACE: A Class of Problems Beyond NP 9.1 PSPACE 9.2 Some Hard Problems in PSPACE 9.3 Solving Quantified Problems and Games in Polynomial Space 9.4 Solving the Planning

Anbieter: buecher.de
Stand: Oct 7, 2018
Zum Angebot
Database Systems: Pearson New International Edi...
€ 88.99 *
ggf. zzgl. Versand

For Database Systems and Database Design and Application courses offered at the junior, senior and graduate levels in Computer Science departments. Written by well-known computer scientists, this introduction to database systems offers a comprehensive approach, focusing on database design, database use, and implementation of database applications and database management systems. The first half of the book provides in-depth coverage of databases from the point of view of the database designer, user, and application programmer. It covers the latest database standards SQL:1999, SQL/PSM, SQL/CLI, JDBC, ODL, and XML, with broader coverage of SQL than most other texts. The second half of the book provides in-depth coverage of databases from the point of view of the DBMS implementor. It focuses on storage structures, query processing, and transaction management. The book covers the main techniques in these areas with broader coverage of query optimization than most other texts, along with advanced topics including multidimensional and bitmap indexes, distributed transactions, and information integration techniques. Resources: Open access Author Website ¿http://infolab.stanford.edu/~ullman/dscb.html ¿includes Power Point slides, teaching notes, assignments, projects, Oracle Programming Guidelines, and solutions to selected exercises. Instructor only Pearson Resources: Complete Solutions Manual (click on the Resources tab above to view downloadable files) Features + Benefits Many real-world examples. Offers a readable and engaging presentation. Extensive treatment of database modeling?Includes detailed and separate explanations of how to use E/R and ODL to design databases. Teaches about this important first step of the planning process. Excellent, up-to-date and detailed coverage of SQL?Includes coverage of object-relational systems and many aspects of the new SQL:1999 standard. Provides a more extensive treatment of query processing than other books on the market. Discussion of the technologies used to connect database programming with C or Java code?Includes discussions of SQL/PSM, SQL/CLI, and JDBC. Gives students practical advice on integrating state-of-the-art technologies with databases. Coverage of advanced issues important to database designers and users. Includes discussions of views, integrity constraints, assertions, triggers, transactions, authorization, and recursion in SQL:1999. Discussions of how to successfully plan a database application before building it. Reflects how these plans are developed in the real world. Coverage of topics such as designing storage structures and implementing a variety of indexing schemes. Shows students how to build efficient database management systems. Extensive coverage of query processing and optimization. Shows students how to fine tune database systems to improve performance. Comprehensive coverage of transaction processing mechanisms for concurrency control and recovery, including distributed and long-duration transactions. Shows how to design complex database systems that can handle real-world business applications. Coverage of information integration, including data warehousing, mediation, OLAP, data-cube systems, and data mining. Exposes readers to cutting edge technology used in business applications. Extensive exercises?In almost every section. Provides students with the opportunity to practice and apply the concepts they´ve learned in each chapter. Please note that GOAL/Gradiance is no longer available with this book. TABLE OF CONTENTS 1 The Worlds of Database Systems 1.1 The Evolution of Database Systems 1.1.1 Early Database Management Systems 1.1.2 Relational Database Systems 1.1.3 Smaller and Smaller Systems 1.1.4 Bigger and Bigger Systems 1.1.5 Information Integration 1.2 Overview of a Database Management System 1.2.1 Data-Definition Language Commands 1.2.2 Overview of Query Processing 1.2.3 Storage and Buffer Management 1.2.4 Transaction Processing 1.2.5 The Query Processor 1.3 Outline of Database-System Studies 1.4 References for Chapter 1 PART I: Relational Database Modeling 2 The Relational Model of Data 2.1 An Overview of Data Models 2.1.1 What is a Data Model? 2.1.2 Important Data Models 2.1.3 The Relational Model in Brief 2.1.4 The Semistructured Model in Brief 2.1.5 Other Data Models 2.1.6 Comparison of Modeling Approaches 2.2 Basics of the Relational Model 2.2.1 Attributes 2.2.2 Schemas 2.2.3 Tuples 2.2.4 Domains 2.2.5 Equivalent Representations of a

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Introduction to Computer Security: Pearson New ...
€ 48.99 *
ggf. zzgl. Versand

For computer-security courses that are taught at the undergraduate level and that have as their sole prerequisites an introductory computer science sequence (e.g., CS 1/CS 2). A new Computer Security textbook for a new generation of IT professionals. Unlike most other computer security textbooks available today, Introduction to Computer Security, 1e does NOT focus on the mathematical and computational foundations of security, and it does not assume an extensive background in computer science. Instead it looks at the systems, technology, management, and policy side of security, and offers students fundamental security concepts and a working knowledge of threats and countermeasures with ?just-enough? background in computer science. The result is a presentation of the material that is accessible to students of all levels. Features + Benefits Accessible to the general-knowledge reader. Authors Goodrich and Tamassia recognize that prerequisites for an extensive background in CS and mathematics are not only unnecessary for learning but also arguably contribute to a reduction in enrollments and a shortage of computer-security experts. Therefore, the authors assume only the most basic of prerequisite knowledge in computing, making this text suitable for beginning computer science majors, as well as computer science minors and non-majors. Teaches general principles of computer security from an applied viewpoint. In this new text, the authors cover specific computer security topics while providing necessary material on the foundations of computing needed to understand these topics. As a result, students learn about vital computer security topics such as access control, firewalls, and viruses as well as a variety of fundamental computer-science concepts like algorithms, operating systems, networking, and programming languages. Topics covered include: o Common cyberattacks including viruses, worms, Trojan horses, password crackers, keystroke loggers, denial of service, spoofing, and phishing. o Techniques for identifying and patching vulnerabilities in machines and networks as well methods for detecting and repairing infected systems. o Fundamental building blocks of secure systems such as encryption, fingerprints, digital signatures and basic cryptographic protocols. o Human and social aspects of computer security, including usability, interfaces, copyright, digital rights management, social engineering, and ethical issues. A practical introduction that will prepare students for careers in a variety of fields. This text encourages students to think about security issues and to deploy security mechanisms early in designing software applications or in making software purchase/ deployment decisions. This skill will be appreciated by future employers--who may include corporations in the financial, healthcare and technology sectors--for whom the security of software applications is a critical requirement. The material in the text will also provide readers with a clear understanding of the security ramifications of using computers and the Internet in their daily lives (e.g., for online banking and shopping), as well as the potential threats to individual privacy (as seen in recent debates on electronic voting, for example), and possibly to democracy itself, that may arise from inappropriate use of computer security technology. Projects The authors provide a collection of creative, hands-on projects at three levels of difficulty that can be used both in computer security and computer security-related courses. A wide set of options will allow instructors to customize the projects to suit a variety of learning modes and lab resources. In each project, students are given a realistic, though simplified, version of a working system with multiple vulnerabilities and a list of allowed attack vectors. They may be asked to work in ?break-it? mode, which will require students to attack a system by developing exploits that take advantage of the discovered vulnerabilities, or they may be asked to work in ?fix-it? mode in which the student hardens the system by developing mechanisms for removing or mitigating the vulnerabilities. SUPPLEMENTS A collection of slide presentations created by the authors each suitable for a one-hour lecture, covering all the course topics. The presentations will include links to relevant resources on the web and will have extensive notes. The slide presentations have been created in a standard file format compatible

Anbieter: buecher.de
Stand: Oct 11, 2018
Zum Angebot
Scrum versus Wasserfallmodell. Methoden des Pro...
€ 13.99 *
ggf. zzgl. Versand

Studienarbeit aus dem Jahr 2016 im Fachbereich Informatik - Wirtschaftsinformatik, Note: 1,3, Internationale Fachhochschule Bad Honnef - Bonn, Sprache: Deutsch, Abstract: Kein Projekt ist wie das andere. Dadurch wird das Planen und Steuern deutlich erschwert. Um Projekte dennoch erfolgreich zu managen, existieren Regelwerke, die einen Leitfaden zur Durchführung bereitstellen. Die Regelwerke reduzieren die Komplexität und geben so dem Projektverantwortlichen ein Hilfsmittel zur erfolgreichen Projektdurchführung an die Hand. Es werden Standards des allgemeinen Ablaufs, der einzelnen Prozessschritte, der beteiligten Personen und der entstehenden Artefakte beschrieben, um das Projekt übersichtlicher und handhabbarer zu gestalten. Diese Regelwerke nennt man Projektmanagementmethoden. In der Softwareentwicklung haben sich vor allem zwei Methoden herauskristallisiert, die in dieser Arbeit näher beleuchtet werden sollen - das klassische Wasserfallmodell und der agile Scrum-Ansatz. Das Wasserfallmodell wurde 1970 von Winston W. Royce entwickelt und seither immer weiterentwickelt. Es stammt ursprünglich aus dem Bau- und Produktionsprozess. In beiden Bereichen ist es wichtig, eine gute Planung zu Beginn zu machen, da Änderungen im Nachgang oft teuer und schwer umzusetzen sind. Die dort verwendeten Prozesse wurden einfach für Softwareentwicklung übernommen. Die Vorgehensweise stieß aber im Softwareentwicklungsprozess an ihre Grenzen. So wurden neue Methoden entwickelt, die die Schwächen des Wasserfallmodells beseitigen sollten. Eine davon ist Scrum. Scrum wurde zu Beginn der 1990er Jahre gemeinsam von Ken Schwaber und Jeff Sutherland erarbeitet und beschrieben. Ihr Ziel war es Softwareprodukte schneller und flexibler zu entwickeln, um so IT-Projekte erfolgreicher abzuschließen. Scrum ist ein Rahmenwerk, das aufgrund seiner innovativen Methode verspricht den Softwareprozess schlank und effizient zu gestalten. Doch ist Scru

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Basiswissen Medizinische Software
€ 42.90 *
ggf. zzgl. Versand

Im gesamten Medizinbereich gewinnt Software als eigenständiges Produkt oder als Komponente eines Produktes zunehmend an Bedeutung. Entwickler, Auditoren, Betreiber und Anwender stehen vor einer ganzen Reihe von Herausforderungen, um diese Produkte sicher zu entwickeln, zu bewerten und zu verwenden. Der ´´Certified Professional for Medical Software´´ (CPMS) ist eine internationale Initiative mit dem Ziel, einen einheitlichen Standard für die Aus- und Weiterbildung von Personen zu schaffen, die mit der Entwicklung und Qualitätssicherung von Software betraut sind, die im medizinischen Bereich Verwendung findet. Eingeführt wurde das CPMSZertifikat vom ´´International Certified Professional for Medical Software Board e.V.´´ (ICPMSB). Dieses Buch beschreibt den gesamten Lebenszyklus von Software als Medizinprodukt. Es deckt den kompletten CPMS-Lehrplan (Foundation Level) ab und ergänzt ihn durch weitere Informationen. Behandelt werden im Einzelnen: - Rechtliche Grundlagen - Qualitätsmanagement (ISO 13485) - Risikomanagement und -analyse (ISO 14971) - Best Practices des Software Engineering (IEC 62304) - Gebrauchstauglichkeit (Benutzungsschnittstellen und IEC 62366) - Dokumentenmanagement - Medizinische Informatik Das Buch eignet sich zur individuellen Vorbereitung auf die Zertifizierungsprüfung und als Begleitliteratur zu den entsprechenden Vorbereitungsschulungen. Die 2. Auflage wurde komplett überarbeitet und beinhaltet den aktuellen Stand der Normen und Richtlinien für die Medizintechnik.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Software Quality Engineering
€ 39.90 *
ggf. zzgl. Versand

QUALITÄT IST UNVERZICHTBAR! - Lernen Sie die Prinzipien, Methoden und Techniken in Sachen Software-Qualität umfassend kennen und anwenden. - Erfahren Sie, wie Sie Software-Qualität in Ihrem Unternehmen und in Ihren Software-Projekten verbessern und verankern können. - Ideal für die Vorbereitung auf die Zertifizierung zum Certified Software Quality Engineer (CSQ) bzw. zum Quality Assurance Management Professional (QAMP). - Basiert auf den standardisierten Wissenssammlungen für Software-Qualität der ASQ und der JSQC - Im Internet: Praktische Hilfsmittel, Checklisten und aktuelle Informationen rund um das Thema des Buches unter www.itq.ch/Downloads Die Erstellung und Wartung von Software ist eine Schlüsselkompetenz des 21. Jahrhunderts. Quer durch alle Branchen basiert der Geschäftserfolg von Unternehmen zu einem ganz erheblichen Teil auf dem Einsatz von Software in ihren Produkten, Anlagen und Systemen. Keine Frage also, dass Unternehmen davon abhängig sind, dass die von ihnen eingesetzte oder entwickelte Software eine exzellente Qualität aufweisen muss. Ernest Wallmüller zeigt in seinem Praxisleitfaden, wie Sie bessere Software-Qualität erzielen können. Dafür nimmt er sich das Dreieck der Einflussfaktoren ´Mensch - Prozess - Technik´ vor. Er erläutert, mit welchen Methoden Sie die Qualität der Entwicklungs- und Serviceprozesse in den Griff bekommen. Sie erfahren, wie Sie sicherstellen können, dass die Produktqualität stimmt. Und es geht um wichtige organisatorische und menschliche Aspekte. Außerdem erfahren Sie, wie Sie Qualität messen und verbessern, Sie lernen organisationsweite Qualitätsmanagementsysteme, Best-Practice-Modelle und Standards kennen. Berücksichtigt werden erstmals die internationalen Bodies of Knowledge (BoK) für Software Quality Engineering des ASQ sowie des JSQC.Systemvoraussetzungen für eBook-inside: Internet-Verbindung und eBookreader Adobe Digital Editions. Ein Buch für alle IT- und Software-Qualitätsmanager, Testmanager, IT-Manager, Software-Entwickler und -Architekten, Dozenten und Studenten der Informatik und Wirtschaftsinformatik. Eines der wenigen deutschsprachigen Werke, das die Software-Qualitätssicherung im Umfeld des Software Engineering umfassend und tiefgreifend darstellt. Es ist als vollständiges Nachschlagewerk ein ausgezeichneter Ratgeber für jeden, der Qualitätssicherung von Software betreiben oder einführen will. Das Buch dient auch als qualifizierte Lernunterlage für all jene, die sich im praxisorientierten Software Engineering fortbilden wollen.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
OR 2.0 Context-Aware Operating Theaters, Comput...
€ 53.99 *
ggf. zzgl. Versand

This book constitutes the refereed joint proceedings of the First International Workshop on OR 2.0 Context-Aware Operating Theaters, OR 2.0 2018, 5th International Workshop on Computer Assisted Robotic Endoscopy, CARE 2018, 7th International Workshop on Clinical Image-Based Procedures, CLIP 2018, and the First International Workshop on Skin Image Analysis, ISIC 2018, held in conjunction with the 21st International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 11 full papers presented at OR 2.0 2018, the 5 full papers presented at CARE 2018, the 8 full papers presented at CLIP 2018, and the 10 full papers presented at ISIC 2018 were carefully reviewed and selected. The OR 2.0 papers cover a wide range of topics such as machine vision and perception, robotics, surgical simulation and modeling, multi-modal data fusion and visualization, image analysis, advanced imaging, advanced display technologies, human-computer interfaces, sensors. The CARE papers cover topics to advance the field of computer-assisted and robotic endoscopy. The CLIP papers cover topics to fill gaps between basic science and clinical applications. The ISIC papers cover topics to facilitate knowledge dissemination in the field of skin image analysis, as well as to host a melanoma detection challenge, raising awareness and interest for these socially valuable tasks.

Anbieter: buecher.de
Stand: Oct 7, 2018
Zum Angebot
Rules and Reasoning
€ 53.99 *
ggf. zzgl. Versand

This book constitutes the proceedings of the International Joint Conference on Rules and Reasoning, RuleML+RR 2018, held in Luxembourg during September 2018. This is the second conference of a new series, joining the efforts of two existing conference series, namely ´´RuleML´´ (International Web Rule Symposium) and ´´RR´´ (Web Reasoning and Rule Systems). The 10 full research papers presented together with 5 long technical communications and 7 short papers were carefully reviewed and selected from 33 submissions.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot
Dependable Software Engineering. Theories, Tool...
€ 41.99 *
ggf. zzgl. Versand

This book constitutes the proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2018, held in Beijing, China, in September 2018. The 9 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The purpose of SETTA is to provide an international forum for researchers and practitioners to share cutting-edge advancements and strengthen collaborations in the field of formal methods and its interoperability with software engineering for building reliable, safe, secure, and smart systems.

Anbieter: buecher.de
Stand: Sep 25, 2018
Zum Angebot