Search

Current filters:

Current filters:

Author

Subject

Date issued

Has File(s)

Search Results

Results 21-30 of 39 (Search time: 0.087 seconds).
  • Authors: Jørgen Hole, Kjell;  Advisor: -;  Co-Author: - (2016)

    This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix’s media streaming solut...

  • Authors: Mitra, Pinaki;  Advisor: -;  Co-Author: - (2018)

    Introductory Chapter: Recent Advances in Cryptography and Network Security, Chapter 2: A New Approximation Method for Constant Weight Coding and Its Hardware Implementation. Chapter 3: Protocol for Multiple Black Hole Attack Avoidance in Mobile Ad Hoc Networks. Chapter 4: A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication.

  • Authors: Gebhardt, Eveline; Hillman, Kylie; Thomson, Sue; Ainley, John;  Advisor: -;  Co-Author: - (2019)

    This open access book presents a systematic investigation into internationally comparable data gathered in ICILS 2013. It identifies differences in female and male students’ use of, perceptions about, and proficiency in using computer technologies. Teachers’ use of computers, and their perceptions regarding the benefits of computer use in education, are also analyzed by gender. When computer technology was first introduced in schools, there was a prevailing belief that information and communication technologies were ‘boys’ toys’; boys were assumed to have more positive attitudes toward using computer technologies. As computer technologies have become more established throughout societies, gender gaps in students’ computer and information literacy appear to be closing, although st...

  • Authors: Langtangen, Hans Petter; Linge, Svein;  Advisor: -;  Co-Author: - (2017)

    This easy-to-read book introduces the basics of solving partial differential equations by means of finite difference methods. Unlike many of the traditional academic works on the topic, this book was written for practitioners. Accordingly, it especially addresses: the construction of finite difference schemes, formulation and implementation of algorithms, verification of implementations, analyses of physical behavior as implied by the numerical solutions, and how to apply the methods and software to solve problems in the fields of physics and biology.

  • Authors: Gruhn, Volker; Striemer, Rüdige;  Advisor: -;  Co-Author: - (2018)

    This open access book includes contributions by leading researchers and industry thought leaders on various topics related to the essence of software engineering and their application in industrial projects. It offers a broad overview of research findings dealing with current practical software engineering issues and also pointers to potential future developments. Celebrating the 20th anniversary of adesso AG, adesso gathered some of the pioneers of software engineering including Manfred Broy, Ivar Jacobson and Carlo Ghezzi at a special symposium, where they presented their thoughts about latest software engineering research and which are part of this book. This way it offers readers a concise overview of the essence of software engineering, providing valuable insights into the ...

  • Authors: Brown, James;  Advisor: -;  Co-Author: - (2015)

    Living in a networked world means never really getting to decide in any thoroughgoing way who or what enters your “space” (your laptop, your iPhone, your thermostat . . . your home). With this as a basic frame-of-reference, James J. Brown’s Ethical Programs examines and explores the rhetorical potential and problems of a hospitality ethos suited to a new era of hosts and guests. Brown reads a range of computational strategies and actors, from the general principles underwriting the Transmission Control Protocol (TCP), which determines how packets of information can travel through the internet, to the Obama election campaign’s use of the power of protocols to reach voters, harvest their data, incentivize and, ultimately, shape their participation in the campaign. In demonstrating the...

  • Authors: Feeney, Kevin; Davies, Jim; Welch, James;  Advisor: -;  Co-Author: - (2018)

    To be effective, data-intensive systems require extensive ongoing customisation to reflect changing user requirements, organisational policies, and the structure and interpretation of the data they hold. Manual customisation is expensive, time-consuming, and error-prone. In large complex systems, the value of the data can be such that exhaustive testing is necessary before any new feature can be added to the existing design. In most cases, the precise details of requirements, policies and data will change during the lifetime of the system, forcing a choice between expensive modification and continued operation with an inefficient design.Engineering Agile Big-Data Systems outlines an approach to dealing with these problems in software and data engineering, describing a methodology fo...

  • Authors: Morelli, Ralph; Walde, Ralph;  Advisor: -;  Co-Author: - (2016)

    "We have designed this third edition of Java, Java, Java to be suitable for a typical Introduction to Computer Science (CS1) course or for a slightly more advanced Java as a Second Language course. This edition retains the “objects first” approach to programming and problem solving that was characteristic of the first two editions. Throughout the text we emphasize careful coverage of Java language features, introductory programming concepts, and object-oriented design principles. The third edition retains many of the features of the first two editions, including: Early Introduction of Objects Emphasis on Object Oriented Design (OOD) Unified Modeling Language (UML) Diagrams Self-study Exercises with Answers Programming, Debugging, and Design Tips. From the Java Library Sec...

  • Authors: Manovich, Lev;  Advisor: -;  Co-Author: - (2013)

    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Software has replaced a diverse array of physical, mechanical, and electronic technologies used before 21st century to create, store, distribute and interact with cultural artifacts. It has become our interface to the world, to others, to our memory and our imagination - a universal language through which the world speaks, and a universal engine on which the world runs. What electricity and combustion engine were to the early 20th century, software is to the early 21st century. Offering the the first theoretical and historical account of software for media authoring and its effects on the practice and the very concept of 'media,' the author of The Lan...

  • Authors: Reussner, Ralf; Goedicke, Michael;  Advisor: -;  Co-Author: - (2019)

    This open access book presents the outcomes of the “Design for Future – Managed Software Evolution” priority program 1593, which was launched by the German Research Foundation (“Deutsche Forschungsgemeinschaft (DFG)”) to develop new approaches to software engineering with a specific focus on long-lived software systems. The different lifecycles of software and hardware platforms lead to interoperability problems in such systems. Instead of separating the development, adaptation and evolution of software and its platforms, as well as aspects like operation, monitoring and maintenance, they should all be integrated into one overarching process. Accordingly, the book is split into three major parts, the first of which includes an introduction to the nature of software evolution, follow...