Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks by Azzedine Boukerche (Editor)Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc networks, particularly algorithmic methods and distributed computing with mobility and computation capabilities. It covers everything readers need to build a foundation for the design of future mobile ad hoc networks: Establishing an efficient communication infrastructure Robustness control for network-wide broadcast The taxonomy of routing algorithms Adaptive backbone multicast routing The effect of inference on routing Routing protocols in intermittently connected mobile ad hoc networks and delay tolerant networks Transport layer protocols ACK-thinning techniques for TCP in MANETs Power control protocols Power saving in solar powered WLAN mesh networks Reputation and trust-based systems Vehicular ad hoc networks Cluster interconnection in 802.15.4 beacon enabled networks The book is complemented with a set of exercises that challenge readers to test their understanding of the material. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks is appropriate as a self-study guide for electrical engineers, computer engineers, network engineers, and computer science specialists. It also serves as a valuable supplemental textbook in computer science, electrical engineering, and network engineering courses at the advanced undergraduate and graduate levels.
Call Number: TK5105.77 .A44 2009
ISBN: 9780470383582
Publication Date: 2008-11-10
An Introduction to the Analysis of Algorithms by Michael SoltysThis textbook covers the mathematical foundations of the analysis of algorithms. The gist of the book is how to argue, without the burden of excessive formalism, that a given algorithm does what it is supposed to do. The two key ideas of the proof of correctness, induction, and invariance, are employed in the framework of pre/post-conditions and loop invariants. The algorithms considered are the basic and traditional algorithms of computer science, such as Greedy, Dynamic, and Divide & Conquer. In addition, two classes of algorithms that rarely make it into introductory textbooks are discussed. Randomized algorithms, which are now ubiquitous because of their applications to cryptography; and Online algorithms, which are essential in fields as diverse as operating systems (caching, in particular) and stock-market predictions. This self-contained book is intended for undergraduate students in computer science and mathematics.
Call Number: QA9.58 .S65 2010
ISBN: 9789814271400
Publication Date: 2009-10-01
Computing the Mind by Shimon EdelmanIn a culmination of humanity's millennia-long quest for self knowledge, the sciences of the mind are now in a position to offer concrete, empirically validated answers to the most fundamental questions about human nature. What does it mean to be a mind? How is the mind related to the brain? How are minds shaped by their embodiment and environment? What are the principles behind cognitive functions such as perception, memory, language, thought, and consciousness? By analyzing the tasks facing any sentient being that is subject to stimulation and a pressure to act, Shimon Edelman identifies computation as the common denominator in the emerging answers to all these questions. Any system composed of elements that exchange signals with each other and occasionally with the rest of the world can be said to be engaged in computation. A brain composed of neurons is one example of a system that computes, and the computations that the neurons collectively carry out constitute the brain's mind. Edelman presents a computational account of the entire spectrum of cognitive phenomena that constitutes the mind. He begins with sentience, and uses examples from visual perception to demonstrate that it must, at its very core, be a type of computation. Throughout his account, Edelman acknowledges the human mind's biological origins. Along the way, he also demystifies traits such as creativity, language, and individual and collective consciousness, and hints at how naturally evolved minds can transcend some of their limitations by moving to computational substrates other than brains. The account that Edelman gives in this book is accessible, yet unified and rigorous, and the big picture he presents is supported by evidence ranging from neurobiology to computer science. The book should be read by anyone seeking a comprehensive and current introduction to cognitive psychology.
Call Number: BF311 .E328 2008
ISBN: 9780195320671
Publication Date: 2008-09-08
Data Structures and Other Objects Using Java by Michael MainMichael Main's gentle approach to data structures and objects has introduced thousands of beginning programmers to foundational data structures using the practical Java language. This Third Edition makes the most of the enhancements and advantages of Java 5.0 including the use of generic data types. An early group of chapters reviews the key aspects of object-oriented programming giving students the foundation for understanding significant programming concepts. With this framework they are able to accomplish writing functional data structures by using a five-step method for working with data types; understanding the data type abstractly, writing a specification, using the data type, designing and implementing the data type, and analyzing the implementation. Students learn to think analytically about the efficiency and efficacy of design while gaining exposure to useful Java classes libraries. The flexibility of Data Structures and Other Objects Using Java allows instructors to structure their course around a certain emphasis, such as early coverage of recursion and sorting, or to accelerate the pace of the course.
Call Number: QA76.73.J38 M33 2006
ISBN: 0321375254
Publication Date: 2005-10-04
Distributed Computing by Faith Ellen Fich (Editor)DISC, the International Symposium on DIStributed Computing, is an annual conference for the presentation of research on the theory, design, analysis, implementation, and application of distributed systems and networks.DISC2003 was held on October 1-3, 2003 in Sorrento, Italy. There were 91 regular papers submitted to DISC this year. These were read and evaluated by the program committee members, assisted by external reviewers. The quality of submissions was high and we were unable to accept many deserving papers. Twenty-?ve papers were selected by the program committee to be included in these proceedings. It is expected that these papers will be submitted, in a more polished form, to fully refereed scienti?c journals. TheBestStudentPaperAwardwasselectedfromamongtheacceptedpapers that were not co-authored by any program committee members. This year, the award was given to Ittai Abraham for the paper "Probabilistic Quorums for Dynamic Systems," co-authored with Dahlia Malkhi. The support of the University of Salerno, Italy, and, in particular, its Dipartimento di Informatica ed Applicazioni is gratefully acknowledged. The review process and the preparation of this volume were done using CyberChair. I also thank Denise Lobo for her excellent help with these matters. October 2003 Faith Ellen Fich Organizing Committee Luigi Catuogno, University of Salerno, Italy Stelvio Cimato, University of Salerno, Italy Roberto De Prisco, University of Salerno, Italy and Akamai Technologies, USA (Chair) Barbara Masucci, University of Salerno, Italy DISC2003 was sponsored by the University of Salerno, Italy and, in particular, its Dipartimento di Informatica ed Applicazioni.
Call Number: QA76.9.D5 D438 2003
ISBN: 9783540201847
Publication Date: 2003-09-24
Distributed Search by Constrained Agents by Amnon MeiselsThe well defined model of distributed constraints satisfaction and optimization (DisCSPs/DisCOPs) can serve as the basis for the design and investigation of distributed search algorithms, of protocols and of negotiations and search. This book presents a comprehensive discussion on the field of distributed constraints, its algorithms and its active research areas. The book introduces distributed constraint satisfaction and optimization problems and describes the underlying model.
Introduction to Interval Computation by Gotz Alefeld; Jurgen HerzbergerThis book is revised and expanded version of the original German text. The arrangement of the material and the structure are essentially unchanged. All remarks in the Preface to the German Edition regarding naming conventions for formulas, theorems, lemmas, and definitions are still valid as are those concerning the arrangement and choice of material.
Call Number: QA297.75 .A3613 1983
ISBN: 0120498200
Publication Date: 1984-01-16
Networking by Jeffrey S. BeasleyNetworking Second Edition Jeffrey S. Beasley This text provides a comprehensive look at computer networking from the point of view of the network administrator. It guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet networks; router configuration; TCP/IP networks; local-, campus-, and wide-area network configuration; network security; optical networks; voice over IP; and industrial networks. Extensive examples on the Windows Server 2003/2008 configuration and system configuration for the Linux operating system are also included. A complete chapter is devoted to protecting and securing a network from potential network attacks. Topics include denial of service attacks, firewalls, intrusion detection, password cracking, packet sniffing, and analyzing unsecured data packets. Other key network security issues, such as configuring router access lists, configuring a virtual private network (VPN) connection, and securing wireless networks, are also covered. Router configuration is examined, ranging from an introduction to router configuration to configuring multiple routing protocols for intranet and Internet data traffic. Routing protocols key to basic network operations are examined, including static, RIP, IGRP, OSPF, EIGRP, and BGP. The discussions on routing protocols are accompanied with in-depth steps for configuring the router to run the protocol, verify operation, and troubleshoot the router. Key Pedagogical Features NET-CHALLENGE SOFTWARE provides a simulated, hands-on experience in configuring routers and switches. Exercises provided in the text and on the CD challenge readers to undertake certain router/switch network configuration tasks. The software has the look and feel of actually being connected to the router or switch console port. PROTOCOL ANALYZER SOFTWARE included with the text uses the Finisar Surveyor Demo. Examples of using the software to analyze data traffic are included throughout the text. ACCOMPANYING CD-ROM includes the Finisar Surveyor Demo software and captured data traffic used in the text, which enables readers to capture data traffic on their own networks. CONFIGURING, ANALYZING, or TROUBLESHOOTING sections are included with each chapter to guide the reader through advanced techniques in networking. OBJECTIVES and INTRODUCTION at the beginning of each chapter clearly outline specific goals for the reader. EXTENSIVE PROBLEM SETS, SUMMARIES, and QUESTIONS AND PROBLEMS (including Critical Thinking questions) are found at the end of each chapter. KEY TERMS and their definitions are highlighted in the margins to foster inquisitiveness and ensure retention.
Call Number: TK5105.5 .B43 2009
ISBN: 9780131358386
Publication Date: 2008-09-03
Numerical Issues in Statistical Computing for the Social Scientist by Micah Altman; Jeff Gill; Michael P. McDonaldAt last -- a social scientist's guide through the pitfalls of modern statistical computing Addressing the current deficiency in the literature on statistical methods as they apply to the social and behavioral sciences, Numerical Issues in Statistical Computing for the Social Scientist seeks to provide readers with a unique practical guidebook to the numerical methods underlying computerized statistical calculations specific to these fields. The authors demonstrate that knowledge of these numerical methods and how they are used in statistical packages is essential for making accurate inferences. With the aid of key contributors from both the social and behavioral sciences, the authors have assembled a rich set of interrelated chapters designed to guide empirical social scientists through the potential minefield of modern statistical computing. Uniquely accessible and abounding in modern-day tools, tricks, and advice, the text successfully bridges the gap between the current level of social science methodology and the more sophisticated technical coverage usually associated with the statistical field. Highlights include a focus on problems occurring in maximum likelihood estimation Integrated examples of statistical computing (using software packages such as the SAS, Gauss, Splus, R, Stata, LIMDEP, SPSS, WinBUGS, and MATLAB®) A guide to choosing accurate statistical packages. Discussions of a multitude of computationally intensive statistical approaches such as ecological inference, Markov chain Monte Carlo, and spatial regression analysis. Emphasis on specific numerical problems, statistical procedures, and their applications in the field. Replications and re-analysis of published social science research, using innovative numerical methods. Key numerical estimation issues along with the means of avoiding common pitfalls. A related Web site includes test data for use in demonstrating numerical problems, code for applying the original methods described in the book, and an online bibliography of Web resources for statistical computation. Designed as an independent research tool, a professional reference, or a classroom supplement, the book presents a well-thought-out treatment of a complex and multifaceted field.
Call Number: QA276.4 .A398 2004
ISBN: 0471236330
Publication Date: 2003-12-18
Probability with R by Jane M. HorganA Complete Introduction to probability AND its computer Science Applications USING R Probability with R serves as a comprehensive and introductory book on probability with an emphasis on computing-related applications. Real examples show how probability can be used in practical situations, and the freely available and downloadable statistical programming language R illustrates and clarifies the book's main principles. Promoting a simulation- and experimentation-driven methodology, this book highlights the relationship between probability and computing in five distinctive parts: The R Language presents the essentials of the R language, including key procedures for summarizing and building graphical displays of statistical data. Fundamentals of Probability provides the foundations of the basic concepts of probability and moves into applications in computing. Topical coverage includes conditional probability, Bayes' theorem, system reliability, and the development of the main laws and properties of probability. Discrete Distributions addresses discrete random variables and their density and distribution functions as well as the properties of expectation. The geometric, binomial, hypergeometric, and Poisson distributions are also discussed and used to develop sampling inspection schemes. Continuous Distributions introduces continuous variables by examining the waiting time between Poisson occurrences. The exponential distribution and its applications to reliability are investigated, and the Markov property is illustrated via simulation in R. The normal distribution is examined and applied to statistical process control. Tailing Off delves into the use of Markov and Chebyshev inequalities as tools for estimating tail probabilities with limited information on the random variable. Numerous exercises and projects are provided in each chapter, many of which require the use of R to perform routine calculations and conduct experiments with simulated data. The author directs readers to the appropriate Web-based resources for installing the R software package and also supplies the essential commands for working in the R workspace. A related Web site features an active appendix as well as a forum for readers to share findings, thoughts, and ideas. With its accessible and hands-on approach, Probability with R is an ideal book for a first course in probability at the upper-undergraduate and graduate levels for readers with a background in computer science, engineering, and the general sciences. It also serves as a valuable reference for computing professionals who would like to further understand the relevance of probability in their areas of practice.
Call Number: QA76.9.M35 H863 2009
ISBN: 9780470280737
Publication Date: 2008-11-10
Professional XNA Game Programming by Benjamin NitschkeYou haven't experienced the full potential of Xbox 360 or Windows until you've created your own homebrewed games for these innovative systems. With Microsoft's new XNA Framework, the only thing limiting you is your imagination. Now professional game developer and Microsoft DirectX MVP Benjamin Nitschke shows you how to take advantage of the XNA Game Studio Express tools and libraries in order to build cutting-edge games. Whether you want to explore new worlds or speed down a city block in a souped-up dragster, this book will get you up and running quickly. You'll learn how to implement 3D models, generate huge landscapes, map cool-looking shaders to your 3D objects, and much more. Nitschke also steps you through the development of your first fully functional racing game. You'll then be able to apply this information as you write your own XNA cross-platform games. What you will learn from this book Tricks for managing the game engine and user interface How to program an old school shooter game and space adventure Tips for improving racing game logic and expanding your game ideas Methods for integrating amazing visual effects using advanced shader techniques Steps for adding sound and music with XACT-bringing your game to life How to fine-tune and debug your game for optimal performance Who this book is for This book is for anyone who wants to write their own games for the Xbox 360 or Windows platforms. You should have some experience coding with C# or a similar .NET language. Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.
Call Number: QA76.76.C672 N58 2007
ISBN: 9780470126776
Publication Date: 2007-04-30
Scheduling for Parallel Processing by Maciej DrozdowskiOverview and Goals This book is dedicated to scheduling for parallel processing. Presenting a research ?eld as broad as this one poses considerable dif?culties. Scheduling for parallel computing is an interdisciplinary subject joining many ?elds of science and te- nology. Thus, to understand the scheduling problems and the methods of solving them it is necessary to know the limitations in related areas. Another dif?culty is that the subject of scheduling parallel computations is immense. Even simple search in bibliographical databases reveals thousands of publications on this topic. The - versity in understanding scheduling problems is so great that it seems impossible to juxtapose them in one scheduling taxonomy. Therefore, most of the papers on scheduling for parallel processing refer to one scheduling problem resulting from one way of perceiving the reality. Only a few publications attempt to arrange this ?eld of knowledge systematically. In this book we will follow two guidelines. One guideline is a distinction - tween scheduling models which comprise a set of scheduling problems solved by dedicated algorithms. Thus, the aim of this book is to present scheduling models for parallel processing, problems de?ned on the grounds of certain scheduling models, and algorithms solving the scheduling problems. Most of the scheduling problems are combinatorial in nature. Therefore, the second guideline is the methodology of computational complexity theory. Inthisbookwepresentfourexamplesofschedulingmodels. We will go deep into the models, problems, and algorithms so that after acquiring some understanding of them we will attempt to draw conclusions on their mutual relationships.
From Airline Reservations to Sonic the Hedgehog by Martin Campbell-KellyA business history of the software industry from the days of custom programming to the age of mass-market software and video games. From its first glimmerings in the 1950s, the software industry has evolved to become the fourth largest industrial sector of the US economy. Starting with a handful of software contractors who produced specialized programs for the few existing machines, the industry grew to include producers of corporate software packages and then makers of mass-market products and recreational software. This book tells the story of each of these types of firm, focusing on the products they developed, the business models they followed, and the markets they served. By describing the breadth of this industry, Martin Campbell-Kelly corrects the popular misconception that one firm is at the center of the software universe. He also tells the story of lucrative software products such as IBM's CICS and SAP's R/3, which, though little known to the general public, lie at the heart of today's information infrastructure.With its wealth of industry data and its thoughtful judgments, this book will become a starting point for all future investigations of this fundamental component of computer history.
ISBN: 9780262033039
Publication Date: 2003-01-27
The International Handbook of Computer Security by Jae ShimThis book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures -- data preservation and protection -- hardware and software protection -- personnel management and security -- network security -- contingency planning -- legal and auditing planning and control and more.
ISBN: 9780814405796
Publication Date: 2000-07-03
Level of Detail for 3D Graphics by David Luebke; Martin Reddy; Jonathan D. Cohen; Amitabh Varshney; Benjamin Watson; Robert HuebnerLevel of detail (LOD) techniques are increasingly used by professional real-time developers to strike the balance between breathtaking virtual worlds and smooth, flowing animation. Level of Detail for 3D Graphics brings together, for the first time, the mechanisms, principles, practices, and theory needed by every graphics developer seeking to apply LOD methods. Continuing advances in level of detail management have brought this powerful technology to the forefront of 3D graphics optimization research. This book, written by the very researchers and developers who have built LOD technology, is both a state-of-the-art chronicle of LOD advances and a practical sourcebook, which will enable graphics developers from all disciplines to apply these formidable techniques to their own work.
Practical Linux by Que Corporation Staff; Drew Streib; Tony Guntharp; Michael TurnerThis work gears itself toward people who don't want to be burdened with techno-babble, but just want to use Linux as they would any other operating system. It covers all the bases, making use of a systematic approach, while providing cross-references. Topics include working with the KDE and Gnome desktops, using the command line, getting help and maintaining your system, connecting to the Web, using browsers, setting up e-mail, setting up printers and adding peripherals, using graphics and multimedia tools, and networking.