Computer science Books

2289 products


  • Pastoral Virtues for Artificial Intelligence:

    Lexington Books Pastoral Virtues for Artificial Intelligence:

    Out of stock

    Book SynopsisPastoral Virtues for Artificial Intelligence (AI) acknowledges that human destiny is intimately tied to artificial intelligence. AI already outperforms a person on most tasks. Our ever-deepening relationship with an AI that is increasingly autonomous mirrors our relationship to what is perceived as Sacred or Divine. Like God, AI awakens hope and fear in people, while giving life to some and taking livelihood, especially in the form of jobs, from others. AI, built around values of convenience, productivity, speed, efficiency, and cost reduction, serve humanity poorly, especially in moments that demand care and wisdom. This book explores the pastoral virtues of hope, patience, play, wisdom, and compassion as foundational to personal flourishing, communal thriving, and building a robust AI. Biases of determinism, speed, objectivity, ignorance, and apathy within AI's algorithms are identified. These biases can be minimized through the incorporation of pastoral virtues as values guiding AI.Trade ReviewMany scholars in various fields and disciplines talk about and advocate for intersectionality, but, when they do so, they almost never include technology as an area for consideration, despite the fact that technology is one of the most central forces in our lives today. Jaco Hamman demonstrates why this is so needed, providing a rigorous analysis that is broad and deep, immensely important, and endlessly fascinating. Timely, creative, and insightful. -- Nathan Carlin, McGovern Medical SchoolJaco Hamman has written an original, thought-provoking, inter-discilplinary and highly creative book about a theme that will continue to engage humanity in the decades to come. Exploring the intersection of technology, humanity, and the resources of various scholarly disciplines and tradtions, he discloses new and surprising ways to think about our relationship with AI, drawing on well-known resources to open to new perspectives. This well-researched book points to a new context for old virtues, and should be read by everyone who wants to develop a more wise perspective on new AI technologies and their moral impact. -- Jan-Olav Henriksen, MF Norwegian School of TheologyProfessor Hamman artfully engages psychological, ethical, and theological intersections in this conversation with the frontiers of AI. While he accomplishes this with notable sophistication and breadth, his distinctive lens of pastoral theology and its commitment to the nurture of human flourishing characterizes this work throughout making it a truly distinctive contribution. The importance of this work cannot be overstated as AI “develops toward independence and autonomy.” His thoughtfully articulated “pastoral virtues” of wisdom and compassion are a necessity in these times. -- Keith G. Meador, Vanderbilt UniversityIn this daring and wide-ranging book, Jaco Hamman examines AI using a virtue ethics perspective, a novel and fascinating contribution to the growing literature on AI. Avoiding the extremes of neo-Luddism and naïve techno-optimism, Hamman offers pastoral guidance that users and designers of new technologies alike would be wise to consider. In the ease with which he integrates works in science, philosophy, theology, and other sources, Hamman exemplifies the kind of interdisciplinary dialogue that he rightly calls for in the book’s conclusion and that is so urgently needed today. -- Kyle E. Karches, St. Louis UniversityIn Pastoral Virtues for Artificial Intelligence, Jaco Hamman has thought deeply about what it means to be human in our technological world. A wise guide, his writing invites AI programmers and pastoral theologians—and all readers who care about the intersections between human life and technology—to imagine our future together. Most helpful are the analytical frameworks and questions developed in each chapter to structure rich conversation. Hamman offers five virtues (hope, patience, play, wisdom, and compassion) that can help us avoid idol worship of AI and cultivate human flourishing as we move further into technology. -- Michael S. Koppel, Wesley Theological SeminaryJaco Hamman has written an important book that evenhandedly addresses the hopes and fears of a partnership with an increasingly independent, autonomous, and powerful AI. The fact that AI is changing everything, in particular the very nature of human life, is a fact of no small importance for both AI researchers and for pastoral theologians. By creatively introducing pastoral virtues as a guide for navigating the new terrain, it is hoped that the field of pastoral theology will see that our ever-deepening relationship with digital technology demands immediate and robust pastoral theological reflection. -- Kirk A. Bingaman, Fordham UniversityTable of ContentsPrefaceAcknowledgmentsIntroductionChapter 1 Hope: Acting now and waiting upon a preferred futureChapter 2 Patience: Discovering time and remaining presentChapter 3 Play: Finding possibility and unlocking potentialChapter 4 Wisdom: Foreseeing consequences and doing the right thingChapter 5 Compassion: Witnessing and being moved to relieve suffering ConclusionReferencesIndexAbout the Author

    Out of stock

    £72.90

  • Open Source Software for Statistical Analysis of

    IGI Global Open Source Software for Statistical Analysis of

    1 in stock

    Book SynopsisWith the development of computing technologies in today's modernized world, software packages have become easily accessible. Open source software, specifically, is a popular method for solving certain issues in the field of computer science. One key challenge is analyzing big data due to the high amounts that organizations are processing. Researchers and professionals need research on the foundations of open source software programs and how they can successfully analyze statistical data.Open Source Software for Statistical Analysis of Big Data: Emerging Research and Opportunities provides emerging research exploring the theoretical and practical aspects of cost-free software possibilities for applications within data analysis and statistics with a specific focus on R and Python. Featuring coverage on a broad range of topics such as cluster analysis, time series forecasting, and machine learning, this book is ideally designed for researchers, developers, practitioners, engineers, academicians, scholars, and students who want to more fully understand in a brief and concise format the realm and technologies of open source software for big data and how it has been used to solve large-scale research problems in a multitude of disciplines.

    1 in stock

    £186.00

  • IT Auditing Using a System Perspective

    IGI Global IT Auditing Using a System Perspective

    Out of stock

    Book SynopsisAs the power of computing continues to advance, companies have become increasingly dependent on technology to perform their operational requirements and to collect, process, and maintain vital data. This increasing reliance has caused information technology (IT) auditors to examine the adequacy of managerial control in information systems and related operations to assure necessary levels of effectiveness and efficiency in business processes. In order to perform a successful assessment of a business's IT operations, auditors need to keep pace with the continued advancements being made in this field. IT Auditing Using a System Perspective is an essential reference source that discusses advancing approaches within the IT auditing process, as well as the necessary tasks in sufficiently initiating, inscribing, and completing IT audit engagement. Applying the recommended practices contained in this book will help IT leaders improve IT audit practice areas to safeguard information assets more effectively with a concomitant reduction in engagement area risks. Featuring research on topics such as statistical testing, management response, and risk assessment, this book is ideally designed for managers, researchers, auditors, practitioners, analysts, IT professionals, security officers, educators, policymakers, and students seeking coverage on modern auditing approaches within information systems and technology.

    Out of stock

    £999.99

  • Encyclopedia of Data Science and Machine Learning

    IGI Global Encyclopedia of Data Science and Machine Learning

    1 in stock

    Book SynopsisBig data and machine learning are driving the Fourth Industrial Revolution. With the age of big data upon us, we risk drowning in a flood of digital data. Big data has now become a critical part of both the business world and daily life, as the synthesis and synergy of machine learning and big data has enormous potential. Big data and machine learning are projected to not only maximize citizen wealth, but also promote societal health. As big data continues to evolve and the demand for professionals in the field increases, access to the most current information about the concepts, issues, trends, and technologies in this interdisciplinary area is needed. The Encyclopedia of Data Science and Machine Learning examines current, state-of-the-art research in the areas of data science, machine learning, data mining, and more. It provides an international forum for experts within these fields to advance the knowledge and practice in all facets of big data and machine learning, emphasizing emerging theories, principals, models, processes, and applications to inspire and circulate innovative findings into research, business, and communities. Covering topics such as benefit management, recommendation system analysis, and global software development, this expansive reference provides a dynamic resource for data scientists, data analysts, computer scientists, technical managers, corporate executives, students and educators of higher education, government officials, researchers, and academicians.

    1 in stock

    £3,477.00

  • IGI Global Theoretical and Conceptual Frameworks in ICT

    Out of stock

    Book SynopsisResearch that is based on appropriate theoretical or conceptual frameworks ensures valid and credible research objectives and the production of relevant results that complement existing literature on a research problem. Innovative and relevant knowledge is produced using appropriate theories and concepts. Despite the importance of theoretical and conceptual frameworks to research, many researchers have difficulties applying them appropriately in their research. Researchers in information systems have limited exposure to theories of societal and human development that should guide them in applying their knowledge of information systems to address real-world problems. Theoretical and Conceptual Frameworks in Information Systems Research presents a collection of practical case applications of theoretical and conceptual frameworks in information systems research. It guides researchers of information systems to explore and use appropriate theoretical frameworks. This book further tests different theories and frameworks and recommends their effectiveness and improvement and identifies context-specific theoretical and conceptual frameworks. Covering topics such as decision electronic health record implementation, institution management, and technology adoption, this premier reference source is an essential resource for policymakers, educators and advanced-level students of higher education, information systems professionals, librarians, researchers, and academicians.

    Out of stock

    £123.00

  • Deep Learning with PyTorch Lightning: Swiftly

    Packt Publishing Limited Deep Learning with PyTorch Lightning: Swiftly

    Out of stock

    Book SynopsisBuild, train, deploy, and scale deep learning models quickly and accurately, improving your productivity using the lightweight PyTorch WrapperKey Features Become well-versed with PyTorch Lightning architecture and learn how it can be implemented in various industry domains Speed up your research using PyTorch Lightning by creating new loss functions, networks, and architectures Train and build new algorithms for massive data using distributed training Book DescriptionPyTorch Lightning lets researchers build their own Deep Learning (DL) models without having to worry about the boilerplate. With the help of this book, you'll be able to maximize productivity for DL projects while ensuring full flexibility from model formulation through to implementation. You'll take a hands-on approach to implementing PyTorch Lightning models to get up to speed in no time.You'll start by learning how to configure PyTorch Lightning on a cloud platform, understand the architectural components, and explore how they are configured to build various industry solutions. Next, you'll build a network and application from scratch and see how you can expand it based on your specific needs, beyond what the framework can provide. The book also demonstrates how to implement out-of-box capabilities to build and train Self-Supervised Learning, semi-supervised learning, and time series models using PyTorch Lightning. As you advance, you'll discover how generative adversarial networks (GANs) work. Finally, you'll work with deployment-ready applications, focusing on faster performance and scaling, model scoring on massive volumes of data, and model debugging.By the end of this PyTorch book, you'll have developed the knowledge and skills necessary to build and deploy your own scalable DL applications using PyTorch Lightning.What you will learn Customize models that are built for different datasets, model architectures, and optimizers Understand how a variety of Deep Learning models from image recognition and time series to GANs, semi-supervised and self-supervised models can be built Use out-of-the-box model architectures and pre-trained models using transfer learning Run and tune DL models in a multi-GPU environment using mixed-mode precisions Explore techniques for model scoring on massive workloads Discover troubleshooting techniques while debugging DL models Who this book is forThis deep learning book is for citizen data scientists and expert data scientists transitioning from other frameworks to PyTorch Lightning. This book will also be useful for deep learning researchers who are just getting started with coding for deep learning models using PyTorch Lightning. Working knowledge of Python programming and an intermediate-level understanding of statistics and deep learning fundamentals is expected.Table of ContentsTable of Contents PyTorch Lightning Adventure Getting Off the Ground with Your First Deep Learning Model Transfer Learning Using Pre-Trained Models Ready-to- Use Models from Bolts Time Series Models Deep Generative Models Semi-Supervised Learning Self-Supervised Learning Deploying and Scoring Models Scaling and Managing Training

    Out of stock

    £999.99

  • Aprende a Programar en Python Para Principiantes:

    1 in stock

    £14.99

  • Data Rights Law 3.0: The Legislative Prospect

    Peter Lang International Academic Publishers Data Rights Law 3.0: The Legislative Prospect

    Out of stock

    Book SynopsisWith a global view and a vision of our digital future, we should move forward with an understanding of data rights legislation at pace. The earlier we set the value norms around data in this digital long distance race, the more likely we will grasp the opportunities therein and embrace a future of commonly understood values. With a view to the future, the branch of Chinese law that is most likely to lead the world is that related to the digital economy. At the same time, if China wants to be amongst the world’s leading digital economies, the basics to be understood and promoted most are higher quality, fairer and more sustainable institutional protection for data rights and subject-relevant interests, and the ability to offer systematic and accurate legal rules within the various digital disciplines.Table of ContentsContents: Value Orientation of Data Rights Legislation – Core Topics of Data Rights Legislation – Difficulties in Data Rights Legislation – Institutional Innovations in Data Rights Legislation – Comparison of Data Rights Legislation Models – Data Rights Law: Timeliness and Rebalance – Postscript – Interpretations of Internet Information and Data- Related Clauses in the Civil Code – List of Foreign Laws and Regulations Concerning Data Protection.

    Out of stock

    £55.08

  • Azure Data Engineer Associate Certification

    Packt Publishing Limited Azure Data Engineer Associate Certification

    2 in stock

    Book SynopsisBecome well-versed with data engineering concepts and exam objectives to achieve Azure Data Engineer Associate certificationKey Features Understand and apply data engineering concepts to real-world problems and prepare for the DP-203 certification exam Explore the various Azure services for building end-to-end data solutions Gain a solid understanding of building secure and sustainable data solutions using Azure services Book DescriptionAzure is one of the leading cloud providers in the world, providing numerous services for data hosting and data processing. Most of the companies today are either cloud-native or are migrating to the cloud much faster than ever. This has led to an explosion of data engineering jobs, with aspiring and experienced data engineers trying to outshine each other.Gaining the DP-203: Azure Data Engineer Associate certification is a sure-fire way of showing future employers that you have what it takes to become an Azure Data Engineer. This book will help you prepare for the DP-203 examination in a structured way, covering all the topics specified in the syllabus with detailed explanations and exam tips. The book starts by covering the fundamentals of Azure, and then takes the example of a hypothetical company and walks you through the various stages of building data engineering solutions. Throughout the chapters, you'll learn about the various Azure components involved in building the data systems and will explore them using a wide range of real-world use cases. Finally, you'll work on sample questions and answers to familiarize yourself with the pattern of the exam.By the end of this Azure book, you'll have gained the confidence you need to pass the DP-203 exam with ease and land your dream job in data engineering.What you will learn Gain intermediate-level knowledge of Azure the data infrastructure Design and implement data lake solutions with batch and stream pipelines Identify the partition strategies available in Azure storage technologies Implement different table geometries in Azure Synapse Analytics Use the transformations available in T-SQL, Spark, and Azure Data Factory Use Azure Databricks or Synapse Spark to process data using Notebooks Design security using RBAC, ACL, encryption, data masking, and more Monitor and optimize data pipelines with debugging tips Who this book is forThis book is for data engineers who want to take the DP-203: Azure Data Engineer Associate exam and are looking to gain in-depth knowledge of the Azure cloud stack.The book will also help engineers and product managers who are new to Azure or interviewing with companies working on Azure technologies, to get hands-on experience of Azure data technologies. A basic understanding of cloud technologies, extract, transform, and load (ETL), and databases will help you get the most out of this book.Table of ContentsTable of Contents Introducing Azure Basics Designing a Data Storage Structure Designing a Partition Strategy Designing the Serving Layer Implementing Physical Data Storage Structures Implementing Logical Data Structures Implementing the Serving Layer Ingesting and Transforming Data Designing and Developing a Batch Processing Solution Designing and Developing a Stream Processing Solution Managing Batches and Pipelines Designing Security for Data Policies and Standards Monitoring Data Storage and Data Processing Optimizing and Troubleshooting Data Storage and Data Processing Sample Questions with Solutions

    2 in stock

    £37.99

  • Epidemic modelling - Some notes, maths, and code

    Independent Publishing Network Epidemic modelling - Some notes, maths, and code

    1 in stock

    Book Synopsis

    1 in stock

    £15.29

  • Law, Economics and Cyberspace: The Effects of

    Edward Elgar Publishing Ltd Law, Economics and Cyberspace: The Effects of

    Out of stock

    Book SynopsisThis book argues that the Internet revolution should exert a far more significant influence on economic thinking and on the perception of law. The authors acknowledge that the economic analysis of law provides a potentially powerful framework for evaluating regulatory approaches to the Internet. However, they question the capacity of traditional law and economics models to define the scope of legal intervention, both in cyberspace and in other more traditional markets which have also been influenced by the recent technological revolution.The book examines the conventional application of law and economics, and contends that the new reality of cyberspace transforms the basic theoretical tenets of this approach and requires fresh conceptual thinking. It challenges fundamental concepts such as the notion of work as linked to the workplace, the notion of community as linked to geographical space, the sources of law and their traditional connection with the state, the belief that proxies and representatives are indispensable for collective action and public decision-making processes, and the role of technology and its relationship with the law. It covers the analysis of both economic and non-economic markets, and includes a thorough examination of legislation, case law and the academic literature relating to cyberspace. The authors conclude that there is pressing need for re-evaluating the analytical tools used to study the information environment, and propose an innovative approach for the role of technology within the law and economics framework.This book represents a groundbreaking attempt to critically analyze the suitability of traditional law and economics for the new digital environment. Scholars and students working in the field of law and economics, and lawyers interested in technology, intellectual property, cyberlaw and governance will find this a stimulating and thought-provoking volume.Trade Review'[This book] provides an excellent overview for anyone interested in this topic. Complex concepts are defined with great precision, and discussed with enlightening clarity. The arguments are well-built. The style is inviting.' -- Boris Rotenberg, World Trade Review'This book is not only the best kind of law and economics, but it is the best kind of cyberspace law and economics. By framing the economic analysis around market failures, the authors demonstrate both the power and limits of economic analysis. And by applying this method to questions about the regulation of cyberspace, they provide the most illuminating analysis of this new space of social behavior. Beautifully and directly written, this book is a must for any student of law and economics, and for any student of the 21st century.' -- Lawrence Lessig, Stanford Law School, USTable of ContentsContents: Preface Part I: Setting the Grounds 1. Introduction 2. Cyberspace in Context Part II: Cyberspace as a Market and its Failures 3. Introduction to Part Two 4. Monopolies 5. Public Goods 6. Imperfect Information 7. Externalities 8. Transaction Costs and the Law in Cyberspace Part III: Cyberspace and the Economic Theory of the State 8. Preliminary Thoughts About Neo-Institutional Law and Economics and Cyberspace 9. The Effects of Cyberspace of the Economic Theory of the State References Index

    Out of stock

    £89.30

  • E-Marketing: Marketing 04.03

    John Wiley and Sons Ltd E-Marketing: Marketing 04.03

    Out of stock

    Book SynopsisFast track route to mastering all aspects of e-marketing Covers all the key techniques for successful e-marketing, fromaffiliation marketing to e-mail alerts, and from viral marketing tobanner ads Examples and lessons from some of the world's most successfulbusinesses, including Hotmail, Pepsi and Honda, and ideas from thesmartest thinkers, including Christopher Locke and Seth Godin Includes a glossary of key concepts and a comprehensive resourcesguide ExpressExec is a unique business resource of one hundred books.These books present the best current thinking and span the entirerange of contemporary business practice. Each book gives you thekey concepts behind the subject and the techniques to implement theideas effectively, together with lessons from benchmark companiesand ideas from the world's smartest thinkers. ExpressExec is organised into ten core subject areas making iteasy to find the information you need: 01 Innovation 02 Enterprise 03 Strategy 04 Marketing 05 Finance 06 Operations and Technology 07 Organizations 08 Leading 09 People 10 Life and Work ExpressExec is a perfect learning solution for people who need tomaster the latest business thinking and practice quickly.Table of ContentsIntroduction to E-Marketing What is E-Marketing? The Evolution of E-Marketing The E-Dimension The Global Dimension The State of the Art E-Marketing in Practice: Success Stories Key Concepts and Thinkers Resources Ten Steps to making E-Marketing Work

    Out of stock

    £9.89

  • The Postdigital Membrane

    Intellect Books The Postdigital Membrane

    Out of stock

    Book SynopsisTo what extent is our time characterised by the ‘digital’? Does it announce a bright new age of technological progress, or is it not much more than a marketing tag for manufacturers? What is clear is that much of the cultural theory we have so far accumulated is showing signs of strain as it struggles to cope with the global dynamics of the ‘wired world’. This book offers a timely intellectual strategy that may help us comprehend the contradictions and apparent paradoxes of our immediate cultural climate. Using the metaphor of an organic membrane to show how things can be both separate and connected, The Postdigital Membrane explores the triad of imagination, technology and desire as they play upon each other – and us. In doing so it tries to offer fresh insights into the deeper problems of intelligence, reality and being human in order to map the emerging consciousness of the postdigital age.Table of ContentsIntroduction 1. PROPOSITION: Technology is the tangible expression of desire motivating human imagination to modify reality 2. PROPOSITION: My awareness extends to, and consists in, those things of which I am aware 3. PROPOSITION: Histories, like predictions and superstitions, are narratives of human imagination 4. PROPOSITION: Language is a technology through which human desire is satisfied and generated 5.PROPOSITION: The distinctions between the words ‘human’ and ‘machine’, and between humans and machines, lose validity as meanings mutate in response to imagination and desire. 6. PROPOSITION: The practice of art consists in arranging matter so as to add (extra) significance to it. 7. PROPOSITION: The idea that livings things consist of organised energy is disavowed by conventional science. 8. PROPOSITION: A recording is part of what it records 9. PROPOSITION: Technology can permit limited quantities of specific human energy to be recorded, stored and consumed 10. PROPOSITION: The categories of logic, reason and the binary are absorbed and transcended in the postdigital membrane

    Out of stock

    £27.50

  • Computers and Typography: Volume 2

    Intellect Books Computers and Typography: Volume 2

    Out of stock

    Book SynopsisThis volume reflects the developments in the rapidly-changing field of typography for computer interface design. Presented as a series of integrated case studies and interviews, the book covers: the skills needed for quality website design; the impact of computers upon publishing and coroprate design; the use of computers within the educational field; the progress of child-orientated typefaces; and issues in screen layout when designing educational and training software.Trade Review"Praise for Computers and Typography Vol. 1:...Make no mistake - a genuine revolution is taking place. The voices recorded in this volume are its protagonists and witnesses.' - Douglas Williamson, Logos 'There is so little available [literature] that deals with type design...in conjunction with computers. Sassoon's book is one answer to this.' - R. Johnson, Writing & Computers 'An exceptionally wide range of articles discussing the impact of computers on typography. I recommend it to all who want an accessible introduction to the issues involved.' - Ewan Clayton, The Scribe"

    Out of stock

    £27.50

  • Computers and Art: Second Edition

    Intellect Books Computers and Art: Second Edition

    Out of stock

    Book SynopsisComputers and Art provides insightful perspectives on the use of the computer as a tool for artists. The approaches taken vary from its historical, philosophical and practical implications to the use of computer technology in art practice. The contributors include an art critic, an educator, a practising artist and a researcher. Mealing looks at the potential for future developments in the field, looking at both the artistic and the computational aspects of the field.

    Out of stock

    £27.50

  • Futures Past: Thirty Years of Arts Computing

    Intellect Books Futures Past: Thirty Years of Arts Computing

    Out of stock

    Book SynopsisEleven contributors to this volume reflect upon the unprecedented ways in which digital media have been transforming art practice, study and education. The authors – researchers, teachers, custodians of art collections and picture libraries, and an artist – cover a wide range of issues, arguing for a more profound understanding of digital culture. With the benefit of hindsight it is now possible to look at futures past and assess the disparities between earlier visions of the future and reality. Frank accounts are given of projects which had promised great advances but failed to deliver, and others that have not only survived but continue to flourish. Another account demonstrates how an individual can make a difference to students’ learning by applying new technologies in a very pragmatic way. One of the most exciting advancements hinted at in this volume are the ways in which communities of interest are developing shared resources and cultivating a richer use of common vocabulary and standards to transmit an abundance of knowledge and experience. A look forward to the Semantic Web promises an even wider sharing of knowledge.Trade Review"This collection is a worthy edition to any art history, digital art, or teaching practice collection." - Brett Aggersberg, The Higher Education Academy website "Futures Past clarifies part of what is at stake as the computer's effects continue to ripple through art and art-scholarship. This perspective alone justifies the book's exploration, but Futures Past goes beyond this mark raising questions that will occupy the philosophers of our fields and future historians for some time to come." - Kristina Luce, www.academici.com "The papers collected in this book are very interesting and worth pondering [... and] cover almost all possible angles on which we can imagine the relationships between Arts and Computers.[...] it is very much worth reading." - Bernardo Nicoletti, www.academici.comTable of ContentsPart One: 'Experimental Interaction, Chapter 1: 'Painting Digital, Letting Go' - Page 5 - James Faure Walker Chapter 2: 'Microanalysis as a Means to Mediate Digital Arts' - Page 13 - Matthias Weiss Chapter 3: 'Indexed Lights' - Page 25 - Pierre R. Auborion Part Two: 'Educating with Computers, Chapter 4: 'A Computer in the Art Room' - Page 31 - Catherine Mason Chapter 5: 'Learning Resources for Teaching History of Art in Higher Education' - Page 43 - Jutta Vinaent Part Three: 'Projects and Archives: Histories and Resurgence, Chapter 6: 'Sourcing the Index: Iconography and it Debt to Photography' - Page 55 - Colum Hourihane Chapter 7: 'The Medium was the Method: Photography and Iconography at the Index of Christian Art' - Page 63 - Andrew E. Hershberger Chapter 8: 'The Good, The Bad and the Accessible: Thirty Years of Using New Technologies in BIAD Archives' - Page 77 - Sian Everitt Part Four: 'Online Information: Looking Back and Looking Forward, Chapter 9: 'Object Information at the Victoria and Albert Museum: Successes and Failures in Web Delivery' - Page 87 - Melanie Rowntree Chapter 10: 'This is the Modern World: Collaborating with ARTstor' - Page 103 - Vickie O'Riordan Chapter 11: 'Towards a Semantic Web: The Role of Ontologies in the Literary Domain' - Page 109 - Luciani Bordoni

    Out of stock

    £27.50

  • Computing Archaeology for Understanding the Past - CAA 2000 - Computer Applications and Quantitative Methods in Archaeology: Computer Applications and Quantitative Methods in Archaeology: Proceedings of the 28th Conference, Ljubljana, April

    BAR Publishing Computing Archaeology for Understanding the Past - CAA 2000 - Computer Applications and Quantitative Methods in Archaeology: Computer Applications and Quantitative Methods in Archaeology: Proceedings of the 28th Conference, Ljubljana, April

    15 in stock

    Book SynopsisA series of 51 papers forming the Proceedings of the 28th CAA Conference held at Ljubljana, Slovenia in 2000 focusing on computer applications and quantative methods in European and American archaeology.

    15 in stock

    £89.30

  • Information Systems and the Economics of

    Edward Elgar Publishing Ltd Information Systems and the Economics of

    Out of stock

    Book SynopsisThis book identifies and discusses critical issues of ICT innovation at both the macroeconomic and organisational levels, bringing together two hitherto independent fields of study: economics and information systems. The book takes stock of these two fields, highlighting their complementarity in contemporary issues such as business competitiveness and e-commerce, organisational change and industrial restructuring, information systems implementation and technology infrastructure building. The contributions cover a broad range of issues, from analysing policy approaches for fostering ICT innovation at a regional level, to examining the way in which ICT-based information systems and organisational practice are simultaneously shaped.The book elaborates an understanding of innovation as shaped largely in context, rather than 'diffused' from the place of its conception into the place of its implementation. The theoretical perspectives offered by the authors include institutional economics, evolutionary economics, social constructivism, and structuration theory. Collectively, the chapters of this book present ICT innovation as a dynamic process involving multiple actors in multiple locations, codified and tacit knowledge, and instrumental and situated behaviour.This pathbreaking book will be of enormous interest to students, researchers and academics specialising in economics, information systems and ICT innovation, as well as policy and management consultants involved in information systems and development.Table of ContentsContents: Preface Introduction Part I: Infrastructures, Awareness Building and Development of Capabilities 1. The Evolution of the Information Society and Regional Development in Europe 2. Development and Telecommunications Access: Cases from South Asia 3. The Computer Sciences Academic Community and the Diffusion of Internet in Brazil 4. IT Diffusion for Public Service Delivery: Looking for Plausible Theoretical Approaches Part II: ICT Adoption 5. ICT Adoption in Small and Medium-Sized Enterprises: Lessons from Case Studies 6. Understanding the Adoption of E-Commerce 7. Institutional and Resource-based Perspectives of IT and Organizational Change: Cases from the Nigerian Banking Industry Part III: Innovation in the Organizational Setting of ICT Use 8. New Socio-technical Perspectives of IS Innovation in Organizations 9. Information Systems and New Technologies: Taking Shape in Use 10. Perspectives on ICT Innovation and Organizational Context Conclusions Index

    Out of stock

    £94.05

  • Technological Transitions and System Innovations:

    Edward Elgar Publishing Ltd Technological Transitions and System Innovations:

    Out of stock

    Book SynopsisThis important book addresses how long term and large scale shifts from one socio-technical system to another come about, using insights from evolutionary economics, sociology of technology and innovation studies. These major changes involve not just technological changes, but also changes in markets, regulation, culture, industrial networks and infrastructure. The book develops a multi-level perspective, arguing that transitions take place through the alignment of multiple processes at three levels: niche, regime and landscape. This perspective is illustrated by detailed historical case studies: the transition from sailing ships to steamships, the transition from horse-and-carriage to automobiles and the transition from propeller-piston engine aircraft to turbojets. This book will be of great interest to researchers in innovation studies, evolutionary economics, sociology of technology and environmental studies. It will also be useful for policy makers involved in long-term sustainability and systems transitions issues.Trade Review'The book provides a useful interdisciplinary overview of the range of existing theoretical approaches that a scholar might wish to apply to studies of technological transitions and system innovation. In adopting a novel sociotechnical and coevolutionary approach it represents a significant advance in understanding the factors that influence how such transitions come about and identifying important underlying patterns and mechanisms.' -- Andrew Williams, Journal of Industrial Ecology'This major effort at understanding technological transitions from the inside, not only permits a richer understanding of those complex processes in the past, but also provides a powerful set of analytic tools to guide action towards the future. It will be useful for academics, technologists and enlightened policymakers as well as for interested laypersons.' -- Carlota Perez, CERF, Cambridge University and SPRU, University of Sussex, UK'Sociotechnical transformations have been seen as too complex to grasp, but Frank Geels shows, using a judicious combination of history, sociology and economics of technological change, that it is possible to understand the dynamics and identify specific types of transformation.' -- Arie Rip, University of Twente, The Netherlands'Frank Geels's book gives us a new perspective on how society moves from one technological regime to another. Understanding these transitions is essential if we are to get to grips with what we need to do to switch our societies to more sustainable states and how technologies figure in that switch.' -- Ken Green, Institute of Innovation Research, The University of Manchester, UKTable of ContentsContents: Foreword by Johan Schot Preface 1. Introduction 2. Building Blocks from the Literature 3. Conceptual Perspective on System Innovations and Technological Transitions 4. The Transition from Sailing Ships to Steamships in British Oceanic Transport (1780–1890) 5. The Transition from Horse-drawn Carriages to Automobiles in American Urban Passenger Transportation (1860–1930) 6. The Transition from Piston Engine Aircraft to Jetliners in American Aviation (1930–1975) 7. Conclusions and Discussion Bibliography Index

    Out of stock

    £115.90

  • Commodork: Sordid Tales from a BBS Junkie

    15 in stock

    £11.50

  • PC DA ZERO - Guida Facile E Pratica Per Usare Il Computer

    15 in stock

    £14.50

  • Fundamental Concepts In Computer Science

    Imperial College Press Fundamental Concepts In Computer Science

    Out of stock

    Book SynopsisThis book presents fundamental contributions to computer science as written and recounted by those who made the contributions themselves. As such, it is a highly original approach to a “living history” of the field of computer science. The scope of the book is broad in that it covers all aspects of computer science, going from the theory of computation, the theory of programming, and the theory of computer system performance, all the way to computer hardware and to major numerical applications of computers.

    Out of stock

    £82.65

  • Introduction To Computational Earthquake

    Imperial College Press Introduction To Computational Earthquake

    Out of stock

    Book SynopsisNew Edition: Introduction to Computational Earthquake Engineering (3rd Edition)Introduction to Computational Earthquake Engineering covers solid continuum mechanics, finite element method and stochastic modeling comprehensively, with the second and third chapters explaining the numerical simulation of strong ground motion and faulting, respectively. Stochastic modeling is used for uncertain underground structures, and advanced analytical methods for linear and non-linear stochastic models are presented. The verification of these methods by comparing the simulation results with observed data is then presented, and examples of numerical simulations which apply these methods to practical problems are generously provided. Furthermore three advanced topics of computational earthquake engineering are covered, detailing examples of applying computational science technology to earthquake engineering problems.

    Out of stock

    £126.00

  • Introduction To Computational Earthquake

    Imperial College Press Introduction To Computational Earthquake

    Out of stock

    Book SynopsisNew Edition: Introduction to Computational Earthquake Engineering (3rd Edition)Introduction to Computational Earthquake Engineering covers solid continuum mechanics, finite element method and stochastic modeling comprehensively, with the second and third chapters explaining the numerical simulation of strong ground motion and faulting, respectively. Stochastic modeling is used for uncertain underground structures, and advanced analytical methods for linear and non-linear stochastic models are presented. The verification of these methods by comparing the simulation results with observed data is then presented, and examples of numerical simulations which apply these methods to practical problems are generously provided. Furthermore three advanced topics of computational earthquake engineering are covered, detailing examples of applying computational science technology to earthquake engineering problems.

    Out of stock

    £62.70

  • Scientific Applications Of Language Methods

    Imperial College Press Scientific Applications Of Language Methods

    Out of stock

    Book SynopsisPresenting interdisciplinary research at the forefront of present advances in information technologies and their foundations, Scientific Applications of Language Methods is a multi-author volume containing pieces of work (either original research or surveys) exemplifying the application of formal language tools in several fields, including logic and discrete mathematics, natural language processing, artificial intelligence, natural computing and bioinformatics.Table of ContentsDescriptional Complexity - An Introductory Survey (M Holzer & M Kutrib); Classifying All Avoidable Sets of Partial Words of Size Two (F Blanchet-Sadri et al.); On Glushkov K-graphs (P Caron & M Flouret); NLP Dictionaries Implemented as FSAs (J Daciuk et al.); Tree-Language Based Querying (A Berlea); Quotient Monoids and Concurrent Behaviours (R Janicki et al.); Correction Queries in Active Learning (C Tirnauca); Applications of GI in Software Engineering: Domain Specific Language Development (M Mernik et al.); Small Size Insertion and Deletion Systems (A Alhazov et al.); Accepting Networks of Evolutionary Word and Picture Processors: A Survey (F Manea et al.); Quantum Automata and Periodic Events (C Mereghetti & B Palano); Soliton Circuits and Network-Based Automata: Review and Perspectives (M Bartha & M Kresz); Inferring Leadership Structure (W G Mitchener); Weighted Automata Modeling for Linkage Disequilibrium Mapping (T Trang).

    Out of stock

    £108.90

  • This Pervasive Day: The Potential And Perils Of

    Imperial College Press This Pervasive Day: The Potential And Perils Of

    Out of stock

    Book SynopsisImagine a world where your clothes sense your blood pressure, heart rate and body temperature. Suppose the sensors transmit this information to ‘the cloud’, continuously and unobtrusively. Suppose artificial intelligence in ‘the cloud’ detects an anomaly. Suppose it tells your doctor: sighs of relief all round. But then suppose it tells an actuary, who tells your insurer, who tells your employer …This is the world of pervasive adaptation.This Pervasive Day explores the potential — and perils — of daily living with pervasive adaptive computing. This is the result of saturating ourselves and our physical environment with sensors, cameras and devices, all connected to and inter-connected by global networks and computers, which can run increasingly intelligent machine-learning and data fusion algorithms on datasets that could be generated by the entire human population.This book takes as its unifying theme Ira Levin's 1970 science fiction novel This Perfect Day to expose both potential innovations and controversial social issues. It explores the science and technology of pervasive adaptation through a human-centred and socio-technical perspective within the cultural, ethical and legal context of contemporary life. It discusses how pervasive adaptation could provide the foundations for a new range of life-enhancing and planet-saving applications in health, sustainability and assistive living. On the other hand, with the recording, storage and processing of every action, emotion and thought, there also arise the possibilities for unwarranted surveillance, invasions of privacy, loss of civil liberties and commercial exploitation.This Pervasive Day is an insightful read for anyone concerned with the social impact of technology. Written by experienced technologists with a deep interest in computational intelligence, human-computer interaction and ambient systems, This Pervasive Day is a remarkable single source of reference — a fusion of several technical disciplines that makes for a broad scope of investigation within the domains of pervasive computing.Unifying, informative and thought-provoking, This Pervasive Day takes its place as a landmark title that will challenge the perceptions of the technologists and policy-makers, the pragmatists and the theorists, the doers and the thought-leaders.Table of ContentsForeword (J Pitt); Wearable Computing (S Bauerly); Privacy (I Brown); Sustainability (J Farrer); Multi-modal HCI and Tracking Intentions (A Ferscha); Microchip Implants (K Michael); Brain-Computer Interfaces (J Millan); Power (P Mitcheson); Public Collections of Culture (D Patten); Transport Systems (J Polak); Voting Systems (P Ryan); Biometrics (A Sasse); Symbiotic Robots (F Schlachter); Affective Computing (N Serbedzijia); Tracking and Scanning (M Vasalou); Social Networks (R Whitaker).

    Out of stock

    £85.50

  • Combinatorial Optimization and Theoretical

    ISTE Ltd and John Wiley & Sons Inc Combinatorial Optimization and Theoretical

    10 in stock

    Book SynopsisThis volume is dedicated to the theme “Combinatorial Optimization – Theoretical Computer Science: Interfaces and Perspectives” and has two main objectives: the first is to show that bringing together operational research and theoretical computer science can yield useful results for a range of applications, while the second is to demonstrate the quality and range of research conducted by the LAMSADE in these areas.Table of ContentsChapter 1. The Complexity of Single Machine Scheduling Problems under Scenario-based Uncertainty (M. A. Aloulou, F. Della Croce). Chapter 2. (Non)-Approximability Results for the Multi-criteria Min and Max TSP(1, 2) (E. Angel, E. Bampis, L. Gourvès, J. Monnot). Chapter 3. Online Models for Set-covering: the Flaw of Greediness (G. Ausiello, A. Giannakos, V. Th. Paschos). Chapter 4. Comparison of Expressiveness for Timed Automata and Time Petri Nets (B. Bérard, F. Cassez, S. Haddad, D. Lime, O. H. Roux). Chapter 5. A “Maximum Node Clustering” Problem (G. Carello, F. Della Croce, A. Grosso, M. Locatelli). Chapter 6. The Patrolling Problem: Theoretical and Experimental Results (Y. Chevaleyre). Chapter 7. Restricted Classes of Utility Functions for Simple Negotiation Schemes: Sufficiency, Necessity and Maximality (Y. Chevaleyre, U. Endriss, N. Maudet). Chapter 8. Worst-case Complexity of Exact Algorithms for NP-hard Problems (F. Della Croce, B. Escoffier, M. Kaminski, V. Th. Paschos). Chapter 9. The Online Track Assignment Problem (M. Demange, G. Di Stefano, B. Leroy-Beaulieu). Chapter 10. Complexity and Approximation Results for the Min Weighted Node Coloring Problem (M. Demange et al). Chapter 11. Weighted Edge Coloring (M. Demange et al). Chapter 12. An Extensive Comparison of 0-1 Linear Programs for the Daily Satellite Mission Planning (Virginie Gabrel). Chapter 13. Dantzig-Wolfe Decomposition for Linearly Constrained Stable Set Problem (Virginie Gabrel). Chapter 14. Algorithmic Games (Aristotelis Giannakos et al). Chapter 15. Flows! (Michel Koskas, Cécile Murat). Chapter 16. The Complexity of the Exact Weighted Independent Set Problem (Martin Milanic, Jérôme Monnot). Chapter 17. The Labeled Perfect Matching in Bipartite Graphs: Complexity and (in) Approximability (Jérôme Monnot). Chapter 18. Complexity and Approximation Results for Bounded-size Paths Packing Problems (Jérôme Monnot, Sophie Toulouse). Chapter 19. An Upper Bound for the Integer Quadratic Multi-knapsack Problem (Dominique Quadri, Eric Soutif, Pierre Tolla). List of Authors. Index.

    10 in stock

    £201.35

  • Sustainable IT Architecture: The Progressive Way

    ISTE Ltd and John Wiley & Sons Inc Sustainable IT Architecture: The Progressive Way

    10 in stock

    Book SynopsisThis book focuses on Service Oriented Architecture (SOA), the basis of sustainable and more agile IT systems that are able to adapt themselves to new trends and manage processes involving a third party. The discussion is based on the public Praxeme method and features a number of examples taken from large SOA projects which were used to rewrite the information systems of an insurance company; as such, decision-makers, creators of IT systems, programmers and computer scientists, as well as those who will use these new developments, will find this a useful resource.Table of ContentsAcknowledgements xiii Foreword xv Preface xxi Guide for the Reader xxvii Introduction to the SOA Project at SMABTP xxxi Chapter 1. Initial Perspectives 1 1.1. 50 years of computing – an overview 1 1.2. What remains today? 5 Part I. Why a Sustainable Information System? 7 Chapter 2. Company-oriented Services 9 2.1. Consequences of the Internet revolution 9 2.2. What do the leading market players say? 12 2.3. What do the chief information officers think? 14 2.4. The issues faced at general management level 14 2.5. Levels of maturity 16 Chapter 3. SOA Maturity Levels 21 3.1. Towards the creation of a more agile information system 21 3.2. Cosmetic SOA 23 3.3. Extended SOA 24 3.4. Overhaul SOA 26 3.5. The matrices of SOA maturity 28 3.5.1. The matrix showing the definitions of SOA 28 3.5.2. The matrix showing the quality criteria of SOA 29 3.5.3. The matrix showing the strengths and weaknesses of SOA 29 Chapter 4. Economic and Social Aspects 31 4.1. Removal of obstacles that may slow down the progressive overhaul of an information system 32 4.2. The future of IT specialists 33 4.3. Off-shoring 33 4.4. The generation mix 34 4.5. The role of software infrastructure editors 35 Part II. The Principles of SOA 37 Chapter 5. The Properties of SOA 39 5.1. The definition of service for users 41 5.1.1. The user of the service 42 5.1.2. A business ambiguity 42 5.1.3. An example of a business service 43 5.2. The definition of service for IT specialists 44 5.2.1. The granularity of service 44 5.2.2. The separation of concerns 46 5.2.3. The service categories 47 5.2.4. Batch services 49 5.3. The properties of basic SOA 50 5.3.1. Loose coupling 50 5.3.2. Communication by messages 51 5.3.3. Design by contract 52 5.3.4. The limits of the basic properties 56 5.4. The properties of agility 56 5.4.1. The difference between the version and the variant of a service 58 5.4.2. Agility of the data 60 5.4.3. Agility of the rules 65 5.4.4. Agility of the processes 66 5.4.5. Agility of the human–computer interface 67 Chapter 6. Orchestration (BPM and SOA) 69 6.1. Multiple requirements in orchestration 71 6.1.1. Orchestration and SOA maturity levels 71 6.1.2. Functional requirements 73 6.1.3. Technical requirements 75 6.1.4. Enterprise architecture requirements 77 6.2. The levels of orchestration 78 6.2.1. Orchestration at the process level 79 6.2.2. Orchestration at screen level 80 6.2.3. Orchestration at the micro-process level (use cases) 81 6.2.4. Orchestration at the business service level 82 6.2.5. Orchestration between domains through the use of ESB 83 6.2.6. The orchestration of batches 83 6.3. The techniques of orchestration 85 6.3.1. The BPM engine 85 6.3.2. The business rules engine 86 6.3.3. Specific programming 86 6.4. Towards the homogenization of orchestration 87 6.4.1. Unified modeling 87 6.4.2. Unified standard 89 6.5. The benefits of orchestration 91 6.5.1. Advantages 91 6.5.2. Disadvantages 91 Part III. The Need for an Enterprise Method 93 Chapter 7. The Discovery of Services (Reference Framework and Urbanization) 95 7.1. New needs for the information system 96 7.1.1. Expansiveness and progressiveness 97 7.1.2. Mobilizing the many different competences 98 7.2. Why are different methods seldom used within companies? 98 7.3. Reference frameworks 101 7.3.1. Zachman’s framework 101 7.3.2. TOGAF 102 7.3.3. Peter Herzum’s framework 103 7.3.4. Important information to be taken from the reference frameworks 104 7.4. Essential tools 105 7.4.1. UML (Unified Modeling Language) 105 7.4.2. MDA (Model Driven Architecture) 106 7.4.3. Urbanization of the information system 107 Chapter 8. The Praxeme Enterprise Method 111 8.1. Praxeme: the initiative behind a public method 112 8.2. The Praxeme method 112 8.2.1. Product 113 8.2.2. Process 113 8.2.3. Procedures 114 8.2.4. Combining the three dimensions114 8.3. Enterprise system topology according to the Praxeme method 115 8.3.1. Upstream models 115 8.3.2. Logical (SOA), technical and software architecture models 117 8.3.3. Hardware and physical architecture models 117 8.3.4. Enterprise system topology 118 8.3.5. Pre-modeling 119 8.4. What the Praxeme method means for SOA 120 8.4.1. How can we find the correct services? 120 8.4.2. The link between urbanization, the object-oriented approach and SOA 121 8.5. Advantages of the Praxeme method 124 8.5.1. A method that unites different approaches and integrates SOA 124 8.5.2. Risks associated with the Praxeme method 126 Chapter 9. Modeling with Praxeme 129 9.1. The modeling of requirements 130 9.2. Semantic modeling 130 9.2.1. The basic principles 130 9.2.2. How to obtain a semantic model 133 9.2.3. How to validate a semantic model 134 9.2.4. Semantic models and property rights – who owns a semantic model? 134 9.2.5. The structure of a semantic model 135 9.3. Pragmatic modeling 137 9.3.1. The basic principles 137 9.3.2. A new procedure for designing processes 139 9.3.3. Usage view 140 9.4. Pre-modeling 142 9.5. Logical modeling 143 9.5.1. SOA’s style of logical architecture 143 9.5.2. Service-oriented architecture as logical architecture 144 9.5.3. Types of logical components 145 9.5.4. The strata of logical architecture 151 9.5.5. Pivot language 153 9.5.6. Service algorithm specification 154 9.5.7. Specification of the services’ pre- and post-conditions 154 9.5.8. Logical architecture of data 156 9.5.9. Logical architecture of data repositories 157 9.5.10. Logical architecture and user interface 158 9.5.11. Designing a logic for tests 159 9.5.12. Considering ERP 160 9.5.13. Considering existent assets 160 9.5.14. Federation of systems 160 9.5.15. Roles of logical modeling 161 9.6. Logical modeling of batch computing 162 9.7. Technical modeling 163 9.7.1. Required competences 163 9.7.2. Technical/logical negotiation 164 9.8. Software modeling 166 9.8.1. General principles 166 9.8.2. Towards the industrialization of programming 169 9.9. Benefits of the methodology 169 9.9.1. Opportunities 169 9.9.2. Obstacles 171 Part IV. Mastering Existing Techniques 173 Chapter 10. Tools for Industrializing the Method 175 10.1. Requirements in the industrialization of procedures 176 10.2. Frameworks and design patterns 178 10.2.1. From services framework to virtual machines 179 10.2.2. Frameworks and human–machine interfaces 182 10.2.3. Design patterns 186 10.3. Tools for increased agility 189 10.3.1. Rules engine 189 10.3.2. Reference data management system 196 10.4. Representation tools 203 10.4.1. Modeling CASE tool 203 10.4.2. Formal language (pseudo-language) 207 10.4.3. MDA 209 10.5. Tools for tests and management 212 10.5.1. Non-regression tests 212 10.5.2. Designing tests and test data 213 10.5.3. Different levels of tests 214 10.6. Tools for the management of different versions and the configuration of programs 216 10.6.1. The level of versions and variants 216 10.6.2. The level of delivery packages 218 10.7. Benefits of using tools in the method 219 10.7.1. Opportunities 219 10.7.2. Risks 220 Chapter 11. Systems Integration and Common Information Language 223 11.1. New requirements in communication 225 11.1.1. Increase of data flow 225 11.1.2. Considering the business 225 11.1.3. Take the bus! 227 11.2. ESB’s functions 227 11.2.1. Use perimeter 227 11.2.2. ESB’s components 230 11.3. Integrating ESB into SI 235 11.3.1. Towards a common language 235 11.4. ESB’s benefits 239 11.4.1. Opportunities 239 11.4.2. Limitations 240 Chapter 12. SOA Platform 243 12.1. Requirements for the global vision of technical architecture 244 12.2. New technical components 245 12.2.1. The transformation of data 245 12.2.2. From a directory to a registry of services 248 12.2.3. Security 250 12.2.4. Traceability of services in production 252 12.2.5. BAM and CEP 254 12.2.6. Business Intelligence 255 12.2.7. Editing 257 12.3. Managing performance 259 12.3.1. A new order of things? 259 12.3.2. Best practice 260 12.3.3. Testing performance 261 12.4. Managing exploitation 263 12.5. Managing maintenance 269 12.6. Benefits of SOA platforms 265 12.6.1. Opportunities 265 12.6.2. Limitations 266 Chapter 13. Rules Management at the Scale of the Whole Enterprise 267 Jérôme BOYER, ILOG Software 13.1. Overview 267 13.2. Deep view 268 13.3. When to use a rule engine 271 13.4. Logical architecture view 273 13.5. BRMS and SOA 283 Chapter 14. Semantic Integration 287 Erik STEINHOLTZ, Progress Software 14.1. Enabling the adaptive enterprise 288 14.2. Inhibitors for change 289 14.3. Definition of semantic integration 290 14.4. Parallel track information modeling 291 14.5. Change inhibitors addressed with semantic integration 294 14.6. Putting it to work 295 14.6.1. Canonicalizing the BIM 295 14.6.2. The quick win: a pilot project 296 14.6.3. Using the CIM for integration 296 14.6.4. Tools used 297 14.6.5. Managing change and keeping the models alive 298 Conclusion 299 Weblinks 303 Bibliography 305 Special Technical Note 307 Index 309

    10 in stock

    £132.00

  • Constraint Networks: Targeting Simplicity for

    ISTE Ltd and John Wiley & Sons Inc Constraint Networks: Targeting Simplicity for

    10 in stock

    Book SynopsisA major challenge in constraint programming is to develop efficient generic approaches to solve instances of the constraint satisfaction problem (CSP). With this aim in mind, this book provides an accessible synthesis of the author's research and work in this area, divided into four main topics: representation, inference, search, and learning. The results obtained and reproduced in this book have a wide applicability, regardless of the nature of the problem to be solved or the type of constraints involved, making it an extremely user-friendly resource for those involved in this field.Table of ContentsAcknowledgements 11 Notation 13 Main Acronyms 19 List of Algorithms 21 Introduction 27 Chapter 1. Constraint Networks 39 1.1 . Variables and constraints 39 1.2. Networks of variables and constraints . 51 1.2. Examples of constraint networks 65 1.4. Partial orders, decisions, nogoods and properties 74 1.5. Data structures to represent constraint networks 86 Chapter 2. Random and Structured Networks 93 2.1. Random constraint networks 94 2.2. Structured constraint networks 109 PART ONE. INFERENCE 133 Chapter 3. Consistencies 137 3.1. Basic consistencies 138 3.2. Stability of consistencies 143 3.3. Domain-filtering consistencies 150 3.4. Higher-order consistencies 162 3.5. Global consistency 173 3.6. Caveats about node, arc and path consistencies 184 Chapter 4. Generic GAC Algorithms 185 4.1.Coarse-grained propagation schemes 186 4.2. Iterating over valid tuples 97 4.3. GAC3 and GAC2001 200 4.4. More about general-purpose GAC algorithms 205 4.5. Improving the efficiency of generic GAC algorithms 214 4.6. Experimental results 233 4.7. Discussion 236 Chapter 5. Generalized Arc Consistency for Table Constraints 239 5.1. Classical schemes 240 5.2. Indexing-based approaches 244 5.3. Compression-based approaches 253 5.4. GAC-valid+allowed scheme 264 5.5. Simple tabular reduction 269 5.6. GACfor negative table constraints 279 5.7. Experimental results 283 5.8. Conclusion 286 Chapter 6. Singleton Arc Consistency 287 6.1. SAC1 and SAC2 289 6.2. SAC-Opt and SAC-SDS 290 6.3. SAC3 292 6.4. SAC3+ 296 6.5. Illustration 299 6.6. Weaker and stronger forms of SAC 300 6.7. Experimental results 313 6.8. Conclusion 316 Chapter 7. Path and Dual Consistency 319 7.1. Qualitative study 321 7.2. Enforcing (conservative) path consistency 331 7.3. Enforcing strong (conservative) dual consistency 336 7.4. Experimental results 348 7.5. Conclusion 353 PART TWO. SEARCH 355 Chapter 8. Backtrack Search 359 8.1. General description 361 8.2. Maintaining (generalized) arc consistency 367 8.3. Classical look-ahead and look-back schemes 370 8.4. Illustrations 378 8.5. The role of explanations 383 Chapter 9. Guiding Search toward Conflicts 391 9.1. Search-guiding heuristics 392 9.2. Adaptive heuristics 398 9.3. Strength of constraint weighting 405 9.4. Guiding search to culprit decisions 415 9.5. Conclusion 427 Chapter 10. Restarts and Nogood Recording 431 10.1. Restarting search 432 10.2. Nogood recording from restarts 436 10.3. Managing standard nogoods 441 10.4. Minimizing nogoods 450 10.5. Experimental results 454 10.6. Conclusion 457 Chapter 11. State-based Reasoning 459 11.1. Inconsistent partial states 460 11.2. Learning from explanations and failed values 470 11.3. Reducing elementary inconsistent partial states 476 11.4. Equivalence detection 487 11.5. Experimental results 492 11.6. Conclusion 494 Chapter 12. Symmetry Breaking 495 Christophe LECOUTRE, Sébastien TABARY 12.1. Group theory 496 12.2. Symmetries on constraint networks 499 12.3. Symmetry-breaking methods 503 12.4. Automatic symmetry detection 508 12.5. Lightweight detection of variable symmetries 511 12.6. A GAC algorithm for lexicographic ordering constraints 520 12.7. Experimental results 527 Appendices 531 Bibliography 547 Index 571

    10 in stock

    £246.00

  • The Transverse Information System: New Solutions

    ISTE Ltd and John Wiley & Sons Inc The Transverse Information System: New Solutions

    10 in stock

    Book SynopsisInformation systems have an enormous potential for improving business performance. With this in mind, companies must set out to exploit and optimize this potential without delay in order to improve their efficiency and continue to set themselves apart from the competition. This comprehensive text provides the information needed to understand and implement these systems at a practical level.Table of ContentsPreface xi Acknowledgements xv Chapter 1. Innovation for Business Value and Cost-killing 1 1.1. Supporting profit and growth 3 1.2. Assessing innovation 9 1.3. Agility and alignment 15 1.4. Sustainable development and information assets 24 Chapter 2. The Transverse Information System 29 2.1. A regular increase in power 30 2.2. Optimizing business unit assets 36 2.3. The impact on the IT department agenda 41 Chapter 3. Master Data 49 3.1. An unclaimed asset 50 3.2. Master data management: centralization 65 3.3. Enterprise information integration: federation 74 3.4. Between centralization and federation 78 3.5. Data governance 80 3.6. Towards information management 83 3.7. Bibliography 84 Chapter 4. Service-Oriented Architectures 85 4.1. Basic impacts 87 4.2. A major lever for a change in progress 93 4.3. A new experiment in the finance bank 102 4.4. Technologies and architecture 106 4.5. Flexibility is an event? Yes, agent! 118 Chapter 5. Business Process Management 121 5.1. From managing business processes to BPM 122 5.2. Understanding BPM 137 5.3. The business process from the IS perspective 147 5.4. BPM promises and prospects 155 5.5. Conclusion: the place of BPM in the company and in the IS 157 Chapter 6. Exchange Platforms 159 6.1. The development of data exchanges 159 6.2. Technologies and architectures 172 6.3. Project typology 185 6.4. A common foundation 188 Chapter 7. Complex, Innovative Business Architectures 189 7.1. Natural connections 190 7.2. An investigation into the distribution sector 198 7.3. A project in the energy sector 205 7.4. A program in retail banking 209 Chapter 8. The Impact of NISS on Software Implementation 219 8.1. The process standard 221 8.2. Towards assembly and beyond 225 8.3. Model-driven architecture and docking 241 8.4. A “sourcing” process to be defined 244 Chapter 9. From Implementation to Measurment 247 9.1. Towards operational excellence 248 9.2. Business activity monitoring 253 9.3. SOA management 269 9.4. The loop is completed 272 Chapter 10. Contribution and Impact of NISS on Organization 275 10.1. From the business unit to IT: a new fluency 276 10.2. Governance of information assets 283 10.3. Organization methods 297 10.4. Managing change and maturity stages 305 Chapter 11. How to Get the Best Out of NISS 307 11.1. The initial phases 307 11.2. The foundations: creating platforms 318 11.3. From the process angle 322 11.4. Here and now 328 11.5. Bibliography 329 Index 331

    10 in stock

    £132.00

  • Distibuted Systems: Design and Algorithms

    ISTE Ltd and John Wiley & Sons Inc Distibuted Systems: Design and Algorithms

    10 in stock

    Book SynopsisIn today’s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems. Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues. Distributed Systems: Design and Algorithms, is dedicated to engineers, students, and anyone familiar with algorithms and programming, who want to know more about distributed systems. These systems are characterized by: several components with one or more threads, possibly running on different processors; asynchronous communications with possible additional assumptions (reliability, order preserving, etc.); local views for every component and no shared data between components. This title presents distributed systems from a point of view dedicated to their design and their main principles: the main algorithms are described and placed in their application context, i.e. consistency management and the way they are used in distributed file-systems.Table of ContentsForeword 9 Chapter 1. Introduction 13 Serge HADDAD, Fabrice KORDON, Laurent PAUTET and Laure PETRUCCI FIRST PART. LARGE SCALE PEER-TO-PEER DISTRIBUTED SYSTEMS 19 Chapter 2. Introduction to Large-Scale Peer-to-Peer Distributed Systems 21 Fabrice KORDON 2.1. “Large-Scale” distributed systems? 21 2.2. Consequences of “large-scale” 22 2.3. Some large-scale distributed systems 23 2.4. Architectures of large scale distributed systems 26 2.5. Objective of Part 1 30 2.6. Bibliography 31 Chapter 3. Design Principles of Large-Scale Distributed System 33 Xavier BONNAIRE and Pierre SENS 3.1. Introduction to peer-to-peer systems 33 3.2. The peer-to-peer paradigms 34 3.3. Services on structured overlays 41 3.4. Building trust in P2Psystems 43 3.5. Conclusion 52 3.6. Bibliography 53 Chapter 4. Peer-to-Peer Storage 59 Olivier MARIN, Sébastien MONNET and Gaël THOMAS 4.1. Introduction 59 4.2. BitTorrent 60 4.3. Gnutella 66 4.4. Conclusion 79 4.5. Bibliography 79 Chapter 5. Large-Scale Peer-to-Peer Game Applications 81 Sébastien MONNET and Gaël THOMAS 5.1. Introduction 81 5.2. Large-scale game applications: model and specific requirements 83 5.3. Overview of peer-to-peer overlays for large-scale game applications 90 5.4. Overlays for FPS games 93 5.5. Overlays for online life-simulation games 95 5.6. Conclusion 100 5.7. Bibliography 101 SECOND PART. DISTRIBUTED, EMBEDDED AND REAL-TIME SYSTEMS 105 Chapter 6. Introduction to Distributed Embedded and Real-time Systems 107 Laurent PAUTET 6.1. Distributed real-time embedded systems 108 6.2. Safety critical systems as examples of DRE systems 109 6.3. Design process of DRE systems 112 6.4. Objectives of Part 2 114 6.5. Bibliography 115 Chapter 7. Scheduling in Distributed Real-Time Systems 117 Emmanuel GROLLEAU, Michaël RICHARD, and Pascal RICHARD 7.1. Introduction 117 7.2. Generalities about real-time systems 118 7.3. Temporal correctness 122 7.4. WCRT of the tasks 126 7.5. WCRT of the messages 142 7.6. Case study 149 7.7. Conclusion 154 7.8. Bibliography 155 Chapter 8. Software Engineering for Adaptative Embedded Systems 159 Etienne BORDE 8.1. Introduction 159 8.2. Adaptation, an additional complexity factor 160 8.3. Theoretical aspects of adaptation management 163 8.4. Technical solutions for the design of adaptative embedded systems 171 8.5. An example of adaptative system from the robotic domain 176 8.6. Applying MDE techniques to the design of the robotic use-case 177 8.7. Exploitation of the models 184 8.8. Conclusion 188 8.9. Bibliography 189 Chapter 9. The Design of Aerospace Systems 191 Maxime PERROTIN, Julien DELANGE, and Jérôme HUGUES 9.1. Introduction 191 9.2. Flight software typical architecture 193 9.3. Traditional development methods and their limits 195 9.4. Modeling a software system using TASTE: philosophy 197 9.5. Common solutions 199 9.6. What TASTE specifically proposes 200 9.7. Modeling process and tools 201 9.8. Technology 208 9.9. Model transformations 209 9.10. The TASTE run-time 213 9.11. Illustrating our process by designing heterogeneous systems 215 9.12. First user feedback and TASTE future 224 9.13. Conclusion 225 9.14. Bibliography 226 THIRD PART. SECURITY IN DISTRIBUTED SYSTEMS 229 Chapter 10. Introduction to Security Issues in Distributed Systems 231 Laure PETRUCCI 10.1. Problem 231 10.2. Secure data exchange 233 10.3. Security in specific distributed systems 234 10.4. Outline of art III 234 10.5. Bibliography 235 Chapter 11. Practical Security in Distributed Systems 237 Benoît BERTHOLON, Christophe CÉRIN, Camille COTI, and Sébastien VARRETTE, Jean-Christophe DUBACQ 11.1. Introduction 237 11.2. Confidentiality 249 11.3. Authentication 252 11.4. Availability and fault tolerance 261 11.5. Ensuring resource security 278 11.6. Result checking in distributed computations 283 11.7. Conclusion 291 11.8. Bibliography 292 Chapter 12. Enforcing Security with Cryptography 301 Sami HARARI and Laurent POINSOT 12.1. Introduction 301 12.2. Cryptography: from a general perspective 303 12.3. Symmetric encryption schemes 308 12.4. Prime numbers and public key cryptography 324 12.5. Conclusion 328 12.6. Bibliography 329 Index 333

    10 in stock

    £135.80

  • Qualitative Spatial and Temporal Reasoning

    ISTE Ltd and John Wiley & Sons Inc Qualitative Spatial and Temporal Reasoning

    10 in stock

    Book SynopsisStarting with an updated description of Allen's calculus, the book proceeds with a description of the main qualitative calculi which have been developed over the last two decades. It describes the connection of complexity issues to geometric properties. Models of the formalisms are described using the algebraic notion of weak representations of the associated algebras. The book also includes a presentation of fuzzy extensions of qualitative calculi, and a description of the study of complexity in terms of clones of operations.Table of ContentsIntroduction. Qualitative Reasoning xvii Chapter 1. Allen’s Calculus 1 1.1. Introduction 1 1.2. Allen’s interval relations 6 1.3. Constraint networks 8 1.4. Constraint propagation 17 1.5. Consistency tests 26 Chapter 2. Polynomial Subclasses of Allen’s Algebra 29 2.1. “Show me a tractable relation!” 29 2.2. Subclasses of Allen’s algebra 30 2.3. Maximal tractable subclasses of Allen’s algebra 52 2.4. Using polynomial subclasses 57 2.5. Models of Allen’s language 60 2.6. Historical note 61 Chapter 3. Generalized Intervals 63 3.1. “When they built the bridge . “ 63 3.2. Entities and relations 65 3.3. The lattice of basic (p, q)-relations 68 3.4. Regions associated with basic (p, q)-relations 69 3.5. Inversion and composition 73 3.6. Subclasses of relations: convex and pre-convex relations 79 3.7. Constraint networks 82 3.8. Tractability of strongly pre-convex relations 83 3.9. Conclusions 84 3.10. Historical note 85 Chapter 4. Binary Qualitative Formalisms 87 4.1. “Night driving” 87 4.2. Directed points in dimension 1 92 4.3. Directed intervals 97 4.4. The OPRA direction calculi 99 4.5. Dipole calculi 100 4.6. The Cardinal direction calculus 101 4.7. The Rectangle calculus 104 4.8. The n-point calculus 106 4.9. The n-block calculus 108 4.10. Cardinal directions between regions 109 4.11. The INDU calculus 123 4.12. The 2n-star calculi 126 4.13. The Cyclic interval calculus 128 4.14. The RCC–8 formalism 131 4.15. A discrete RCC theory 137 Chapter 5. Qualitative Formalisms of Arity Greater than 2 145 5.1. “The sushi bar” 145 5.2. Ternary spatial and temporal formalisms 146 5.3. Alignment relations between regions 155 5.4. Conclusions 158 Chapter 6. Quantitative Formalisms, Hybrids, and Granularity 159 6.1. “Did John meet Fred this morning?”159 6.2. TCSP metric networks 160 6.3. Hybrid networks 164 6.4. Meiri’s formalism 168 6.5. Disjunctive linear relations (DLR) 174 6.6. Generalized temporal networks 175 6.7. Networks with granularity 179 Chapter 7. Fuzzy Reasoning 187 7.1. “Picasso’s Blue period” 187 7.2. Fuzzy relations between classical intervals 188 7.3. Events and fuzzy intervals 195 7.4. Fuzzy spatial reasoning: a fuzzy RCC 208 7.5. Historical note 222 Chapter 8. The Geometrical Approach and Conceptual Spaces 223 8.1. “What color is the chameleon?” 223 8.2. Qualitative semantics 224 8.3. Why introduce topology and geometry? 225 8.4. Conceptual spaces 226 8.5. Polynomial relations of INDU 237 8.6. Historical note 258 Chapter 9. Weak Representations 259 9.1. “Find the hidden similarity” 259 9.2. Weak representations 261 9.3. Classifying the weak representations of An 275 9.4. Extension to the calculi based on linear orders 283 9.5. Weak representations and configurations 290 9.6. Historical note 304 Chapter 10. Models of RCC−8 305 10.1. “Disks in the plane” 305 10.2. Models of a composition table 307 10.3. The RCC theory and its models 312 10.4. Extensional entries of the composition table 319 10.5. The generalized RCC theory 329 10.6. A countable connection algebra 337 10.7. Conclusions 341 Chapter 11. A Categorical Approach of Qualitative Reasoning 343 11.1. “Waiting in line” 343 11.2. A general construction of qualitative formalisms 346 11.3. Examples of partition schemes 349 11.4. Algebras associated with qualitative formalisms 350 11.5. Partition schemes and weak representations 352 11.6. A general definition of qualitative formalisms 353 11.7. Interpretating consistency 355 11.8. The category of weak representations 357 11.9. Conclusions 360 Chapter 12. Complexity of Constraint Languages 363 12.1. “Sudoku puzzles” 363 12.2. Structure of the chapter 365 12.3. Constraint languages 366 12.4. An algebraic approach of complexity 367 12.5. CSPs and morphisms of relational structures 368 12.6. Clones of operations 373 12.7. From local consistency to global consistency 375 12.8. The infinite case 376 12.9. Disjunctive constraints and refinements 382 12.10. Refinements and independence 389 12.11. Historical note 390 Chapter 13. Spatial Reasoning and Modal Logic 391 13.1. “The blind men and the elephant” 391 13.2. Space and modal logics 393 13.3. The modal logic S4 393 13.4. Topological models 396 13.5. Translating the RCC−8 predicates 408 13.6. An alternative modal translation of RCC−8 409 13.7. Generalized frames 410 13.8. Complexity 411 13.9. Complements 412 Chapter 14. Applications and Software Tools 413 14.1. Applications 413 14.2. Software tools 416 Chapter 15. Conclusion and Prospects 423 15.1. Introduction 423 15.2. Combining qualitative formalisms 423 15.3. Spatio-temporal reasoning 426 15.4. Alternatives to qualitative reasoning 430 15.5. To conclude — for good 434 Appendix A. Elements of Topology 435 A.1. Topological spaces 435 A.2. Metric spaces 445 A.3. Connectedness and convexity 447 Appendix B. Elements of Universal Algebra 451 B.1. Abstract algebras 451 B.2. Boolean algebras 452 B.3. Binary relations and relation algebras 454 B.4. Basic elements of the language of categories 457 Appendix C. Disjunctive Linear Relations 463 C.1. DLRs: definitions and satisfiability 463 C.2. Linear programming 464 C.3. Complexity of the satisfiability problem 466 Bibliography 471 Index 501

    10 in stock

    £180.45

  • Interoperability for Enterprise Software and

    ISTE Ltd and John Wiley & Sons Inc Interoperability for Enterprise Software and

    10 in stock

    Book SynopsisWithin the framework of the Sixth I-ESA International Conference, supported by the INTEROP VLab (International Virtual Laboratory on Enterprise Interoperability, http://www.interop-vlab.eu), three workshops and a Doctoral Symposium have been organized in order to strengthen some key topics related to interoperability for enterprise applications and software. The workshops were selected to complement the conference topics, leaving more time to researchers for brainstorming and then coming up, at the end of the workshops, with new research directions for the future. The goal of the workshop “Standards – a Foundation for Interoperability” is to increase awareness and understanding of interoperability standards as a fundamental need. The workshop “Use of MDI/SOA Concepts in Industry” promotes the application of MDI (Model-Driven Interoperability) combined with SOA (Services Oriented Architecture) and the associated technology (BPM, Enterprise Modeling, ontology, mediation, model transformation, etc.) in industry. The workshop on “Dynamic Management across Interoperating Enterprises” investigates the need for enhancements to current business management systems and processes to address the needs of global trading across enterprises utilizing the new service-oriented Internet. Finally, the Doctoral Symposium has given the opportunity for students involved in the preparation of their PhDs in this emerging area to present and discuss their research issues and ideas with senior researchers.Table of ContentsEditorial Hervé Panetto, Nacer Boudjlida xi Session 1. Standards – A Foundation for Interoperability 1 Standards Workshop Chairs’ Message Martin Zelm, David Chen 5 Standards for Enterprise Interoperation – How to Improve? Martin Zelm, Kurt Kosanke 7 Framework for Enterprise Interoperability and Maturity Model (CEN/ISO 11354) David Chen 15 Testing Interoperability Standards – A Test Case Generation Methodology Nenad Ivezic, Jungyub Woo 23 OMG Specifications for Enterprise Interoperability Brian Elvesæter, Arne-Jørgen Berre 31 Standards Creation and Adoption for SME Networks Piero De Sabbata, Nicola Gessa, Arianna Brutti, Cristiano Novelli, Angelo Frascella, Gianluca D’Agosta 41 The European Public Procurement Initiative and Standards for Information Exchange Tim McGrath 53 Challenges in Project Management Georgios Kapogiannis, Colin Piddington 61 Session 2. Use of MDI/SOA Concepts in Industry 67 MDI/SOA Workshop Chairs’ Message Guy Doumeingts, Martine Grandin-Dubost 71 Application of SHAPE Technologies in Production and Process Optimization Brian Elvesæter, Arne-Jørgen Berre, Einar Landre 73 An Exploration of Foundation Ontologies and Verification Methods for Manufacturing Knowledge Sharing R. Young, N. Chungoora, Z. Usman, N. Anjum, G. Gunendran, C. Palmer, J.A. Harding, K. Case, A.-F. Cutting-Decelle 83 ISTA3 Methodology Application Case Nabila Zouggar, Mickaël Romain, Guy Doumeingts, Sébastien Cazajous, Yves Ducq, Christophe Merlo, Martine Grandin-Dubost 95 Session 3. Doctoral Symposium 111 Doctoral Symposium Chair’s Message Jenny A. Harding 115 The Mediation Information System Engineering Project: Status and Perspectives N. Boissel-Dallier, F. Bénaben, H. Pingaud, J.-P. Lorré 117 Quality Measurement of Semantic Standards E.J.A. Folmer, P.H.W.M. Oude Luttighuis, J. van Hillegersberg 125 Towards a Model-Driven and Role-Configurable Methodology Suite for Enterprise and Service-Oriented Interoperability Brian Elvesæter, Arne-Jørgen Berre 133 Mediation Information System Engineering: Business and Logic Characterization in a Collaborative Situation W. Mu, F. Bénaben, H. Pingaud 139 Role of Semantic Web in the Changing Context of Enterprise Collaboration N. Khilwani, J. A. Harding 147 A Dynamic Knowledge Management Framework B. A. Piorkowski, J. X. Gao 155 Author Index 163

    10 in stock

    £132.00

  • Uncertainty Theories and Multisensor Data Fusion

    ISTE Ltd and John Wiley & Sons Inc Uncertainty Theories and Multisensor Data Fusion

    10 in stock

    Book SynopsisCombining multiple sensors in order to better grasp a tricky, or even critical, situation is an innate human reflex. Indeed, humans became aware, very early on, of the need to combine several of our senses so as to acquire a better understanding of our surroundings when major issues are at stake. On the basis of this need, we have naturally sought to equip ourselves with various kinds of artificial sensors to enhance our perceptive faculties. The association of multiple heterogeneous sensors provides a reliable and efficient situation assessment in difficult operational contexts, but imperfect local observations need to be managed in a suitable way (uncertainty, imprecision, incompleteness, unreliability, etc.). The theories of uncertainty make it possible to benefit from such information, but the implementation of these theories requires specific developments to meet the needs of multisensor data fusion. This book first discusses basic questions such as: Why and when is multiple sensor fusion necessary? How can the available measurements be characterized in such a case? What is the purpose and the specificity of information fusion processing in multiple sensor systems? Considering the different uncertainty formalisms (probability, fuzzy set theory, possibility theory, belief function theory), a set of coherent operators corresponding to the different steps of a complete fusion process is then developed, in order to meet the requirements identified in the first part of the book. Furthermore, the implementation of these operators is illustrated and discussed within the framework of generic applications.Table of ContentsINTRODUCTION ix CHAPTER 1. MULTISENSOR DATA FUSION 1 1.1. Issues at stake 1 1.2. Problems 4 1.2.1. Interpretation and modeling of data 8 1.2.2. Reliability handling 10 1.2.3. Knowledge propagation 11 1.2.4. Matching of ambiguous data 12 1.2.5. Combination of sources14 1.2.6. Decision-making 16 1.3. Solutions 21 1.3.1. Panorama of useful theories 21 1.3.2. Process architectures 24 1.4. Position of multisensor data fusion 27 1.4.1. Peculiarities of the problem 27 1.4.2. Applications of multisensor data fusion 28 CHAPTER 2. REFERENCE FORMALISMS 31 2.1. Probabilities 31 2.2. Fuzzy sets 35 2.3. Possibility theory 39 2.4. Belief functions theory 43 2.4.1. Basic functions 44 2.4.2. A few particularly useful cases 47 2.4.3. Conditioning/deconditioning 49 2.4.4. Refinement/coarsening 50 CHAPTER 3. SET MANAGEMENT AND INFORMATION PROPAGATION 53 3.1. Fuzzy sets: propagation of imprecision 53 3.2. Probabilities and possibilities: the same approach to uncertainty 56 3.3. Belief functions: an overarching vision in terms of propagation 57 3.3.1. A generic operator: extension 58 3.3.2. Elaboration of a mass function with minimum specificity 61 3.3.3. Direct exploitation of the operator of extension 64 3.4. Example of application: updating of knowledge over time 66 CHAPTER 4. MANAGING THE RELIABILITY OF INFORMATION 71 4.1. Possibilistic view 72 4.2. Discounting of belief functions 73 4.3. Integrated processing of reliability 75 4.4. Management of domains of validity of the sources 77 4.5. Application to fusion of pixels from multispectral images 82 4.6. Formulation for problems of estimation 87 CHAPTER 5. COMBINATION OF SOURCES 91 5.1. Probabilities: a turnkey solution, Bayesian inference 92 5.2. Fuzzy sets: a grasp of axiomatics 94 5.3. Possibility theory: a simple approach to the basic principles 102 5.4. Theory of belief functions: conventional approaches 106 5.5. General approach to combination: any sets and logics 113 5.6. Conflict management 118 5.7. Back to Zadeh’s paradox 122 CHAPTER 6. DATA MODELING 127 6.1. Characterization of signals 127 6.2. Probabilities: immediate taking into account 130 6.3. Belief functions: an open-ended and overarching framework 131 6.3.1. Integration of data into the fusion process 132 6.3.2. Generic problem: modeling of Cij values 135 6.3.3. Modeling measurements with stochastic learning 139 6.3.4. Modeling measurements with fuzzy learning 144 6.3.5. Overview of models for belief functions 148 6.4. Possibilities: a similar approach 153 6.5. Application to a didactic example of classification 157 CHAPTER 7. CLASSIFICATION: DECISION-MAKING AND EXPLOITATION OF THE DIVERSITY OF INFORMATION SOURCES 165 7.1. Decision-making: choice of the most likely hypothesis 166 7.2. Decision-making: determination of the most likely set of hypotheses 168 7.3. Behavior of the decision operator: some practical examples 171 7.4. Exploitation of the diversity of information sources: integration of binary comparisons 175 7.5. Exploitation of the diversity of information sources: classification on the basis of distinct but overlapping sets 179 7.6. Exploitation of the diversity of the attributes: example of application to the fusion of airborne image data 189 CHAPTER 8. SPATIAL DIMENSION: DATA ASSOCIATION 193 8.1. Data association: a multiform problem, which is unavoidable in multisensor data fusion 194 8.2. Construction of a general method for data association 197 8.3. Simple example of the implementation of the method 203 CHAPTER 9. TEMPORAL DIMENSION: TRACKING 211 9.1. Tracking: exploitation of the benefits of multisensory data fusion 211 9.2. Expression of the Bayesian filter 218 9.2.1. Statistical gating 218 9.2.2. Updating 219 9.2.3. Prediction 220 9.3. Signal discrimination process 221 9.3.1. Fusion at the level of each resolution cell 222 9.3.2. Fusion at the level of the validation gate 224 9.3.3. Overview of a practical implementation of the discrimination method 226 9.4. Extensions of the basic MSF 228 9.4.1. Data association 228 9.4.2. Joint tracking of multiple targets 229 9.4.3. Multi-model filtering 231 9.5. Examples of application 232 9.5.1. Extraction power 233 9.5.2. Handling of unfamiliar signatures 235 9.5.3. Tracking on spatially ambiguous observations 238 CONCLUSION 241 BIBLIOGRAPHY 249 INDEX 257

    10 in stock

    £132.00

  • Crowdsourcing: One Step Beyond

    ISTE Ltd and John Wiley & Sons Inc Crowdsourcing: One Step Beyond

    10 in stock

    Book SynopsisCrowdsourcing is a relatively recent phenomenon that only appeared in 2006, but it continues to grow and diversify (crowdfunding, crowdcontrol, etc.). This book aims to review this concept and show how it leads to the creation of value and new business opportunities. Chapter 1 is based on four examples: the online-banking sector, an informative television channel, the postal sector and the higher education sector. It shows that in the current context, for a company facing challenges, the crowd remains an untapped resource. The next chapter presents crowdsourcing as a new form of externalization and offers definitions of crowdsourcing. In Chapter 3, the authors attempt to explain how a company can create value by means of a crowdsourcing operation. To do this, authors use a model linking types of value, types of crowd, and the means by which these crowds are accessed. Chapter 4 examines in detail various forms that crowdsourcing may take, by presenting and discussing ten types of crowdsourcing operation. In Chapter 5, the authors imagine and explore the ways in which the dark side of crowdsourcing might be manifested and Chapter 6 offers some insight into the future of crowdsourcing. Contents 1. A Turbulent and Paradoxical Environment. 2. Crowdsourcing: A New Form of Externalization. 3. Crowdsourcing and Value Creation. 4. Forms of Crowdsourcing. 5. The Dangers of Crowdsourcing. 6. The Future of Crowdsourcing. About the Authors Jean-Fabrice Lebraty is Professor of management sciences at IAE (Business School) at Jean Moulin – Lyon 3 University in France and a member of the research laboratory Magellan EA3713. He specializes in the management of information and communication systems and his research notably concerns decision-making and the links between crowd and information technology. Katia Lobre-Lebraty is Associate Professor of management sciences at IAE (Business School) at Jean Moulin – Lyon 3 University in France and a member of the research laboratory Magellan EA3713. She specializes in management control and strategic management and her research concerns both the modes of governance of organizations and Open DataTable of ContentsINTRODUCTION ix I.1. A typology of management situations x I.2. Crowdsourcing: a multifaceted concept xii ACKNOWLEDGMENTS xv CHAPTER 1. A TURBULENT AND PARADOXICAL ENVIRONMENT 1 1.1. Economic financialization and its challenges 1 1.2. The mass diffusion of the Internet and its consequences 3 1.3. The paradoxical coexistence of scarcity and abundance around data 4 1.4. Unique simultaneity of crisis and immobilism 8 1.4.1. The online banking sector 9 1.4.2. The postal sector 10 1.4.3. The television sector 11 1.4.4. The training sector: French universities 12 1.4.5. The conclusion to be drawn from these cases: the crowd remains an underexploited resource 13 CHAPTER 2. CROWDSOURCING: A NEW FORM OF EXTERNALIZATION 15 2.1. The concept of externalization 17 2.2. The idea of relationships 18 2.3. The concept of a crowd 19 2.3.1. The connected crowd 21 2.3.2. Understanding the crowd 23 2.3.3. Crowds and experts 26 CHAPTER 3. CROWDSOURCING AND VALUE CREATION 29 3.1 Creation of value 30 3.2. What type of value? 34 3.3 What type of crowd? 35 3.4 Towards an adapted business model 40 CHAPTER 4. FORMS OF CROWDSOURCING 47 4.1. Crowdjobbing 49 4.1.1. What is it? 50 4.1.2. Why it works 51 4.1.3. Limitations 52 4.1.4. The future 53 4.2. Crowdwisdom 55 4.2.1. What is it? 56 4.2.2. Why it works 56 4.2.3. Limitations 57 4.2.4. The future 57 4.3. Crowdfunding 58 4.3.1. What is it? 58 4.3.2. An illustrative example 59 4.3.3. Why it works 61 4.3.4. Limitations 63 4.3.5. The future 64 4.4. Crowdsourcing and forecasting 65 4.4.1.What is it? 65 4.4.2. An illustrative example 66 4.4.3. Why it works 68 4.4.4. Limitations 68 4.4.5. The future 68 4.5. Crowdsourcing and innovation 69 4.5.1. What is it? 70 4.5.2. Why it works 72 4.5.3. Limitations 73 4.5.4. The future 75 4.6. Crowdsourcing and authenticity (C&A) 75 4.6.1. What is it? 76 4.6.2. Why it works 77 4.6.3. Limitations 78 4.6.4. The future 79 4.7. Crowdauditing 80 4.7.1. What is it? 81 4.7.2. Why it works 82 4.7.3. Limitations 83 4.7.4. The future 84 4.8. Crowdcontrol 85 4.8.1. What is it? 85 4.8.2. Why it works 86 4.8.3. Limitations 86 4.8.4. The future 87 4.9. Crowdcuration 88 4.9.1. What is it? 88 4.9.2. An illustrative example 89 4.9.3. Why it works 90 4.9.4. Limitations 91 4.9.5. The future 92 4.10. Crowdcare 93 4.10.1. What is it? 93 4.10.2. An illustrative example 94 4.10.3. Why it works 96 4.10.4. Limitations 96 4.10.5. The future 96 CHAPTER 5. THE DANGERS OF CROWDSOURCING 97 CHAPTER 6. THE FUTURE OF CROWDSOURCING 101 CONCLUSION 107 BIBLIOGRAPHY 109 INDEX 119

    10 in stock

    £132.00

  • Concepts of Combinatorial Optimization

    ISTE Ltd and John Wiley & Sons Inc Concepts of Combinatorial Optimization

    Out of stock

    Book SynopsisCombinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aim to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. Concepts of Combinatorial Optimization, is divided into three parts: - On the complexity of combinatorial optimization problems, presenting basics about worst-case and randomized complexity; - Classical solution methods, presenting the two most-known methods for solving hard combinatorial optimization problems, that are Branch-and-Bound and Dynamic Programming; - Elements from mathematical programming, presenting fundamentals from mathematical programming based methods that are in the heart of Operations Research since the origins of this field.Table of ContentsPreface xiii Vangelis Th. Paschos Part I Complexity of Combinatioral Optimization Problems 1 Chapter 1 Basic Concepts in Algorithms and Complexity Theory 3 Vangelis Th. Paschos Chapter 2 Randomized Complexity 21 Jérémy Barbay Part II Classic Solution Methods 39 Chapter 3 Branch-and-Bound Methods 41 Irène Charon and Olivier Hudry Chapter 4 Dynamic Programming 71 Bruno Escoffier and Olivier Spanjaard Part III Elements from Mathematical Programming 101 Chapter 5 Mixed Integer Linear Programming Models for Combinatorial Optimization Problems 103 Frédérico Della Croce Chapter 6 Simplex Algorithms for Linear Programming 135 Frédérico Della Croce and Andrea Grosso Chapter 7 A Survey of Some Linear Programming Methods 157 Pierre Tolla Chapter 8 Quadratic Optimization in 0-1 Variables 189 Alain Billionnet Chapter 9 Column Generation in Integar Linear Programming 235 Irène Loiseau, Alberto Ceselli, Nelson Maculan and Matteo Salani Chapter 10 Polyhedral Approaches 261 Ali Ridha Mahjoub Chapter 11 Constaint Programming 325 Claude Le Pape General Bibliography 339 List of Authors 363 Index 367 Summary of Other Volumes in the Series 371

    Out of stock

    £132.26

  • Paradigms of Combinatorial Optimization: Problems

    ISTE Ltd and John Wiley & Sons Inc Paradigms of Combinatorial Optimization: Problems

    Out of stock

    Book SynopsisCombinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aim to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. Concepts of Combinatorial Optimization, is divided into three parts: - On the complexity of combinatorial optimization problems, presenting basics about worst-case and randomized complexity; - Classical solution methods, presenting the two most-known methods for solving hard combinatorial optimization problems, that are Branch-and-Bound and Dynamic Programming; - Elements from mathematical programming, presenting fundamentals from mathematical programming based methods that are in the heart of Operations Research since the origins of this field.Table of ContentsPreface xvii Vangelis Th. Paschos Part I Paradigmatic Problems 1 Chapter 1 Optimal Satisfiability 3 Cristina Bazgan Chapter 2 Scheduling Problems 33 Philippe Chrétienne and Christophe Picouleau Chapter 3 Location Problems 61 Aristotelis Giannakos Chapter 4 MiniMax Algorithms and Games 89 Michel Koskas Chapter 5 Two-dimensional Bin Packing Problems 107 Andrea Lodi, Silvano Martello, Michele Monaci and Daniele Vigo Chapter 6 The Maximum Cut Problem 131 Walid Ben-Ameur, Ali Ridha Mahjoub and José Neto Chapter 7 The Traveling Salesman Problem and its Variations 173 Jérôme Monnot and Sophie Toulouse Chapter 8 0-1 Knapsack Problems 215 Gerard Plateau and Anass Nagih Chapter 9 Integer Quadratic Knapsack Problems 243 Dominique Quadri, Eric Soutif and Pierre Tolla Chapter 10 Graph Coloring Problems 265 Dominique De Werra and Daniel Kobler Part II New Approaches 311 Chapter 11 Polynomial Approximation 313 Marc Demange and Vangelis Th. Paschos Chapter 12 Approximation Preserving Reductions 351 Giorgio Ausiello and Vangelis Th. Paschos Chapter 13 Inapproximability of Combinatorial Optimization Problems 381 Luca Trevisan Chapter 14 Local Search: Complexity and Approximation 435 Eric Angel, Petros Christopoulos and Vassilis Zissimopoulos Chapter 15 On-line Algorithms 473 Giorgio Ausiello and Luca Becchetti Chapter 16 Polynomial Approximation for Multicriteria Combinatorial Optimization Problems 511 Eric Angel, Evripidis Bampis and Laurent Gourves Chapter 17 An Introduction to Inverse Combinatorial Problems 547 Marc Demange and Jérôme Monnot Chapter 18 Probabilistic Combinatorial Optimization 587 Cecile Murat and Vangelis Th. Paschos Chapter 19 Robust Shortest Path Problems 615 Virginie Gabrel and Cécile Murat Chapter 20 Algorithmic Games 641 Aristotelis Giannakos and Bangelis Paschos Chapter 21 Combinatorial Optimization with Competing Agents 675 Diodato Ferraioli, Laurent Gourvès, Stefano Moretti, Fanny Pascual and Olivier Spanjaard General Bibliography 707 List of Authors 767 Index 773 Summary of Other Volumes in the Series 781

    Out of stock

    £237.56

  • Applications of Combinatorial Optimization

    ISTE Ltd and John Wiley & Sons Inc Applications of Combinatorial Optimization

    Out of stock

    Book SynopsisCombinatorial optimization is a multidisciplinary scientific area, lying in the interface of three major scientific domains: mathematics, theoretical computer science and management. The three volumes of the Combinatorial Optimization series aim to cover a wide range of topics in this area. These topics also deal with fundamental notions and approaches as with several classical applications of combinatorial optimization. Concepts of Combinatorial Optimization, is divided into three parts: - On the complexity of combinatorial optimization problems, presenting basics about worst-case and randomized complexity; - Classical solution methods, presenting the two most-known methods for solving hard combinatorial optimization problems, that are Branch-and-Bound and Dynamic Programming; - Elements from mathematical programming, presenting fundamentals from mathematical programming based methods that are in the heart of Operations Research since the origins of this field.Table of ContentsPreface xiii Chapter 1 Airline Crew Pairing Optimization 1 Laurent Alfandari and Anass Nagih Chapter 2 The Task Allocation Problem 23 Moaiz Ben Dhaou and Didier Fayard Chapter 3 A Comparison of Some Valid Inequality Generation Methods for General 0-1 Problems 49 Pierre Bonami and Michel Minoux Chapter 4 Production Planning 73 Nadia Brauner, Gerd Finke and Maurice Queyranne Chapter 5 Operations Research and Goods Transportation 111 Teodor Gabriel Crainic and Frédéric Semet Chapter 6 Optimization Models for Transportation Systems Planning 177 Teodor Gabriel Crainic and Michael Florian Chapter 7 A Model for the Design of a Minimum-cost Telecomminications Network 209 Marc Demange, Cécile Murat, Vangelis Th. Paschos and Sophie Toulouse Chapter 8 Parallel Combinatorial Optimization 225 Van-Dat Cung, Bertrand Le Cun and Catherine Roucairol Chapter 9 Network Design Problems: Fundamental Methods 253 Alain Quilliot Chapter 10 Network Design Problems: Models and Applications 291 Alain Quilliot Chapter 11 Multicriteria Task Allocation to Heterogenous Processors with Capacity and Mutual Exclusion Constraints 327 Bernard Roy and Roman Slowinski General Bibliography 365 List of Authors 401 Index 405 Summary of Other Volumes in the Series 409

    Out of stock

    £141.26

  • Quality of Experience Engineering for Customer

    ISTE Ltd and John Wiley & Sons Inc Quality of Experience Engineering for Customer

    Out of stock

    Book SynopsisThe main objective of the book is to present state-of-the-art research results and experience reports in the area of quality monitoring for customer experience management, addressing topics which are currently important, such as service-aware future Internet architecture for Quality of Experience (QoE) management on multimedia applications. In recent years, multimedia applications and services have experienced a sudden growth. Today, video display is not limited to the traditional areas of movies and television on TV sets, but these applications are accessed in different environments, with different devices and under different conditions. In addition, the continuous emergence of new services, along with increasing competition, is forcing network operators and service providers to focus all their efforts on customer satisfaction, although determining the QoE is not a trivial task. This book addresses the QoE for improving customer perception when using added value services offered by service providers, from evaluation to monitoring and other management processes.Table of ContentsPreface xi Abdelhamid Mellouk Chapter 1 Challenges for Quality of Experience Engineering for Added Value Services 1 Abdelhamid Mellouk and Antonio Cuadra-Sanchez 1.1 Introduction and challenges 1 1.2 Contents 2 1.3 Conclusion 10 Chapter 2 An Ecosystem for Customer Experience Management 11 Antonio Cuadra-Sanchez, Mar Cutanda-Rodriguez, Andreas Aurelius, Kjell Brunnstrom, Jorge E. Lopez De Vergara, Martin Varela, Jukka-Pekka Laulajainen, Anderson Morais, Ana Cavalli, Abdelhamid Mellouk, Brice Augustin and Ismael Perez-Mateos 2.1 Introduction 11 2.2 Managing customer experience 12 2.3 Quality of experience ecosystem 14 2.4 IPNQSIS 23 2.5 NOTTS 25 2.6 Conclusions 28 2.7 Acknowledgments 28 2.8 Bibliography 28 Chapter 3 Measuring MPEG Frame Loss Rate to Evaluate the Quality of Experience in IPTV Service 31 Diego Hernando-Loeda, Jorge De Vergara, Javier Aracil, David Madrigal and Felipe Mata 3.1 Introduction 32 3.2 Related work 33 3.3 Method description 34 3.4 QoE prediction models 36 3.5 Network monitoring tool 43 3.6 Performance assessment 45 3.7 Conclusions and future work 48 3.8 Acknowledgments 49 3.9 Bibliography 49 Chapter 4 Estimating the Effect if Context on the QoE of Audiovisual Services 53 Toni Maki, Martin Varela and Jukka-Pekka Laulajainen 4.1 Introduction 53 4.2 Test content 55 4.3 Subjective tests in laboratory 57 4.4 Subjective tests at exhibition 58 4.5 Results 60 4.6 Conclusions and further work 69 4.7 Bibliography 70 Chapter 5 IPTV Multiservice QoE Management System 73 Antonio Cuadra-Sanchez, Mar Cutanda-Rodriguez, Alfredo Perez-Montero Eugenio Rogles, Jesus Gutierrez and Fernando Jaureguizar 5.1 Introduction 73 5.2 State of the art 75 5.3 Multiservice IPTV probe 80 5.4 QoE management system 85 5.5 Conclusions 90 5.6 Acknowledgments 90 5.7 Bibliography 90 Chapter 6 High Speed Multimedia Flow Classification 93 Rafael Leira Osuna, Pedro Gomez Nieto, Ivan Gonzalez and Jorge E. Lopez De Vergara 6.1 Introduction 93 6.2 The architecture 95 6.3 Validation 110 6.4 Conclusions 114 6.5 Acknowledgments 115 6.6 Bibliography 115 Chapter 7 User Driven Server Selection Algorithm for CDN Architecture 119 Said Hoceini, Hai Anh Tran and Abdelhamid Mellouk 7.1 Introduction 119 7.2 Multi-armed bandit formalization 122 7.3 Server selection schemes 136 7.4 Our proposal for QoE-based server selection method 136 7.5 Experimental results 139 7.6 Acknowledgments 146 7.7 Conclusion 147 7.8 Bibliography 147 Chapter 8 QoE Approaches for Adaptive Transport of Video Streaming Media 151 M. Sajid Mushtaq, Brice Augustin and Abdelhamid Mellouk 8.1 Introduction 151 8.2 Adaptive video transport 153 8.3 Microsoft Smooth Streaming 156 8.4 Apple HTTP live streaming 158 8.5 Adobe HTTP dynamic streaming 159 8.6 MPEG-dynamic adaptive streaming over HTTP 159 8.7 The goals of adaptive video streaming 161 8.8 Quality metrics for video streaming 162 8.9 The role of TCP in adaptive video streaming 163 8.10 Bibliography 168 Chapter 9 QoS and QoE Effects of Packet Losses in Multimedia Video Streaming 171 Rene Serral-Gracia, Eva Marin-Tordera, Xavier Masip-Bruin and Marcelo Yannuzzi 9.1 Introduction to the overall scenario 171 9.2 Related work 173 9.3 Multilayer performance metrics 174 9.4 QoE multilayer metric and quality assessment mechanism 178 9.5 Video streaming use case: peer-to-peer television (P2PTVG) 180 9.6 Conclusions and further actions 189 9.7 Bibliography 189 Chapter 10 A Model for Quality of Experience Estimation Based on Quality of Service Parameter Monitoring for Multimedia Convergent Services (3-Play) 191 Pedro De La Cruz Ramos, Raquel Perez Leal, Francisco Gonzalez Vidal and Luis Bellido Triana 10.1 Introduction 191 10.2 Presentation of the model 193 10.3 Application of the model to convergent (3P) services 196 10.4 Quality evaluation process 199 10.5 Model testing 218 10.6 Conclusions and future work 219 10.7 Acknowledgments 220 10.8 Bibliography 220 Chapter 11 Quality of Experience Estimation in Networks 225 Frederic Guyard, Martin Varela, Lea Skorin-Kapov, Antonio Cuadra-Sanchez and Pedro J. Sevilla-Ramos 11.1 Introduction 225 11.2 QuEEN terminology and concepts 226 11.3 Modeling the QoE, The ARCU model 229 11.4 The QuEEN layered model 232 11.5 Applications 235 11.6 Conclusions 240 11.7 Acknowledgments 241 11.8 Bibliography 241 Chapter 12 QoE-Based Network Selection in Heterogeneous Environments 245 Kandaraj Piamrat, Hyunhee Park, Kamal DEEP Singh and Cesar VIHO 12.1 Introduction 245 12.2 Network selection in homogeneous environments: a use case in WLAN 248 12.3 Related work for network selection in the heterogeneous environment 251 12.4 QoE-based network selection in heterogeneous networks 254 12.5 Conclusions and discussions 262 12.6 Bibliography 263 List of Authors 267 Index 271

    Out of stock

    £125.06

  • Graph-related Optimization and Decision Support

    ISTE Ltd and John Wiley & Sons Inc Graph-related Optimization and Decision Support

    Out of stock

    Book SynopsisConstrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two main components, the objective is to accomplish the feasible set framed by the system constraints. The aim of this book is expose optimization problems that can be expressed as graphs, by detailing, for each studied problem, the set of nodes and the set of edges. This graph modeling is an incentive for designing a platform that integrates all optimization components in order to output the best solution regarding the parameters' tuning. The authors propose in their analysis, for optimization problems, to provide their graphical modeling and mathematical formulation and expose some of their variants. As a solution approaches, an optimizer can be the most promising direction for limited-size instances. For large problem instances, approximate algorithms are the most appropriate way for generating high quality solutions. The authors thus propose, for each studied problem, a greedy algorithm as a problem-specific heuristic and a genetic algorithm as a metaheuristic.Table of ContentsContributors, vi Preface, viii Section 1: General Review Section 1 Horse of a different color: Peculiarities of equine pharmacology, 3Lara Maxwell 2 Basics of antimicrobial therapy for the horse, 16Cynthia Cole 3 Anesthesia and sedation in the field, 44Jennifer E. Carter 4 Clinical application of equine analgesics, 63Sheilah A. Robertson and L. Chris Sanchez 5 Pharmacology of nonsteroidal anti-inflammatory drugs, 76Cynthia Cole 6 Parasiticides for use in horses, 85Tad Coles and Randy Lynn 7 Foals are not just mini horses, 99K. Gary Magdesian 8 Fluids and electrolytes for the equine clinician, 118Brett Tennent-Brown 9 Drug and medication control programs in equine athletes, 131Scot Waterman and Jennifer Durenburger Section 2: Therapeutics: A Systems Approach 10 Clinical pharmacology of the respiratory system, 139Melissa R. Mazan and Michelle L. Ceresia 11 Clinical application of gastrointestinal therapeutics, 183L. Chris Sanchez 12 Treatment of equine nervous system disorders, 192Cynthia Cole and Bradford Bentz 13 Clinical pharmacology of the equine musculoskeletal system, 218Bradford Bentz 14 Therapy of the eye, 254Amber Labelle 15 Pharmacological treatment of equine endocrine diseases, 270Dianne McFarlane 16 Equine cardiovascular clinical pharmacology, 279Meg Sleeper 17 Clinical pharmacology of diseases of the equine urinary system, 291Nora Nogradi and Balazs Toth Index, 308

    Out of stock

    £125.06

  • Information and Knowledge System

    ISTE Ltd and John Wiley & Sons Inc Information and Knowledge System

    Out of stock

    Book SynopsisThe purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions to be asked throughout the engineering process and, in particular, about the impact designers’ choices have on these systems. This therefore involves identifying the elements of the problem of decision support systems engineering: the main objects and dimensions to be considered and the relationships they involve, issues at the levels of the decision-maker, of the organization (and even of society), the general approach to which to subscribe and so on. Table of ContentsPREFACE vii INTRODUCTION xi CHAPTER 1. INFORMATION SYSTEMS AND DIGITAL TECHNOLOGY 1 1.1. The concept of information systems 1 1.2. History of the concept of information systems 5 1.2.1. The centralized processing stage (1950s–1960s) 5 1.2.2. The data decentralization stage (1970s–1990s) 6 1.2.3. The interoperability and standardization stage (1990s) 6 1.2.4. The universality and globalization stage (2000 onward) 7 1.3. What is “digital” technology? 9 1.4. Information systems and digital technology for business 11 1.5. Key points 15 CHAPTER 2. KNOWLEDGE MANAGEMENT 17 2.1. Historical overview 18 2.2. Knowledge Management: two dominant approaches 20 2.2.1. The technological approach 21 2.2.2. The managerial and sociotechnical approach to KM 22 2.3. Specific management principles for KM 23 2.3.1. Definition of Knowledge Management 24 2.3.2. The organizational context 24 2.3.3. The vision 26 2.3.4. Guiding principles 27 2.3.5. Ad hoc infrastructures 28 2.3.6. Generic KM processes 31 2.3.7. Methods and tools for KM 34 2.4. A model for general knowledge management within the enterprise (MGKME) 36 2.4.1. Description of the MGKME 36 2.4.2. State indicators for knowledge management systems 40 2.5. Conclusions 42 2.6. Key points 43 CHAPTER 3. THE ENTERPRISE’S INFORMATION AND KNOWLEDGE SYSTEM (EIKS) 45 3.1. Basic theories 45 3.1.1. Three fundamental postulates 45 3.1.2. Creation of individual and tacit knowledge 47 3.1.3. Commensurability of interpretative frameworks 50 3.1.4. Conditions in which knowledge can be assimilated to an object 50 3.2. The enterprise’s information and knowledge system 52 3.3. A knowledge system is not a knowledge-based system 54 3.4. Evolution of an EIKS 59 3.5. Representative example of an EIKS 59 3.5.1. Presentation of the context 60 3.5.2. EIKS in this context 61 3.6. Key points 63 CONCLUSIONS AND PERSPECTIVES 65 APPENDIX. SEVEN GOLDEN RULES FOR SUCCESSFUL KNOWLEDGE MANAGEMENT 69 BIBLIOGRAPHY 75 INDEX 83

    Out of stock

    £125.06

  • Decision-Making and the Information System

    ISTE Ltd and John Wiley & Sons Inc Decision-Making and the Information System

    Out of stock

    Book SynopsisThe purpose of this book is to question the relationships involved in decision making and the systems designed to support it: decision support systems (DSS). The focus is on how these systems are engineered; to stop and think about the questions to be asked throughout the engineering process and, in particular, about the impact designers’ choices have on these systems. Table of ContentsINTRODUCTION ix CHAPTER 1. DECISION-MAKING 1 1.1. Normative theory versus engineering theory 3 1.2. The decision process 5 1.2.1. Simon’s IDC model 5 1.2.2. Supplementing the IDC model 8 1.2.3. Structuring decisions 10 1.2.4. Defined problems (tame) and undefined problems (wicked) 10 1.2.5. Group decision-making 12 1.3. Decision-making within the organization 13 1.3.1. Managing a complex system 13 1.3.2. The main components of the management system 15 1.3.3. Indicator, index and information useful to the decision maker 20 1.3.4. Typology of objectives and indicators 22 1.3.5. Support to define the global management system or support for action decisions? 24 1.3.6. Management levels 27 1.3.7. Toward decision support for the three management levels 30 1.3.8. Standardizing decisions 31 1.3.9. Taking into account the dynamic of organizations and their environment 32 1.4. Changes to management within organizations 33 1.4.1. Connections with the environment 33 1.4.2. Boundaries 34 1.4.3. Innovation 36 1.4.4. Requirements linked to information systems 36 1.4.5. Changes to public institutions: territorial authorities 39 CHAPTER 2. DECISION SUPPORT SYSTEMS 43 2.1. DSS: definitions and typologies 44 2.1.1. Definitions 44 2.1.2. Standard components of a decision support system 47 2.1.3. Typologies of decision support systems 48 2.1.4. A brief history of research in the domain 51 2.1.5. Business intelligence 53 2.1.6. A specific type of decision support tool: Big Data 55 2.1.7. Criticisms leveled at business intelligence 62 2.2. DSS engineering 62 2.2.1. The components of a design method for IT systems or DSS 63 2.2.2. Requirements engineering (not specific to DSS) 69 2.2.3. Requirements engineering for DSS 75 CHAPTER 3. THE INFLUENCE OF DSS ON DECISION-MAKING AND ASSOCIATED RISKS 89 3.1. Factors influencing decision-making 90 3.1.1. The three types of problem-solving error 92 3.1.2. The role of perspectives in problem formulation 93 3.1.3. Mental representations, worldviews and beliefs 94 3.1.4. The influence of management technologies 97 3.1.5. IS: performative systems 98 3.1.6. Indicators: an extreme case of reduced complexity 99 3.1.7. IT: a technology of representations 101 3.1.8. DSS: support and/or constraint? 103 3.1.9. Big Data: a massive “effect of reality” 104 3.1.10. DSS as systems of influence: persuasive technologies 105 3.1.11. Conclusion 108 3.2. Risks linked to the use of DSS in decision-making 108 3.2.1. Inaccuracies in the results produced 109 3.2.2. Confusing the map and the territory 112 3.2.3. The risk of losing diversity 114 3.2.4. Toward more and more predictivity? 117 3.2.5. Exacerbated risks in the case of decisions defining the management system 123 CHAPTER 4. ELEMENTS FOR ETHICAL DSS DESIGN 127 4.1. Computer ethics 129 4.1.1. A brief history 129 4.1.2. Ethical theories 131 4.1.3. The values of computer ethics 134 4.1.4. Ethics in IT system development 136 4.2. Ethics in DSS development 138 4.2.1. A brief history/state-of-the-art 138 4.2.2. A reminder of the issues 144 4.2.3. Design phases to be favored 147 4.2.4. Conclusion 149 4.3. Our contribution to an engineering of responsibility 149 4.3.1. The doxai, principles and norms (DPN) model 150 4.3.2. Applying the DPN model for evaluation 154 GENERAL CONCLUSION 161 BIBLIOGRAPHY 167 INDEX 187

    Out of stock

    £125.06

  • Medical Information Systems Ethics

    ISTE Ltd and John Wiley & Sons Inc Medical Information Systems Ethics

    Out of stock

    Book SynopsisThe exponential digitization of medical data has led to a transformation of the practice of medicine. This change notably raises a new complexity of issues surrounding health IT. The proper use of these communication tools, such as telemedicine, e-health, m-health the big medical data, should improve the quality of monitoring and care of patients for an information system to "human face". Faced with these challenges, the author analyses in an ethical angle the patient-physician relationship, sharing, transmission and storage of medical information, setting pins to an ethic for the digitization of medical information. Drawing on good practice recommendations closely associated with values, this model is developing tools for reflection and present the keys to understanding the decision-making issues that reflect both the technological constraints and the complex nature of human reality in medicine .Table of ContentsINTRODUCTION ix CHAPTER 1. THE EMERGENCE OF MEDICAL INFORMATION IN THE FACE OF PERSONAL AND SOCIETAL ETHICAL CHALLENGES 1 1.1. An information-consuming society 2 1.2. e-Health, m-health, the Quantified Self and Big Data 5 1.3. Medical secrecy in the face of the computerization of healthcare data 18 1.3.1. Regulatory characteristics of medical secrecy 19 1.3.2. Protection of healthcare data 24 1.4. Cultural evolution of mentalities surrounding legitimacy of information 28 1.5. Processing of personal data in law 30 1.5.1. European regulations concerning the processing of medical data 32 1.5.2. American legal framework surrounding personal healthcare data 39 1.5.3. Laws pertaining to personal data in Asia 42 CHAPTER 2. ETHICAL MODELING: FROM THE DESIGN TO THE USE OF AN INFORMATION SYSTEM 45 2.1. Info-ethics: data on practical wisdom 47 2.1.1. Epistemological illumination around the pyramid of knowledge 48 2.1.2. From data to knowledge through an information system 52 2.1.3. Quality and choice of medical information 56 2.2. Identification of method used to develop the ethical analysis model 61 2.3. Development of the ethical analysis space 68 2.4. Presentation of the ethical model 74 2.4.1. Ethical cube of an accepted contingency 75 2.4.2. Ethical model of information system in the doctor–patient relationship 78 2.4.3. Ethical modeling of medical communication 88 2.4.4. Process of creation of practical wisdom via neo-Platonic systemic ethical modeling 95 2.4.5. Ethical inductive algorithmic governance (;;, G, ;;) 108 2.4.6. Toward a selective ranking of medical data 113 CHAPTER 3. USES OF THIS ETHICAL MODEL 119 3.1. Implementing the ethical model 119 3.1.1. Implementing the model on the major aims of an information system 121 3.1.2. Implementation of the model in the general creation of an information system 131 3.2. Presentation of the study’s questionnaires 131 3.3. Necessary environmental changes for healthcare information systems: recommendations and actions 134 3.3.1. From a structural and technological perspective 137 3.3.2. From a strategic and methodological perspective 141 3.3.3. From an organizational and regulatory perspective 146 3.3.4. From a relational and cultural perspective 153 3.4. Creating an ethical charter on the “ideal” computational tool for a healthcare establishment 158 3.4.1. Missions and areas of action 158 3.4.2. Contents 160 CHAPTER 4. ETHICS-ORIENTED PERSONALIZED MEDICINE 165 4.1. The evolution of society toward an ethical ideal based on information 166 4.2. The doctor–patient–IS triangulation 174 4.2.1. Man–machine interface 175 4.2.2. Data compression 178 4.2.3. Flexibility and technical adaptation to the users 180 4.2.4. Shared knowledge engineering 182 4.3. Ethical use of an information system in healthcare 184 4.4. Ethics-oriented personalized medicine 189 4.4.1. Value of management 190 4.4.2. Ethical management 191 4.5. Tool for the establishment and constant improvement of information systems for ethical practice in hospitals 194 4.5.1. Construction of the dashboards 195 4.5.2. Methodology of implementation and use 212 CONCLUSIONS 221APPENDIX 1 225 APPENDIX 2 229 APPENDIX 3 233 APPENDIX 4 235 APPENDIX 5 243 APPENDIX 6 245 BIBLIOGRAPHY 247 INDEX 261

    Out of stock

    £125.06

  • Supply Chain Management and its Applications in

    ISTE Ltd and John Wiley & Sons Inc Supply Chain Management and its Applications in

    Out of stock

    Book SynopsisSupply chain management is a key topic for a large variety of strategic decision problems. It is essential in making efficient decisions related to the management of inventory and the delivery of final products to customers. The focus of this book is the understanding of the supply chain taxonomy, the different levels of decision and the impact of one level on another depending on the modeling of the addressed objectives. The authors explore the potential problems that can be addressed within the supply chain, such as the inventory, the transportation and issues of holding, and find applications in numerous fields of study, from cloud computing and networking through to industrial sciences. The reader can find each issue described and its positioning in the supply chain determined. A computer science framework is also developed to show how the use of electronic platforms can aid in the handling of these potential problems.Trade Review"The reader can fi nd each issue described and its positioning in the supply chain determined. A computer science framework is also developed to show how the use of electronic platforms can aid in the handling of these potential problems." (Zentralblatt MATH 2016)Table of ContentsList of Figures ix List of Tables xi Glossary xiii Introduction xv Chapter 1. Preliminaries in Decision-Making 1 1.1. Introduction 1 1.2. Decision-making problems 2 1.3. Optimization modeling of a decision problem 3 1.3.1. Notation 4 1.3.2. Features of an optimization problem 5 1.3.3. A didactic example 6 1.4. Game theory modeling of a decision problem 7 1.4.1. Notation 7 1.4.2. The coalition formation problem 8 1.4.3. The stability concepts 10 1.5. Allocation methods 11 1.5.1. Shapley value allocation 11 1.6. Conclusion 12 Chapter 2. Introduction to Supply Chain Management 13 2.1. Introduction 13 2.2. Main elements of the supply chain 13 2.3. Main activities in the supply chain 18 2.3.1. The ordering problem 18 2.3.2. The warehousing problem 19 2.3.3. The transportation problem 19 2.3.4. The inventory problem 20 2.3.5. Computer science applications in supply chain management 21 2.4. Decision levels in the supply chain 22 2.4.1. Strategic level 23 2.4.2. Tactical level 23 2.4.3. Operational level 23 2.5. Conclusion 23 Chapter 3. The Ordering Problem 25 3.1. Introduction 25 3.2. Terminology 26 3.3. The one supplier–one retailer ordering problem 26 3.3.1. An example of the one–one ordering problem 28 3.3.2. Summary 28 3.4. The one supplier–multiple retailers ordering problem 29 3.4.1. Fixed purchasing price 30 3.4.2. An example of the 1 − n ordering problem 30 3.4.3. Quantity-dependent purchasing price 30 3.5. The multiple suppliers–one retailer ordering problem 31 3.6. The multiple suppliers–multiple retailers ordering problem 32 3.7. Conclusion 36 Chapter 4. The Warehousing Problem 37 4.1. Introduction 37 4.2. Problem description 38 4.2.1. Terminology 39 4.2.2. Inputs/outputs of the WP 40 4.2.3. WP variants 40 4.3. WP with variable cost/without conflicts 42 4.3.1. Mathematical formulation 42 4.3.2. An example 42 4.4. WP with fixed cost/without conflicts 44 4.4.1. Mathematical formulation 44 4.4.2. An example 44 4.5. WP with variable cost/with conflicts 46 4.5.1. Mathematical formulation 47 4.5.2. An example 47 4.6. WP with fixed cost/with conflicts 50 4.6.1. Mathematical formulation 50 4.6.2. An example 50 4.7. A DSS design for the warehousing problem 53 4.8. Example 54 4.9. Answer 55 4.10. Conclusion 56 Chapter 5. Inventory Management 57 5.1. Introduction 57 5.2. Definition of inventory management 58 5.3. Purposes of inventory 59 5.4. Inventory modeling 59 5.4.1. Terminology 60 5.4.2. Economic order quantity model 60 5.4.3. Examples 61 5.5. Conclusion 63 Chapter 6. The Delivery in the Supply Chain 65 6.1. Introduction 65 6.2. The delivery process in the SC 67 6.3. Problem description 68 6.3.1. Terminology 70 6.3.2. Inputs/outputs of the delivery 70 6.3.3. Delivery variants 70 6.4. First Variant: delivery with capacitated trucks 70 6.4.1. CVRP specification 71 6.4.2. Mathematical formulation of the CVRP 71 6.5. Second Variant: delivery with time windows 72 6.5.1. VRPTW specification 72 6.5.2. Mathematical formulation of the VRPTW 73 6.6. A real case study: the case of Tunisia 74 6.7. Alternative resolution approaches for the delivery problem 75 6.7.1. A tabu search approach for solving the delivery problem 75 6.7.2. A genetic algorithm for solving the delivery problem 76 6.8. A DSS design for the delivery problem 78 6.9. Conclusion 79 Bibliography 81 Index 85

    Out of stock

    £125.06

  • ERP and Information Systems: Integration or

    ISTE Ltd and John Wiley & Sons Inc ERP and Information Systems: Integration or

    Out of stock

    Book SynopsisThis research attempts to explore and identify eventual relationships between the evolution of ERP systems and information systems integration or disintegration. The aim of this research is to know if the relationships between the ERP systems and the information systems are guided by certain factors and, as a result, to understand, more in-depth, the factors affecting these relationships. More precisely, this analysis aims to study whether assigned values given to these factors could guide the evolution of ERP systems in a manner that promotes IS integration; and if the opposite assigned values to these same factors could guide the evolution of ERP systems in a manner that provokes IS disintegration instead.Table of ContentsForeword ix Introduction xi Chapter 1. Definition of Research Terms 1 Chapter 2. ERP: Contribution and Trends 9 2.1. ERP as an indicator of integration for information systems 9 2.2. Trends for ERP implementation within the framework of the information system 10 2.3. Trends for ERP evolution toward a new generation (2nd G) 13 Chapter 3. The Research Question and Methodology 15 Chapter 4. Literature Review: Factors Affecting the Relationships between the ERP System’s Evolution and IS Integration or Disintegration 21 4.1. Economic crisis and COmpetitiveness (ECCO) 29 4.2. Total dependency on the ERP vendor (TDEV) 32 4.3. Project management ERP (PMER) 34 4.4. INTEroperability of the ERP (INTE) 36 4.5. Evolution strategy of existing systems (ESES) 38 4.5.1. Urbanization 38 4.5.2. Total overhaul 39 4.6. Complexity of ERP (COER) 41 4.7. Evolution strategy of ERP vendors (ESEV) 43 Chapter 5. Correlation Between Research Factors 49 5.1. Correlations between economic crisis and competitiveness (ECCO) and PMER and INTE and COER 50 5.2. Correlations between ECCO and PMER and INTE and ESEV 51 5.3. Correlations between ECCO and PMER and COER and ESEV 51 5.4. Correlations between ECCO and TDEV and PMER 52 5.5. Correlations between ECCO and ESES and COER 52 5.6. Correlations between ECCO and ESES and ESEV 52 5.7. Correlations between PMER and ESES and ESEV 53 5.8. Correlations between INTE and ESES and COER 53 5.9. Correlation between ECCO and TDEV 53 5.10. Correlation between ECCO and PMER 54 5.11. Correlation between ECCO and INTE 56 5.12. Correlation between ECCO and ESES 56 5.13. Correlation between ECCO and COER 58 5.14. Correlation between ECCO and ESEV 59 5.15. Correlation between TDEV and INTE 60 5.16. Correlation between TDEV and ESES 61 5.17. Correlation between PMER and INTE 62 5.18. Correlation between PMER and ESES 62 5.19. Correlation between PMER and COER 63 5.20. Correlation between PMER and ESEV 64 5.21. Correlation between INTE and ESES 64 5.22. Correlation between INTE and COER 66 5.23. Correlation between INTE and ESEV 66 5.24. Correlation between COER and ESEV 67 Chapter 6. Case Studies 71 6.1. Hershey 71 6.1.1. Case outcome and evaluation 74 6.2. FoxMeyer Drugs 75 6.2.1. Case outcome and evaluation 76 6.3. Oracle Corporation’s E-Business Suite 76 6.3.1. Case outcome and evaluation 78 6.4. Summary of case studies 78 Chapter 7. Discussion: Relationships between Evolution of ERP Systems and IS Integration or Disintegration 81 7.1. TDEV and ECCO 81 7.2. TDEV and INTE 82 7.3. PMER and ESES 83 7.4. COER and PMER 83 7.5. INTE and ESES 84 7.6. COER and INTE 84 7.7. ESEV and INTE 85 7.8. COER and ESEV 86 Chapter 8. Interests and Limitations of the Research 91 Conclusion 93 Bibliography 99 Index 119

    Out of stock

    £125.06

  • Digital Organizations Manufacturing: Scripts,

    ISTE Ltd and John Wiley & Sons Inc Digital Organizations Manufacturing: Scripts,

    Out of stock

    Book SynopsisIn what sort of assemblages, the strategies and digital policies in organization are made? Beyond digital mantras and management slogans/fictions, what is the concrete factory of information management system? What are the parts of the human and no human actors? Is it possible to create a new approach to understand how work change (or not), to explore the potential for a social and cognitive innovation way, considering simultaneously the increase of Data Management and the organizational analytics?Table of ContentsIntroduction ix Chapter 1. Manufacturing the Organization, Manufacturing Scripts 1 1.1. Pragmatic sociology and the pragmatism of scripts 1 1.1.1. A few requirements 1 1.1.2. A few trials 9 1.1.3. Following the scripts in action 12 1.2. Setting the stage 21 1.2.1. Two gray suits at the Belmont bar 21 1.2.2. A parade of participants 24 1.3. Moeva “Beta”: building a theatre of operations 28 1.3.1. The English temptation and the IBM test 28 1.3.2. “We want to think for ourselves!” 30 1.3.3. Writing the management script: its manufactured-manufacturing making 33 1.3.4. What happens in a recruiter’s office? 37 1.4. Extension and celebration 39 1.4.1. Going forward, even blindly 39 1.4.2. Making newcomers into allies 40 1.4.3. The first debates 42 1.4.4. Self-glorification: setting the stage for September 2001 45 1.5. Years of continuous developments and testing 47 1.5.1. The intranet mobility takes over the transformation of the modes of cooperation 47 1.5.2. Third identity and access policies 49 1.5.3. In search of external recognition 50 1.5.4. “Villepin’s 100 days” 51 1.5.5. Conflicts and paths of rationalities 54 1.6. The designation and description of the scripts 58 1.6.1. Scripts put to the test of professional criticism 58 1.6.2. Naming and distinguishing scripts 64 1.7. Models 70 1.7.1. Cycles and dynamics 70 1.7.2. Other dynamics 75 Chapter 2. Performation: Out of Bounds (and Beyond Language) 81 2.1. The question of performativity, at the heart of the production of digital organizations 81 2.1.1. Inheritance and openings 81 2.1.2. On the extension of performation 97 2.1.3. Performation: a discussion on the proposed configurations of M. Callon 101 2.2. Digital organizational assemblages: towards a general narratique 106 2.2.1. Stories: Theorico-orthodox and desirable performations 106 2.2.2. The narratique: self-referentiality and autopoiesis dimensions 115 2.2.3. Narrative and celebratory practices (examples of intranets) 121 2.2.4. Hetero-poietic narratives connected to outside forces 128 2.2.5. “Revolutionary” narratives and innovative reasoning 134 2.2.6. From a “network-centric” narrative to a “data-centric” narrative: the breviary of recent years 140 2.3. The case of Open Data public policies: the processes of performation at work 157 2.3.1. On maintaining the desire for data and barometers 158 2.3.2. Visualizations and format pivots: techno-political writings 166 Chapter 3. Monitoring Assemblages and their Semiopolitics in Action 173 3.1. Interfaces and semiopolitical regimes 173 3.1.1. Machines and interfaces: some pointers 174 3.1.2. Molar/molecular and D/T/R 179 3.1.3. Organizational semiopolitic regimes 184 3.1.4. A digital and organizational spatium 198 3.1.5. Case study: digital discrimination at work 207 3.2. Corporate sociodigital economy 217 3.2.1. Data management and social engineering 217 3.2.2. Views of the network 223 3.2.3. Opacity/transparency 224 3.2.4. Recommendations 226 3.2.5. Graphs 228 3.2.6. Organizational network analysis 230 3.3. Prospects for the analysis of sociodigital assemblages 232 3.3.1. A polemology of networks? 232 3.3.2. Conflicts in networks: employees on the Web 234 3.3.3. Digital methods at work 245 3.3.4. Inhabiting and describing the assemblages: a program in the service of the analyses of the organization and managerial approaches involving digital humanities 262 Bibliography 273 Index 291

    Out of stock

    £125.06

  • The Art of War in the Network Age: Back to the

    ISTE Ltd and John Wiley & Sons Inc The Art of War in the Network Age: Back to the

    Out of stock

    Book SynopsisPrevious studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to categories of classic strategic theory. In the first two chapters, the author establishes the context of the book, coming back to the epistemology of revolution in military affairs and its terminology. The third chapter examines the political bases of strategic action and operational strategy, before the next two chapters focus on historical construction of the process of getting to know your opponents and the way in which we consider information collection. Chapter 6 returns to the process of “informationalization” in the doctrine of armed forces, especially in Western countries, and methods of conducting network-centric warfare. The final chapter looks at the attempts of Western countries to adapt to the emergence of techno-guerrillas and new forms of hybrid warfare, and the resulting socio-strategic outcomes.Table of ContentsIntroduction ix Chapter 1. Approaching Military Revolutions 1 1.1. Lexical varieties 3 1.1.1. MTR versus RMA 4 1.1.2. Military revolutions versus RMAs 6 1.1.3. Reassessing the notion of military revolution 9 1.1.4. An incomplete RMA? From revolution to transformation 11 1.2. Types of RMA 13 1.2.1. An example of techno-centric classification 13 1.2.2. Unlikely revolutions 15 1.2.3. Cohen and the "revolutionary types" 16 1.2.4. RMA schools at the turn of the millennium 19 Chapter 2. The Epistemology of RMA 23 2.1. Longue durée, conjoncture and event history … outdated? 24 2.2. RMA as a result of a long-term evolution? 25 2.2.1. From evolutionary to revolutionary longue durée 26 2.2.2. The eternal moment of changing epochs: RMA and postmodernity 28 2.2.3. An overused post-modernity, an assumed post-industrialism 32 2.2.4. The building of a revolution 35 2.3. Confronting the distinctive aspects of military revolutions 39 2.3.1. An anhistorical RMA? 39 2.3.2. Breaks and discontinuities 43 Chapter 3. A Paradigm Shift 49 3.1. A strategic consensus around the "paradigm shift" 49 3.1.1. Paradigm pluralities 50 3.1.2. The place of politics: scientific-rational and historical paradigms 52 3.1.3. The question of levels of engagement 54 3.1.4. A rethinking of strategy as an art 58 3.2. Strategy of means and RMA 63 3.2.1. A hidden revolution? RMA and genetic strategy 64 3.2.2. A failed revolution? RMA and industrial strategy 68 Chapter 4. Understanding (1): Piercing the Fog of War in Fluid Spaces 75 4.1. Strategy of fluid spaces 77 4.1.1. The fluid and the solid 78 4.1.2. SAGE, the first network-centric system 79 4.2. Fluidifying global spaces? 85 4.2.1. Figures of the fluidification of aerospatial spaces 87 4.2.2. Fluidification by reticulation 89 4.2.3. Operating in mixed spaces: generating political effect 92 Chapter 5. Understanding (2): Fluidifying the Solid? 99 5.1. The electronic battlefield 101 5.1.1. The Vietnam War 102 5.1.2. The European model of the RMA 104 5.2. The fragmentation of intelligence 110 5.2.1. Fragmenting and network-centering 110 5.2.2. The network-centric man 114 5.2.3. Uncertainty and new armies of the old regime 123 Chapter 6. Waging War in Network-centric Conditions 127 6.1. The kinematics of operations 127 6.1.1. On the conquest of time: chronostrategy 128 6.1.2. War and movement, war and command 134 6.1.3. Controlling and dominating 138 6.2. Waging war in networks 142 6.2.1. The paradox of the enemy: the (non-) responses to asymmetry and hybrid warfare 142 6.2.2. Future wars and wars in networks 145 6.2.3. Principles of war in the age of networks 148 Chapter 7. Striking in Network-centric Conditions 155 7.1. A paradoxical precision 156 7.1.1. Certainty of striking 157 7.1.2. Certain to succeed? 161 7.1.3. Wars lost by precision? 164 7.2. The retaliation against the Transformation: techno-guerillas and hybrid war 167 7.2.1. The state incubator 168 7.2.2. The true RMA and the future of war? 172 7.2.3. Adaptation by networks? 177 Conclusion 183 Glossary 187 Bibliography 191 Index 217

    Out of stock

    £125.06

  • Insider Threats

    ISTE Ltd and John Wiley & Sons Inc Insider Threats

    Out of stock

    Book SynopsisAn information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective.Table of ContentsList of Figures ix List of Scenarios xiii Preface xv Introduction xix Part 1. Information Systems: Technologies and People 1 Chapter 1. Components with Known Purposes: Technologies 3 1.1. Up to the end of the 19th Century: decreasing transmission time 4 1.2. From the end of the 19th Century: decreasing processing time 14 1.3. From the end of the 20th Century: facing massification 21 Chapter 2. Components with Interpretive Aspects: People 25 2.1. Tacit knowing or, how do we know? 26 2.1.1. The existence of tacit knowledge 26 2.1.2. Sense-giving and sense-reading: knowledge is tacit 27 2.2. The interpretative framework, the filter through which we create our knowledge 31 2.2.1. A tool for tacit knowing 31 2.2.2. The different types of interpretative frameworks 34 2.2.3. The commensurability of interpretative frameworks 37 2.3. The concept of incommensurability 38 2.3.1. From partial communication to incommensurability 39 2.3.2. Language – linking words to nature 41 2.3.3. Revolution – changing the meaning of words 44 2.4. Mental models, representations of reality 46 2.4.1. Incomplete representations 47 2.4.2. Cognitive representations 49 2.4.3. Shared mental models 50 2.4.4. Explaining mental models 51 Part 2. The Insider Threat 59 Chapter 3. The Three Categories of Insider Threats 61 Chapter 4. Unintentional 69 4.1. The quality of the stolen information 73 4.2. The case of apparently insignificant information that has hidden value 74 4.3. The case of information that can simply be asked for 78 4.4. The case of the information that will help you 81 Chapter 5. Intentional and Non-Malicious 83 5.1. Conflict between productivity and security 85 5.2. Workarounds, a factor for innovation or risk 88 5.2.1. Workarounds are an innovation 89 5.2.2. Workarounds are a risk 89 5.3. On non-malicious violations 90 5.3.1. Intentional behavior 91 5.3.2. Personal benefit without malicious intent 91 5.3.3. Voluntary breaking of the rules 92 5.3.4. Possible damage or risk to security 92 Chapter 6. Intentional and Malicious 95 6.1. The information is known; why not exploit it? 96 6.2. Organizational environment and cognitive processes of committing the act 99 6.2.1. For the organization, deterrence prevents maliciousness 100 6.2.2. For the employee, moral disengagement justifies maliciousness 103 6.3. Ease of deterrence 105 Conclusion 111 Bibliography 117 Index 127

    Out of stock

    £125.06

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account