The new and exciting field of computational science, and in particular sim-
ulational science, has seen rapid change since the first edition of this book
came out. New methods have been found, fresh points of view have
emerged, and features hidden so far have been uncovered. Almost all the
methods presented in the first addition have...
Together the book and CD-ROM form a learning system that provides both investigative studies and the visualization of complex processes. A didactic concept is undertaken for microelectronics, computer technology and communication engineering, which deals with the visualization of signals and processes in addition to graphical programming of...
This volume was primarily intended to present selected papers from the workshop on Theory and Applications of Nested Relations and Complex Objects, held in Darmstadt, FRG, from April 6-8, 1987. Other papers were solicited in order to provide a picture of the field as general as possible. Research on nested relations and complex objects...
This book contains the proceedings of two long-running events held in connection
to the CAiSE conferences relating to the areas of enterprise, business-process and
information systems modeling:
• The 12th International Conference on Business Process Modeling, Development
and Support (BPMDS 2011)
• The 16th...
Network monitoring serves as basis for a wide scope of network operations, engineering
and management. Precise network monitoring involves inspecting every
packet traversing in a network. However, this is infeasible in today’s and future
high-speed networks, due to significant overheads of processing, storing, and transferring...
This book is the revised and extended version of a Pfr.D. dissertation submitted
to the Department of Electrical Engineering and Computer Sciences, University of
California at Berkeley. Many of the ideas presented in this book have their roots in
discussions with Eugene Wong, my mentor and thesis advisor. I would like to thank
Gene...
Model checking is a powerful approach for the formal verification of software. It automatically provides complete proofs of correctness, or explains, via counter-examples, why a system is not correct. Here, the author provides a well written and basic introduction to the new technique. The first part describes in simple terms the theoretical...
For half a century, computer scientists have been working on systems for discovering
lawful patterns in letters, numbers, words and images. The research
has expanded into the computational study of the process of scientific discovery,
producing such well-known AI programs as BACON and DENDRAL. However,
autonomous discovery systems...
The primary goal of this book is to present to the scientific and management
communities a selection of applications using more recent Soft Computing (SC)
and Computing with Words and Perceptions (CWP) models and techniques meant
to solve the economics and financial problems. The selected examples could also
serve as a starting point...
This monograph presents a comparison of methods for organizing very large amounts of stored data called a very large database to facilitate fast retrieval of desired information on direct access storage devices. In a very large data base involving retrieval and updating, the major factor of immediate concern is the average number of accesses...
Welcome to the proceedings of the 2004 International Conference on Embedded
and Ubiquitous Computing (EUC 2004) which was held in Aizu-Wakamatsu
City, Japan, 25–27 August 2004.
Embedded and ubiquitous computing are emerging rapidly as exciting new
paradigms and disciplines to provide computing and communication services...
CALCO, the International Conference on Algebra and Coalgebra in Computer
Science, is a high-level, bi-annual event formed by joining CMCS (the International
Workshop on Coalgebraic Methods in Computer Science) and WADT
(the Workshop on Algebraic Development Techniques). CALCO aims to bring
together researchers and practitioners with...