Soft computing, as a collection of techniques exploiting approximation and tolerance for imprecision and uncertainty in traditionally intractable problems, has become very effective and popular especially because of the synergy derived from its components. The integration of constituent technologies provides complementary methods that allow...
For developers of computer-based systems, capturing and understanding the complex
functional requirements and behaviour of software components has come to
represent a considerable challenge. This book aims to equip readers with skills and
techniques which will help them to address this challenge. It does so by stressing
the value of...
In the past decade, the movement to lighter-weight and increasingly agile methods
has been the most significant change to affect the software enterprise since the
advent of the waterfall model in the 1970s. Originated by a variety of thought and
practice leaders and proven in real-world, successful experiments, the methods
have proven...
This book is about the use of techniques and tools for the design and implementation
of computer systems and software that are free from logical or functional flaws
(in the sense of functional requirements). The word rigorous in the title of this book
is justified by the fact that the arguments for such fault freeness have their roots...
When we rst started working on the problem of making the kernel machine
approach applicable to the classication of graphs a couple of years ago,
our eorts were mainly driven by the fact that kernel methods had led to
impressive performance results on many data sets. It didn't take us long to
appreciate the sheer elegance of how...
The Internet already is the broadest and most used source of legal information: in
the web one can find most statutory texts (all in some jurisdictions), a vast amount of
case law, huge repertoires of doctrinal contributions, many blogs and fora discussing
different legal issues. Moreover, as legal activities (legislative,...
Enterprise Java Beans enable rapid and simplified development of secure and portable applications based on Java technology. Creating and using EJBs can be challenging and rewarding. Among the challenges are learning the EJB technology itself, learning how to use the development environment you have chosen for EJB development, and the testing...
The third edition of this text contains key improvements and changes that continue to
provide instructors and students with the best information technology auditing text
available. This edition has been reorganized and expanded to address the internal control
and audit issues mandated by Sarbanes-Oxley legislation. The third edition...
A wide spectrum of research areas have contributed to the development of objectoriented
analysis and design methods. Within computing sciences objectorientation
has been developed in the fields of databases, programming languages, and system
engineering. Some indications of this development include the proliferation of objectoriented...
At last, here is a book about the computers that people really use, with practical tips about how to
use them. Practical PC provides a state-of-the-art introduction to Windows-based PCs, written in
an easy-to-read style. In addition to the printed book, you receive a multimedia version of the entire
textbook with videos and interactive...
Embedded computer systems are electronic systems that include a microcomputer to perform
specific dedicated tasks. The computer is hidden inside these products. Embedded
systems are ubiquitous. Every week millions of tiny computer chips come pouring out
of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,...
Computer programs arc fun to write, and well-written computer pro
grams are fun to read. One of life's greatest pleasures can be the
composition of a computer program that you know will be a pleasure
for other people to read, and for yourself to read.
Computer programs can also do useful work. One of life's greatest...