Knowledge of problem solving and programming concepts is necessary for those who
develop applications for users. Unfortunately, many students have greater difficulty
with problem solving than they do with the syntax of computer languages. The art of
programming is learning multiple techniques and applying those techniques to specific...
Databases are designed to support data storage, processing, and retrieval activities related to data management. The use of databases in various applications has resulted in an enormous wealth of data, which populates many types of databases around the world.
About four years ago David Luckham hinted to me the possibility of verifying
a "real" compiler. At that time the idea seemed unrealistic, even absurd. After
looking closer at the problem and getting more familiar with the possibilities of
the Stanford verifier a verified compiler appeared not so impossible after all. In...
Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled
with countless stories of product successes and failures— fickle consumer adoptions, clever marketing
campaigns that outsmart the best technologies, better packaging winning over better technology,
and products that are simply...
The decade of the 80's saw the dramatic expansion of high performance
computer graphics into domains previously able only to
irt with the technology. Among the most dramatic has been the incorporation of real-time
interactive manipulation and display for human gures. Though actively pur-
sued by several research groups, the...
At last, here is a book about the computers that people really use, with practical tips about how to
use them. Practical PC provides a state-of-the-art introduction to Windows-based PCs, written in
an easy-to-read style. In addition to the printed book, you receive a multimedia version of the entire
textbook with videos and interactive...
This is Volume 83 of the Advances in Computers, subtitled Security on the Web.
This series, continuously published since 1960, is the oldest series covering the
development of the computer industry. With the impact that the World Wide Web
has on every facet of our lives today, this volume focuses on the security aspect of
computing....
How to develop powerful mobile Web sites using popular content management systems (CMS)
Mobile is the hottest thing going—and developing content for mobile devices and browsers is even hotter than that. This book is your guide to it all—how to design, build, and deploy sites, blogs and services that...
Automatic speech recognition suffers from a lack of robustness with respect to
noise, reverberation and interfering speech. The growing field of speech recognition
in the presence of missing or uncertain input data seeks to ameliorate those
problems by using not only a preprocessed speech signal but also an estimate of
its...
The present book 1 provides a rigorous treatment and coherent presentation of
the consolidated results of the authors' work, over the past four years, on the
employment of logic programming as a representational and reasoning tool.
It comes out of a background of a world-wide research effort for at least the
past six years on the...
From time immemorial, the security realm and personal identification task had
shown progress by employing technological means like secret knowledge as passwords
and Personal Identification Numbers, and by using personal possessions as
identity cards and Radio Frequency Identification chips. As opposed to these means
which are...
These proceedings contain the papers presented at the 8th Internationl Symposium
on Automated Technology for Verification and Analysis held during
September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences
remains the same: to exchange and promote the latest advances of
state-of-the-art research on...