LR parsing has become a widely used method of syntax analysis; this
is largely due to the availability of parser generators and compiler-
compilers based on LR techniques. However, the readily available ac
counts of the theory of these techniques are either superficial or are
weighed down with tedious mathematical detail of a merely...
My interest in this subject started when I joined the broadcast equipment manufacturer,
Chyron. For a few years I was the product manager for their playout automation and
asset management product lines. These were one of the first applications that gave
television broadcasters the means to manage the ingest, storage, archiving, and...
This handbook is carefully edited book – contributors are worldwide experts in
the field of data intensive computing and their applications. The scope of the
book includes leading edge data intensive computing architectures and systems,
innovative storage, virtualization, and parallel processing technologies applied in...
With the rapid increase of computational powers and availability of modern sensing, analysis
and rendering equipment and technologies, computers are becoming more and more intelligent.
Many research projects and commercial products have demonstrated the capability for a computer
to interact with human in a natural way by looking at...
Peer-to-peer (P2P) has proven as a most successful way to produce large
scale, reliable, and cost-effective applications, as illustrated for file sharing or
VoIP. P2P storage is an emerging field of application which allows peers to
collectively leverage their resources towards ensuring the reliability and
availability of user...
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract insight
from a record of the...
The phenomenal growth of the Internet has resulted in the availability of
huge amounts of online information, a situation that is overwhelming to
the end-user. To overcome this problem personalization technologies have
been extensively employed across several domains to provide assistance in
filtering, sorting, classifying and sharing...
This book will prove to be a practical resource for anyone who is considering
using, building, or securing a cloud implementation. Security professionals may
refer to this book as a source of detailed information for evaluating and verifying
cloud security policy and requirements. Cloud infrastructure engineers, cloud services...
The availability of geographic and geo-spatial information and services, especially
on the openWeb, has become abundant in the last several yearswith the proliferation
of online maps, geo-coding services, geospatial Web services and geospatially enabled
applications. Concurrently, the need for geo-spatial reasoning has significantly...
R.E. Miller: Parallel program schemata.- D.E. Muller: Theory of automata.- R. Karp: Computational complexity of combinatorial and graph-theoretic problems.
In this lecture we discuss a type of computer organization which is
based upon the concept of operation sequencing being controlled by operand
availability. Such sequencing...
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations...
The Linked Open Data Project started just four years ago in 2007. In that short time
Linked Data has grown into an almost mainstream activity for many governments
around the world. As of this writing, the US Government’s open data site listed
twenty one countries whose governments publish open data regarding the operations
of...