This book explores the intersection between cognitive sciences and social sciences. In particular, it explores the intersection between individual cognitive modeling and modeling of multi-agent interaction (social stimulation). The two contributing fields--individual cognitive modeling (especially cognitive architectures) and modeling of...
This book presents a unique method for decomposing a computer program along its execution paths, for simplifying the subprograms so produced, and for recomposing a program from its subprograms. This method enables us to divide and conquer the complexity involved in understanding the computation performed by a program by decomposing it into a set...
"With a better handle on the financial pulse of the business, enterprises will be better able to meet the Street’s expectations of financial transparency and corporate accountability. The writers do a masterful job of getting readers to this point of awareness, and further display their insight...
A proven Java(TM)-based approach to standardizing and streamlining legacy migration
This book focuses on the key challenges developers face when using the Java 2 platform Enterprise Edition (J2EE) to encapsulate legacy applications for delivery in a multi-tier Internet environment. Leading Sun architects Torbjoern Dahlen and Thorbioern Fritzon...
Written for both experienced and new users, Design Verification with e gives you a broad coverage of e. It stresses the practical verification perspective of e rather than emphasizing only its language aspects.
A CFP® Study Guide that delivers what you need to succeed!
This quick study guide for candidates preparing to take the CFP® Certification Examination covers the bare-bones essentials needed to pass this challenging exam in a logical and easy-to-absorb manner. Covering some of the most important disciplines of...
The design and implementation of large scale telecommunication systems requires the interconnection and integration of diverse subsystems which need to provide a highly reliable system capable of offering high quality services. Over recent years, large scale systems designers have only had to deal with wireline systems and large scale operations...
CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in...
Maintain a High-Performance Oracle Database 10g Environment
Monitor, analyze, and optimize Oracle Database 10g using the tested methods and insider advice contained in this definitive volume. Written by Oracle Certified Master Richard Niemiec, Oracle Database 10g Performance Tuning Tips &...
Shows how to take advantage of the many tax breaks available to homeowners
There are 65 million homeowners in the U.S. and there are almost as many tax savings opportunities offered to them. Unfortunately, beyond the most common tax breaks, homeowners are typically in the dark. Worse, some may know about a particular tax break, but not...
Answers to your most pressing SOA development questions
How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound...
The purpose of this book is to disseminate the research results and best practice from researchers and practitioners interested in and working on modeling methods and methodologies. Though the need for such studies is well recognized, there is a paucity of such research in the literature. What specifically distinguishes this book is that it looks...