Cutting planes (cuts) are very popular in the OR community, where they are
used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer
Programs (MIPs) in the hope of improving the performance of an exact LPbased
solver. In particular, an intense research effort has been devoted to the
study of families of general cuts,...
Ever since I spotted and started reading my first computer book in 1981, I knew Information
Technology (IT) was going to be an important part of my life. I feel privileged to have been able to
make a career out of something I enjoy, and the fact that it changes on what seems to be a
monthly basis means it never gets boring. It still...
The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O
APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a
milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities
of this...
Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in
robots!
However, the general theme of Android devices will be smaller screens and/or no
hardware keyboard. And, by the numbers, Android...
Modern developments in computer and software systems have raised many challeng
ing issues concerning the design and efficiency of complex programming applica
tions. There is an increasing need for "advanced theory", to understand and exploit
basic concepts and mechanisms in computing and information processing. The...
Deformable surface 3D reconstruction from monocular images is an active area of research in the
Computer Vision community. This encompasses recovering both the shape of thin objects that can
be treated as surfaces without perceptible thickness and the visible envelope of fully 3D objects.
Whereas this may seem easy for a human...
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting...
Cloud Computing is emerging as a pervasive and consumer-driven utility that is attracting great interest from entrepreneurs, innovators and technology evangelists, as well as the ‘connected’ public at large. The shift from a focus upon IT, to a more assertive focus upon business, further strengthens the case for cloud adoption,...
The short history of computing machines has witnessed some major events, which
forever transformed our usage of technology. From the first massive main frames to
the democratization of personal computers, and then the interconnection of networks.
Mobility is the next revolution. Like the primitive soup, all the ingredients are now...
Our main aim in writing this book is to make the concepts of pattern recognition clear
to undergraduate and postgraduate students of the subject. We will not deal with
pre-processing of data. Rather, assuming that patterns are represented using some
appropriate pre-processing techniques in the form of vectors of numbers, we will...
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS...
The objectives of this book are to provide a solid foundation for the classical the
ory of sequential algorithms and to cover some of the most important recent al
gorithmic developments, including the rapidly advancing theory of parallel and
distributed algorithms. The book is intended to serve as a text for a core upper...