In the field of IT, the markets, business activities, needs and requirements of internal and external service
providers and customers are changing in ever-shortening cycles. This forces companies to increase their
organizational flexibility not only as far as their structure is concerned but also with regard to established
business...
Inside the Machine is an introduction to computers that
is intended to fill the gap that exists between classic
but more challenging introductions to computer
architecture, like John L. Hennessy’s and David A.
Patterson’s popular textbooks, and the growing mass
of works that are simply too basic...
Microsoft Excel is much more than just a spreadsheet. With the introduction
of the Visual Basic Editor in Excel 97, followed by the significantly
improved stability of Excel 2000, Excel became a respected development
platform in its own right. Excel applications are now found alongside those
based on C++, Java, and the .NET...
The area of aggregation operations is one of the most promising off-springs of
fuzzy sets theory. Before Zadeh introduced fuzzy set connectives in 1965, there
was a wide gap between logic and decision sciences. On the one hand, multiplevalued
logics proposed many-valued extensions of the conjunctions and
disjunctions for which the...
When we rst started working on the problem of making the kernel machine
approach applicable to the classication of graphs a couple of years ago,
our eorts were mainly driven by the fact that kernel methods had led to
impressive performance results on many data sets. It didn't take us long to
appreciate the sheer elegance of how...
Boring, boring, boring. Isn’t this what immediately comes to mind when one
sees books on foundational concepts of information security? Monotonous
coverage of theory, dry details of history, brief yet inadequate coverage of every
topic known to man, even though you know that you’ll never be hired by the
NSA as a...
This book brings together representative views of recent research and practice in
the area of relating software requirements and software architectures. We believe
that all practicing requirements engineers and software architects, all researchers
advancing our understanding and support for the relationship between software...
Soft Computing (SC) techniques have been recognized nowadays as attractive
solutions for modeling highly nonlinear or partially defined complex systems
and processes. These techniques resemble biological processes more closely than
conventional (more formal) techniques. However, despite its increasing popularity,
soft computing lacks...
The development of Hypertext Markup Language stopped in 1999 with its final version, n.4, made by the
World Wide Web Consortium (W3C). Technology, however, has not stood still in the meantime: the W3C
also worked on interesting projects such as the generic Standard Generalized Markup Language (SGML)
to XML, as well as on new markup...
Current search paradigms for the Web, direct access through search engines and
navigational access via static taxonomies, have recently been strongly criticized.
A third paradigm, dynamic taxonomies or faceted search, is gaining acceptance to
the extent that it is now the de facto standard in product selection for e-commerce.
This new...
The concept of fuzzy sets is one of the most fundamental and influential tools in computational intelligence. Fuzzy sets can provide solutions to a broad range of problems of control, pattern classification, reasoning, planning, and computer vision. This book bridges the gap that has developed between theory and practice. The authors explain...
The first author, Said Elnashaie, and his wife, Shadia Elshishini, moved next door to
the second author, Frank Uhlig, and his family in 2000. The two families became good
neighbors and friends. Their chats covered the usual topics and occasionally included
random teaching, departmental, and...