Multiagent systems are systems composed of multiple interacting computing elements, known as agents. Agents are computer systems with two important capabilities. First, they are at least to some extent capable of autonomous action - of deciding for themselves what they need to do in order to satisfy their design objectives. Second, they are...
We are pleased to present the 2011 edition of Ubuntu Unleashed. Ubuntu is a Linux-based computer operating system that has taken the world by storm. From its humble beginning in 2004, Ubuntu has risen to be the vanguard of desktop Linux, as well as a popular choice for servers.
Photoshop Elements has evolved over several generations to become a sophisticated photo editor. What was once a low-end, consumer-grade product is now a tool for novice photo editors, amateur photographers, and professionals alike.
Elements shines on its own turf and is distinguished from Adobe Photoshop in many ways. Not only a...
Markets are becoming increasingly fragmented as the result of global competition. As more companies vie for niche market positions, they spin out a broader array of product and service offerings. The Web, with its relatively low barriers to entry, has accelerated this competition by orders of magnitude. The wide availability of online...
Uncertain data management has seen a revival in interest in recent years because of a number of new fields which utilize this kind of data. For example, in fields such as privacy-preserving data mining, additional errors may be added to data in order to mask the identity of the records. Often the data may be imputed using statistical methods...
The pattern calculus is a new foundation for computation, in which the expressive power of functions and of data structures are combined within pattern-matching functions. The best existing foundations focus on either functions, as in the lambda-calculus, or on data structures, as in Turing machines, or on compromises involving both, as in...
It may sound surprising that in computing, a field which develops so fast that the future often becomes the past without having been the present, there is nothing more stable and worthwhile learning than its foundations.
It may sound less surprising that in a field with such a revolutionary methodological impact on all sciences and...
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....
The First International ICST Conference on Mobile Networks and Management (MONAMI) was held in Athens, Greece during October 13–14, 2009, hosted by the National Technical University of Athens. Through what we hope will be a long-lasting series of events, this new international conference aims at bringing together top researchers,...
The present volume of the Handbook of the History of Logic is designed to establish 19th century Britain as a substantial force in logic, developing new ideas, some of which would be overtaken by, and other that would anticipate, the century's later capitulation to the mathematization of logic.
“This book guides you in the journey of 3D modeling from the theory with elegant mathematics to applications with beautiful 3D model pictures. Written in a simple, straightforward, and concise manner, readers will learn the state of the art of 3D reconstruction and modeling.” —Professor Takeo Kanade, Carnegie Mellon...