Since the publication of the first edition of The Description Logic Handbook
in 2003, the interest in Description Logics (DL) has steadily increased. This
applies both to the number of active DL researchers working on DL theory
and implementations of reasoning services, and to the number of applications
based on DL technology. One...
I am are very happy to have taken part in the 12th Financial Cryptography and
Data Security Conference (FC 2008). Due to the recent growth in the number of
security and cryptography venues, the competition for high-quality submissions
has been on the rise. Despite that, the continued success of FC is attested by
the research...
The 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2011) took place in Tepl´a Monastery, Czech Republic, during June 21–24, 2011. It was attended by 80 participants who came from all over the world not only to deliver or listen to interesting talks, but also to celebrate the 65th birthday of Ludek...
THE “CLOUD” IS ONE OF THE MOST tossed-around words these days in any IT conversation. But
what does it mean? And what are the implications of the cloud for SharePoint? In fact, there are
many implications for SharePoint with the cloud, ranging from extending existing solutions to use
code or services that are deployed to the...
Cutting planes (cuts) are very popular in the OR community, where they are
used to strengthen the Linear Programming (LP) relaxation of Mixed-Integer
Programs (MIPs) in the hope of improving the performance of an exact LPbased
solver. In particular, an intense research effort has been devoted to the
study of families of general cuts,...
Did you ever imagine yourself writing a computer game and being able to make money selling it? With Apple’s iTunes App Store and the accompanying mobile devices iPhone, iPod touch, and iPad, it’s now easier than ever. Of course, that doesn’t mean it’s easy— there’s still a lot to learn about game...
Welcome to the C programming language—and to C++, too! This book presents leadingedge
computing technologies for students, instructors and software development professionals.
At the heart of the book is the Deitel signature “live-code approach.” Concepts are
presented in the context of complete working...
Computational geometry concerns itself with designing and analyzing algorithms for solving geometric problems. The field has reached a high level of sophistication, and very complicated algorithms have been designed. However, it is also useful to develop more practical algorithms, so long as they are based on rigorous methods. One such method...
You are about to embark on the study of a fascinating and important subject: the
theory of computation. It comprises the fundamental mathematical properties of
computer hardware, software, and certain applications thereof. In studying this
subject we seek to determine what can and cannot be computed, how quickly,
with how much memory,...
This book is generally about software intellectual property and specifically
about the field of software forensics. While you may never testify in a courtroom,
attempt to deduce the true owner of a valuable program, or measure the
intellectual property (IP) value of software source code, if you are at all involved
with software you...
The analysis of experimental data is at heart of science from its beginnings.
But it was the advent of digital computers in the second half of the 20th
century that revolutionized scientific data analysis twofold: Tedious pencil
and paper work could be successively transferred to the emerging software
applications so sweat and tears...
This earliest recorded attempt to regulate the engineering profession reminds
us, in the bluntest way possible, that the paramount purpose of engineering and
engineering design is to serve the user. One would assume that the engineer’s
responsibility to users is so self evident that it goes without saying. Various
professional...