Computing continues to become more and more personalized and accessible. Handheld
devices have largely transformed into computing platforms. Mobile phones are no longer
just for talking—they have been capable of carrying data and video for some time. Be it
a phone or a tablet, the mobile device is now so capable of general-purpose...
This volume constitutes the proceedings of the 32nd International Conference
on Applications and Theory of Petri Nets and Other Models of Concurrency
(PETRI NETS 2011). The Petri Net conferences serve as annual meeting places
to discuss the progress in the field of Petri nets and related models of concurrency.
They provide a forum for...
I participate in a number of Internet forums related to video production and
often field questions about lighting issues. After a thread where several of us
explained to a beginner why he needed to light his videos, one wag posted:
“Remember, without lighting all you have is a black picture.”
The conceptualization of a problem (modeling) and the computational solution of this problem (simulation), is the foundation of Computational Science. This coupled endeavor is unique in several respects. It allows practically any complex system to be analyzed with predictive capability by invoking the multiscale paradigm linking...
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security...
The specifications in this book are the result of a number of case studies performed by
researchers from the Programming Research Group at the University of Amsterdam.
The primary goal was to study the use of the techniques developed by the
Programming Research Group for the specification of real-life protocols. From the
pool of...
Information networking has emerged as a multidisciplinary diversified area of research over
the past few decades. From traditional wired telephony to cellular voice telephony and from
wired access to wireless access to the Internet, information networks have profoundly
impacted our lifestyle. At the time of writing, over 3 billion...
An open source content management system (CMS) like WordPress can be a
great resource for anyone who would like to create a blog. It used to be that, to put
content online, you had to manually assemble all the files and develop a fair
amount of technical expertise; but a CMS can automate and significantly simplify
many parts of the...
This is the joint post-proceedings of the 6th International Symposium on High
Performance Computing (ISHPC-VI) and the First International Workshop on
Advanced Low Power Systems 2006 (ALPS2006). The post-proceedings also
contain the papers presented at the Second HPF International Workshop: Experiences
and Progress (HiWEP2005) and the...
This text on geometry modeling is devoted to a number of central geometrical topics—
graphs of functions, transformations, (non-)Euclidean geometries, curves and surfaces—
and presents some elementary methods for analytical modeling and visualization
of them.
In 1872 F. Klein proposed his Erlangen Programme in...
In contemporary globally competitive markets, the development of new products
is considered a critical success factor for organizations. Significant efforts have
been invested in the development of methods and tools for improving the management
of design processes, being a key element in development processes,
especially those related...