In several practical circumstances we have to solve a problem whose instance
is not a priori completely known. Situations of this kind occur in computer
systems and networks management, in financial decision making, in robotics etc.
Problems that have to be solved without a complete knowledge of the instance
are called on-line...
Adopted as the undisputed Perl bible soon after the first edition appeared in 1991, Programming Perl is still the go-to guide for this highly practical language. Perl began life as a super-fueled text processing utility, but quickly evolved into a general purpose programming language that’s helped hundreds of thousands...
Using databases in C# can be daunting for developers moving from VB6, VBA, or
Access. From the differences in the .NET syntax to the curly braces and semicolons,
just looking at the code in C# for the first time can be intimidating. As you start to use
C#, the small changes you need to make become easier and the code starts to flow...
XAML is ubiquitous today. Whether with Silverlight, WPF, WF, various XPS formats, or XML-based formats, XAML is being used in a whole lot of Microsoft platform- based technologies. Though based on XML, XAML is unlike most other markup languages, because it is strongly linked to CLR assemblies through its objects.
Studying modern database languages one recognizes that there is a gap between language
features and theoretical foundations:
* Studies of the formal foundations exist for the relational data model but not
for the Entity-Relationship model, which is a model used by numerous practical
people. Also, most extensions of...
Everyday people need to make decisions, and the decision makers usually face multiple,
conflicting objectives and uncertain environments. The research about uncertain
multi-objective decision making problems has been profolic. It mainly provides
decision makers with the help to find optimal solutions for many objectives under...
This book is dedicated to Professor Leonard Bole on the occasion of his 75th
birthday, and contains essays written by his friends, former students and col-
leagues to celebrate his scientific career. For many years Leonard Bole has played
an important role in the Polish computer science community. He was especially
known for...
From time immemorial, the security realm and personal identification task had
shown progress by employing technological means like secret knowledge as passwords
and Personal Identification Numbers, and by using personal possessions as
identity cards and Radio Frequency Identification chips. As opposed to these means
which are...
Traditional software verification algorithms work by using a
combination of Floyd-Hoare Logics, Model Checking and Abstract Interpretation,
to check and infer suitable program invariants. However, these
techniques are problematic in the presence of complex but ubiquitous
constructs like generic data structures, first-class functions....
Computers play an increasingly important role in our society. A breakdown of all
computer systems would cause a breakdown of almost all activities of daily life.
Furthermore, personal computers are available in almost every home in the industrialized
world. But there is one sector where computers have a more strategic role, and
that...
Chemical Engineering Volume 2 covers the properties of particulate systems, including the character of individual particles and their behaviour in fluids. Sedimentation of particles, both singly and at high concentrations, flow in packed and fluidised beads and filtration are then examined. The latter part of the book deals with separation...
Linear-quadratic optimization is one of the most exciting topics in the con trol engineering literature of recent decades. The interest in linear optimal dynamical systems, and especially in those with quadratic cost functional, can be explained by both the richness of properties these systems possess, and the pragmatic value and physical...