This volume is the first to analyze populism’s international dimension: its impact on, and interaction with, foreign policy and international politics. The contributions to this volume engage conceptual theoretical issues and overarching questions such as the still under-specified concept of populism or the importance of leadership and the...
Since the advent of computerized tomography in radiology, many imaging techniques have been introduced in medicine, science, and technology. This book describes the state of the art of the mathematical theory and numerical analysis of imaging. The authors survey and provide a unified view of imaging techniques, provide the necessary...
American Government: Constitutional Democracy Under Pressure highlights the necessary tension between our constitutional principles and institutions and the populist heat that sometimes roils our national politics, especially at the current political moment. Our constitutional democracy has been under pressure for some time,...
This revised and extensively expanded edition of Computability and Complexity Theory comprises essential materials that are core knowledge in the theory of computation. The book is self-contained, with a preliminary chapter describing key mathematical concepts and notations. Subsequent chapters move from the qualitative aspects of...
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Beginning Hibernate, Third Edition is ideal if you’re experienced in Java with databases (the traditional, or "connected," approach), but new to open-source, lightweight Hibernate, a leading object-relational mapping and database-oriented application development framework.
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...
Assisted-GNSS is an interesting field to work in at present. Demand for accurate location is increasing and new satellites and signals are coming online through the GPS modernization program and the emergence of new GNSSs.
This book is a practical exploration of A-GNSS with particular focus on A-GPS. It provides some theoretical...
Web database applications integrate databases and the Web. Well-known web destinations such as online auction sites, retail stores, news sites, discussion forums, and personalized home pages are all examples of web database applications. The popularity of these applications stems from their accessibility and usability: thousands of users...
Based on eight extensive lectures selected from those given at the renowned Chris Engelbrecht Summer School in Theoretical Physics in South Africa, this text on the theoretical foundations of quantum information processing and communication covers an array of topics, including quantum probabilities, open systems, and non-Markovian dynamics and...
The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel...
"The expertise of Paul shows in the easy transitions made between discussions of theory and experiment, particularly in subjects related to quantum optics." M.C. Ogilvie, Choice Magazine
Providing a deeper understanding of the microscopic world through quantum theory, this supplementary text covers a wider...