Optimization is an integral part to science and engineering. Most real-world applications involve complex optimization processes, which are difficult to solve without advanced computational tools. With the increasing challenges of fulfilling optimization goals of current applications there is a strong drive to advance the development of...
This comprehensive set of cards is an indispensable resource for agile teams. The deck of Agile in a Flash cards teaches leadership, teamwork, clean programming, agile approaches to problem solving, and tips for coaching agile teams. Team members can use the cards as reference material, ice breakers for conversations,...
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...
Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...
This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...
Data mining and data modeling are hot topics and are under fast development. Because of its wide applications and rich research contents, a lot of practitioners and academics are attracted to work on these areas. In the view of promoting the communications and collaborations among the practitioners and researchers in Hong Kong, a two-day...
Computer and Information Sciences is a unique and comprehensive review of advanced technology and research in the field of Information Technology. It provides an up to date snapshot of research in Europe and the Far East (Hong Kong, Japan and China) in the most active areas of information technology, including Computer Vision, Data...
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown...
An important aspect of multi agent systems are agent reasoning techniques for problem solving, either at the level of a single agent or at the level of distributed collaboration amongst multiple agents.
Constraint Satisfaction Problems (CSP) prove to be a generic framework which can be applied for modeling and solving a wide range...
When enterprise architects try to explain to people who are not enterprise architects what it is they do for a living, they almost invariably resort to using an analogy with the architecture of buildings, and describe enterprise architecture as a ‘kind of blueprint’. While this analogy may be helpful in conveying a general sense...
"AI Techniques for Game Programming" takes the difficult topics of genetic algorithms and neural networks and explains them in plain English. Gone are the tortuous mathematic equations and abstract examples to be found in other books. Each chapter takes readers through the theory a step at a time, explaining clearly how they can...
Whether you're canvassing a congressional district, managing a sales region, mapping city bus schedules, or analyzing local cancer rates, thinking spatially opens up limitless possibilities for database users. PostGIS, a freely available open-source spatial database extender, can help you answer questions that you could not answer using...