Innovative Software
This is a text for those engaged in creating new, high-value software solutions for which an existing exemplar does not exist. It covers how to understand and resolve problems associated with the process and details the design and implementation aspects for high-risk software.
This book is a precise and comprehensive history of the digital computer, tracing its roots and routes through the modern era. Though dealing with the history of technology in general, its central focus is the automatic digital program-controlled calculating devices of 1935-1945.
This book highlights the current state of the art of cybersecurity, covering key areas from systems design and management to emerging technology trends. It will appeal to practitioners, faculty, and students in cybersecurity, information technology, and computer science.
Scientific Programming
Calvo offers an introduction to computer programming, numerical analysis, and other mathematical ideas that extend the basic topics learned in calculus. He illustrates how mathematicians and scientists write computer programs.
In dynamic ad-hoc networks, link failures lead to unreliable and inefficient data transmission. This work proposes LR-EE-AOMDV, a novel extension of the AOMDV routing protocol, to find multiple link-reliable, energy-efficient paths for robust data transmission.
First Generation Mainframes
This volume describes the IBM computer systems that influenced architecture in the 1950s and 1960s. These modular systems featured a common architecture for peripherals, the first operating systems, and groundbreaking software like the FORTRAN programming language.
Wallace examines the social, technical and educational implications of a society where hyper-reality, artificial intelligence and robotics may be at the centre of the new online spaces that will surely further shape us into an unknown future.
With the growing complexity of digital systems, solving Boolean problems is a major challenge. This volume explores powerful techniques to solve them, from hardware acceleration to the synthesis of digital and reversible circuits, extending the basis for future quantum computers.
Birthing the Computer
Birthing the Computer examines the evolution of computer architecture, from magnetic drums to cores and the first transistors. These second-generation machines introduced key concepts in architecture and system software that are found in every computer system today.
This book proposes a new methodology for underwater archaeology using low-budget digital tech. Discover novel collection methods for volunteer divers to create stunning 2D/3D models and a Virtual Reality museum, promoting archaeology in an age where visualization matters.
For exhibition designers, managing visitor circulation is often guesswork, and modifying designs is costly. This book discusses a simulation application to guide the process, presenting the challenges of integrating a complex mathematical process into an artistic one.
Information Technology Ethics
This book focuses on the ethical implications of human interactions with technology. By debating issues such as a law for robots and digital healthcare, this volume provides provocative insights to challenge readers to think critically and draw their own conclusions.
Biometric systems hide many pitfalls that can lead to major security weaknesses and privacy threats. This book showcases a collection of comprehensive references from eminent researchers, providing concise coverage of state-of-the-art solutions.
Information Visualisation
This volume reviews information visualisation, the art of transforming complex data into clear visuals. It explores techniques from medieval origins to modern 2D/3D rendering and evaluation methods, with examples from history, art, and science.
This collection of papers from leading researchers represents the state of the art in sensor technology, processing, and automation for detecting and classifying underwater objects. It will interest researchers in underwater detection, remote sensing, and medical imaging.
Post-editing of Machine Translation
A surge of interest in post-editing, the oldest form of human-machine cooperation for translation, is fundamentally changing the industry. This volume compiles work by researchers, developers, and practitioners on this essential, evolving practice.
I See Me, You See Me
This book showcases the state of the art in eye tracking research by bringing together work from a wide range of application areas. This peer-reviewed selection of chapters provides an overview of the latest research that will inspire and guide students and developers.
Identity theft is a growing concern in mobile ad-hoc networks. This book presents an innovative framework for identity management that puts users back in control. Using context-awareness and user-centricity, it protects identity and balances privacy with convenience.
Ways Ahead
This book documents the first international Csound conference, featuring papers, interviews with developers and musicians, and exclusive new articles. Organized into five parts—History, Development, Music, Usage, and Education—it reflects the project’s diversity.
Developing big information systems is inefficient. This book presents Knowledge Based Automated Software Engineering (KBASE), a method to improve the process by automatically generating the final software product from a verified business model.