John Vince describes a range of mathematical topics to provide a foundation for an undergraduate course in computer science, starting with a review of number systems and their relevance to digital computers, and finishing with differential and integral calculus. Readers will find that the author´s visual approach will greatly improve their understanding as to why certain mathematical structures exist, together with how they are used in real-world applications. Each chapter includes full-colour illustrations to clarify the mathematical descriptions, and in some cases, equations are also coloured to reveal vital algebraic patterns. The numerous worked examples will consolidate comprehension of abstract mathematical concepts. Foundation Mathematics for Computer Science covers number systems, algebra, logic, trigonometry, coordinate systems, determinants, vectors, matrices, geometric matrix transforms, differential and integral calculus, and reveals the names of the mathematicians behind such inventions. During this journey, John Vince touches upon more esoteric topics such as quaternions, octonions, Grassmann algebra, Barycentric coordinates, transfinite sets and prime numbers. Whether you intend to pursue a career in programming, scientific visualisation, systems design, or real-time computing, you should find the author´s literary style refreshingly lucid and engaging, and prepare you for more advanced texts.
This book introduces a computationally feasible, cognitively inspired formal model of concept invention, drawing on Fauconnier and Turner´s theory of conceptual blending, a fundamental cognitive operation. The chapters present the mathematical and computational foundations of concept invention, discuss cognitive and social aspects, and further describe concrete implementations and applications in the fields of musical and mathematical creativity. Featuring contributions from leading researchers in formal systems, cognitive science, artificial intelligence, computational creativity, mathematical reasoning and cognitive musicology, the book will appeal to readers interested in how conceptual blending can be precisely characterized and implemented for the development of creative computational systems.
Service-oriented computing has become one of the predominant factors in IT research and development efforts over the last few years. In spite of several standardization efforts that advanced from research labs into industrial-strength technologies and tools, there is still much human effort required in the process of finding and executing Web services. Here, Dieter Fensel and his team lay the foundation for understanding the Semantic Web Services infrastructure, aimed at eliminating human intervention and thus allowing for seamless integration of information systems. They focus on the currently most advanced SWS infrastructure, namely SESA and related work such as the Web Services Execution Environment (WSMX) activities and the Semantic Execution Environment (OASIS SEE TC) standardization effort. Their book is divided into four parts: Part I provides an introduction to the field and its history, covering basic Web technologies and the state of research and standardization in the Semantic Web field. Part II presents the SESA architecture. The authors detail its building blocks and show how they are consolidated into a coherent software architecture that can be used as a blueprint for implementation. Part III gives more insight into middleware services, describing the necessary conceptual functionality that is imposed on the architecture through the basic principles. Each such functionality is realized using a number of so-called middleware services. Finally, Part IV shows how the SESA architecture can be applied to real-world scenarios, and provides an overview of compatible and related systems. The book targets professionals as well as academic and industrial researchers working on various aspects of semantic integration of distributed information systems. They will learn how to apply the Semantic Web Services infrastructure to automate and semi-automate tasks, by using existing integration technologies. In addition, the book is also suitable for advanced graduate students enrolled in courses covering knowledge management, the Semantic Web, or integration of information systems, as it will educate them about basic technologies for Semantic Web Services and general issues related to integration of information systems.
Learn the basics of serverless computing and how to develop event-driven architectures with the three major cloud platforms: Amazon Web Services, Microsoft Azure, and Google Cloud. This hands-on guide dives into the foundations of serverless computing, its use cases, and how to apply it using developer tools such as Node.js, Visual Studio Code, Postman, and Serverless Framework. You will apply the fundamentals of serverless technology from the ground up, and come away with a greater understanding of its power and how to make it work for you. This book teaches you how to quickly and securely develop applications without the hassle of configuring and maintaining infrastructure. You will learn how to harness serverless technology to rapidly reduce production time and minimize your costs, while still having the freedom to customize your code, without hindering functionality. Upon completion, you will have the knowledge and resources to build your own serverless application hosted in AWS, Azure, or Google Cloud and will have experienced the benefits of event-driven technology for yourself. What You´ll Learn Gain a deeper understanding of serverless computing and when to use it Use development tools such as Node.js, Postman, and VS code to quickly set up your serverless development environment and produce applications Apply triggers to your serverless functions that best suit the architecture for the problem the functions are solving Begin building applications across cloud providers that utilize the power of serverless technology Understand best development practices with serverless computing to maintain scalable and practical solutions Code with an agnostic approach to cloud providers to minimize provider dependency Who This Book Is For Any developer looking to expand current knowledge of serverless computing, its applications, and how to architect serverless solutions, or someone just beginning in these areas
A basic primer for all employees on using Lean Six Sigma to meet your company´s goals and your customers´ needs Lean Six Sigma combines the two most important and popular quality trends of our time: Six Sigma and Lean Production. In this plain-English guide, you´ll discover how this remarkable quality improvement method will help you identify and eliminate waste, cut costs and grow revenue, enhance your job skills, and even make work more meaningful.What is Lean Six Sigma? reveals why companies are implementing this strategy, and walks you through the foundations of Lean Six Sigma, explaining the ´´four keys´´ and how they apply to your own job:Delight your customers with speed and quality Improve your processes Work together for maximum gain Base decisions on data and facts Featuring charts, diagrams, and case studies of teams who have used these methods to improve their workplace, What is Lean Six Sigma? tells you what you need to know to make this strategy a success in your organization.
A hands-on introduction to computer science concepts for non-technical readers. Activities include word searches, mazes, ´´Find the Bug!´´ hunts, matching games, ´´Color by Boolean´´ (a twist on the classic Paint by Numbers), and more. The Computer Science Activity Book is the perfect companion for curious youngsters and grown-ups -- especially those who think they´ll never understand how computers work. As readers work their way through this collection of fun and innovative hands-on exercises, they´ll learn the core programming concepts and computer terminology that form the foundation of a STEM education. Readers learn about historical figures like Charles Babbage, Ada Lovelace, Grace Hopper, and Alan Turing; how computers store data and run programs; and how the parts of a computer work together (like the hard drive, RAM, and CPU) through activities that teach foundational programming concepts like drawing a garden of flowers using for loops and creating creatures with conditional statements.
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie - Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.
With the proliferation of huge amounts of (heterogeneous) data on the Web, the importance of information retrieval (IR) has grown considerably over the last few years. Big players in the computer industry, such as Google, Microsoft and Yahoo!, are the primary contributors of technology for fast access to Web-based information; and searching capabilities are now integrated into most information systems, ranging from business management software and customer relationship systems to social networks and mobile phone applications. Ceri and his co-authors aim at taking their readers from the foundations of modern information retrieval to the most advanced challenges of Web IR. To this end, their book is divided into three parts. The first part addresses the principles of IR and provides a systematic and compact description of basic information retrieval techniques (including binary, vector space and probabilistic models as well as natural language search processing) before focusing on its application to the Web. Part two addresses the foundational aspects of Web IR by discussing the general architecture of search engines (with a focus on the crawling and indexing processes), describing link analysis methods (specifically Page Rank and HITS), addressing recommendation and diversification, and finally presenting advertising in search (the main source of revenues for search engines). The third and final part describes advanced aspects of Web search, each chapter providing a self-contained, up-to-date survey on current Web research directions. Topics in this part include meta-search and multi-domain search, semantic search, search in the context of multimedia data, and crowd search. The book is ideally suited to courses on information retrieval, as it covers all Web-independent foundational aspects. Its presentation is self-contained and does not require prior background knowledge. It can also be used in the context of classic courses on data management, allowing the instructor to cover both structured and unstructured data in various formats. Its classroom use is facilitated by a set of slides, which can be downloaded from www.search-computing.org.