A laboratory study that investigates how algorithms come into existence. Algorithms—often associated with the terms big data, machine learning, or artificial intelligence—underlie the technologies we use every day, and disputes over the consequences, actual or potential, of new algorithms arise regularly. In this book, Florian Jaton offers a new way to study computerized methods, providi…
This book constitutes the refereed proceedings of the 5th International Symposium on Unifying Theories of Programming, UTP 2014, held in Singapore, Singapore, in May 13, 2014, co-located with the 19th International Symposium on Formal Methods, FM 2014. The 7 revised full papers presented together with one invited talk were carefully reviewed and selected from 11 submissions. They deal with nume…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This textbook provides an accessible introduction to the most important features of Fortran 2008. Features: presents a complete discussion of all the basic features needed to write complete Fortran programs; makes extensive use of examples and case studies to illustrate the practical use of features of Fortran 08, and supplies simple problems for the reader; provides a detailed exploration of c…
This book is for musical makers and artists who want to gain knowledge and inspiration for your own amazing creations. “Grumpy Mike” Cook, co-author of several books on the Raspberry Pi and frequent answerer of questions of the Arduino forums, brings you a fun and instructive mix and simple and complex projects to help you understand how the Arduino can work with the MIDI system to create m…
This book constitutes the refereed proceedings of the 20th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2015, held in Madrid, Spain, in June 2015. The revised 12 full papers presented together with two keynotes were carefully reviewed and selected from 36 submissions. They are organized in topical sections on language technology, real-time applications, cri…
The study of NIP theories has received much attention from model theorists in the last decade, fuelled by applications to o-minimal structures and valued fields. This book, the first to be written on NIP theories, is an introduction to the subject that will appeal to anyone interested in model theory: graduate students and researchers in the field, as well as those in nearby areas such as combi…
Since their inception, the Perspectives in Logic and Lecture Notes in Logic series have published seminal works by leading logicians. Many of the original books in the series have been unavailable for years, but they are now in print once again. In this volume, the seventh publication in the Lecture Notes in Logic series, Font and Jansana develop a very general approach to the algebraization of…
This book presents a unifying framework for using priority arguments to prove theorems in computability. Priority arguments provide the most powerful theorem-proving technique in the field, but most of the applications of this technique are ad hoc, masking the unifying principles used in the proofs. The proposed framework presented isolates many of these unifying combinatorial principles and us…
This book constitutes the refereed proceedings of the 17th International Conference on Coordination Models and Languages, COORDINATION 2015, held as part of the 10th International Federated Conference on Distributed Computing Techniques, DisCoTec 2015, in Grenoble, France, in June 2015. The 14 full papers and one short paper presented were carefully reviewed and selected from 36 submissions. Th…