"When an application is built, an underlying data model is chosen to make that application effective. Frequently, other applications need the same data, only modeled differently. The solution of copying the underlying data and modeling is costly in terms of storage and makes data maintenance and evolution impossible. View mechanisms are a technique to model data differently for various applicat…
"The thirteen chapters written expressly for this book by logicians, theoretical computer scientists, philosophers, and semanticists address, from the perspective of mathematical logic, the problems of understanding and studying the flow of information through any information-processing system. The logic of information flow has applications in both computer science and natural language processi…
"A Bradford book."Presents a spectrum of current research in pulsed neural networks and includes work from some of the key scientists in the field.OCLC-licensed vendor bibliographic record.
This collection of original essays reflects the breadth of current research in computer science.This collection of original essays reflects the breadth of current research in computer science. Robin Milner, a major figure in the field, has made many fundamental contributions, particularly in theoretical computer science, the theory of programming languages, and functional programming languages.…
The job of the constraint programmer is to use mathematical constraints to model real world constraints and objects. In this book, Kim Marriott and Peter Stuckey provide the first comprehensive introduction to the discipline of constraint programming and, in particular, constraint logic programming. The book covers the necessary background material from artificial intelligence, logic programmin…
OCLC-licensed vendor bibliographic record.
As we enter the "decade of data," the disparity between the vast amount of data storage capacity (measurable in terabytes and petabytes) and the bandwidth available for accessing it has created an input/output bottleneck that is proving to be a major constraint on the effective use of scientific data for research. Scalable Input/Output is a summary of the major research results of the Scalable …
Title from title screen.Includes index.Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts belie…
This collection of original research provides a comprehensive survey of developments at the leading edge of concurrent object-oriented programming. It documents progress -- from general concepts to specific descriptions -- in programming language design, semantic tools, systems, architectures, and applications. Chapters are written at a tutorial level and are accessible to a wide audience, incl…
This book constitutes the thoroughly refereed conference proceedings of the 9th International Workshop on Algorithms and Computation, WALCOM 2015, held in Dhaka, Bangladesh, in February 2015. The 26 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on approximation algorithms, data s…