This book is a short, focused introduction to MATLAB, a comprehensive software system for mathematics and technical computing. It should be useful to both beginning and experienced users. It contains concise explanations of essential MATLAB commands, as well as easily understood instructions for using MATLAB's programming features, graphical capabilities, and desktop interface. It also includes…
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I analyze the data? To answer these questions the book draws o…
This is a new edited volume on shape analysis presenting results in shape modeling and computational geometry from the 2013 Association for Women in Mathematics (AWM) symposium held at UCLA's Institute for Pure and Applied Mathematics (IPAM). In-depth discussion of shape modeling techniques is supplemented by full-color illustrations demonstrating the results of workshop-developed shape modelin…
This open access book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing experts in order to highlight the state of the art as well as future challenges and trends. In addition, it covers current and emerging technologies …
In Networked Control Systems (NCS), components of a control loop are connected by data networks that may introduce time-varying delays and packet losses into the system, which can severly degrade control performance. Hence, this book presents the newly developed S-LQG (Sequence-Based Linear Quadratic Gaussian) controller that combines the sequence-based control method with the well-known LQG ap…
When no samples are available to estimate a probability distribution, we have to invite some domain experts to evaluate the belief degree that each event will happen. Perhaps some people think that the belief degree should be modeled by subjective probability or fuzzy set theory. However, it is usually inappropriate because both of them may lead to counterintuitive results in this case. In o…
This book introduces readers to the basic concepts of and latest findings in the area of differential equations with uncertain factors. It covers the analytic method and numerical method for solving uncertain differential equations, as well as their applications in the field of finance. Furthermore, the book provides a number of new potential research directions for uncertain differential equat…
This book presents a unifying framework for using priority arguments to prove theorems in computability. Priority arguments provide the most powerful theorem-proving technique in the field, but most of the applications of this technique are ad hoc, masking the unifying principles used in the proofs. The proposed framework presented isolates many of these unifying combinatorial principles and us…
Commonsense psychology refers to the implicit theories that we all use to make sense of people's behavior in terms of their beliefs, goals, plans, and emotions. These are also the theories we employ when we anthropomorphize complex machines and computers as if they had humanlike mental lives. In order to successfully cooperate and communicate with people, these theories will need to be represen…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…