Extending SSIS with .NET Scripting is a timeless and comprehensive scripting toolkit for SQL Server Integration Services to solve a wide array of everyday problems that SSIS developers encounter. The detailed explanation of the Script Task and Script Component foundations helps you develop your own scripting solutions, but this book also shows a broad arsenal of readymade and well-documented sc…
This book includes 33 expanded abstracts of selected talks given at the two workshops "Homological Bonds Between Commutative Algebra and Representation Theory" and "Brave New Algebra: Opening Perspectives," and the conference "Opening Perspectives in Algebra, Representations, and Topology," held at the Centre de Recerca Matemàtica (CRM) in Barcelona between January and June 2015. These activit…
The two parts of the present volume contain extended conference abstracts corresponding to selected talks given by participants at the "Conference on Hamiltonian Systems and Celestial Mechanics 2014" (HAMSYS2014) (15 abstracts) and at the "Workshop on Virus Dynamics and Evolution" (12 abstracts), both held at the Centre de Recerca Matemàtica (CRM) in Barcelona from June 2nd to 6th, 2014, and f…
The two parts of the present volume contain extended conference abstracts corresponding to selected talks given by participants at the "Conference on Geometric Analysis" (thirteen abstracts) and at the "Conference on Type Theory, Homotopy Theory and Univalent Foundations" (seven abstracts), both held at the Centre de Recerca Matemàtica (CRM) in Barcelona from July 1st to 5th, 2013, and from Se…
Challenging neocolonialist stereotypes, these critical excursions into Iranian literature and film reveal the limitations of collective identity as it has been configured within and outside of Iran. Through the examination of works by, among others, the iconic female poet Forugh Farrokhzad, the expatriate author Goli Taraqqi, the controversial memoirist Azar Nafisi, and the graphic novelist Mar…
This book contains entirely new results, not to be found elsewhere. Furthermore, additional results scattered elsewhere in the literature are clearly presented. Several well-known distributions such as Weibull distributions, exponentiated Burr type XII distributions and exponentiated exponential distributions and their properties are demonstrated. Analysis of real as well as well-simulated data…
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sect…
This book reports on an outstanding thesis that has significantly advanced the state-of-the-art in the area of automated negotiation. It gives new practical and theoretical insights into the design and evaluation of automated negotiators. It describes an innovative negotiating agent framework that enables systematic exploration of the space of possible negotiation strategies by recombining diff…
The monograph is devoted to the notion of strategic intervention and its application in the foreign language classroom, in particular with reference to teaching grammar structures. The first four chapters, which are theoretical in nature, address such concepts as form-focused instruction, language learning strategies and strategies-based instruction. The last chapter provides insight into the r…
You have a Pi 2, but what exactly can you do with it? This book takes you on a tour of the Pi 2 hardware and all of the fantastic things that you can do to create innovative and useful projects with your Pi. Start with creating a workstation that does actual work, and move into installing a custom kernel, creating a clock, learning the ins and outs of the GPIO interface, and pick up some useful…