"In recent years, many approximate methods have been developed for analyzing queueing models of complex computer systems. These ad hoc methods usually focus on specific aspects of system operation, and appear to be different from one another, making it difficult to see the underlying principles of model development, to understand the relationship between different models of the same system, or …
Written by the team that developed the software, this tutorial is the definitive resource for scientists, engineers, and other computer users who want to use PVM to increase the flexibility and power of their high-performance computing resources.Written by the team that developed the software, this tutorial is the definitive resource for scientists, engineers, and other computer users who want …
"A Bradford book."Presents a spectrum of current research in pulsed neural networks and includes work from some of the key scientists in the field.OCLC-licensed vendor bibliographic record.
How Control Exists after DecentralizationIs the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconne…
This collection of original essays reflects the breadth of current research in computer science.This collection of original essays reflects the breadth of current research in computer science. Robin Milner, a major figure in the field, has made many fundamental contributions, particularly in theoretical computer science, the theory of programming languages, and functional programming languages.…
The job of the constraint programmer is to use mathematical constraints to model real world constraints and objects. In this book, Kim Marriott and Peter Stuckey provide the first comprehensive introduction to the discipline of constraint programming and, in particular, constraint logic programming. The book covers the necessary background material from artificial intelligence, logic programmin…
This guide illustrates typical ZPL usage and explains in an intuitive manner how the constructs work. The emphasis is on teaching the reader to be a ZPL programmer. Scientific computations are used as examples throughout.OCLC-licensed vendor bibliographic record.
Includes index.The manual describes LISP, a formal mathematical language. LISP differs from most programming languages in three important ways. The first way is in the nature of the data.The LISP language is designed primarily for symbolic data processing used for symbolic calculations in differential and integral calculus, electrical circuit theory, mathematical logic, game playing, and other …
"A Bradford book."OCLC-licensed vendor bibliographic record.
A theory of HCI that uses concepts from semiotics and computer science to focus on the communication between designers and users during interaction.In The Semiotic Engineering of Human-Computer Interaction, Clarisse Sieckenius de Souza proposes an account of HCI that draws on concepts from semiotics and computer science to investigate the relationship between user and designer. Semiotics is the…