IMIST


Votre recherche a retourné 5 résultats.

Foundations and applications of mis : a model theory approach / par Takahara, Yasuhiko. Publication : [S.l.] : Springer, 2006 . 360 p. ; , Foundations and Applications of MIS presents a unique systems theory approach to management information system (MIS) development. It covers an outline of the approach, providing a theoretical foundation for MIS from the systems theoretic viewpoint before presenting practical feasibility of the approach using applications ranging from a transaction processing system to a solver system. The author also describes his newly developed extended Prolog programming language, which takes full advantage of the mathematical framework employed. High-level mathematics is combined with sophisticated software engineering in this approach to address the practical problem area of designing MISs; it is the synergy of these two areas with underlying systems thinking that gives this book its unique identity. The book assumes a working knowledge of elementary set theory, logic and familiarity with some systems concepts such as automation models. Senior and graduate students, researchers in management information systems, systems engineers and systems scientists will find this book useful. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),

Managing mailing lists : majordomo, listserv, listproc, and smartlist / par Schwartz,, Alan. Publication : [S.l.] : O'Reilly Media, 1998 . 296 p. ; , Mailing lists are an ideal vehicle for creating email-based electronic communities. All you need to run a mailing list is access to a system that is connected to the Internet, a mailing list management software package, and a bit of know-how, which is where this book comes in. Managing Mailing Lists is full of practical information for the list maintainer and system administrator alike. This book covers four mailing list packages: Majordomo, LISTSERV, Listproc, and SmartList -- all of which run on UNIX systems (LISTSERV runs on a number of platforms, including Windows NT). If you are a system administrator, Managing Mailing Lists tells you what you need to know to pick a mailing list package and get it up and running on your system. If you are charged with establishing and running a list, this book covers everything you need to know about setting up and maintaining the list, from writing the charter to dealing with bounced messages. Mailing lists offer a great deal of flexibility, and this book lays out all the different options, such as creating moderated lists, controlling who can subscribe to a list, offering digest subscriptions, and archiving list postings. 24 cm. Date : 1998 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),

Statistical methods in counterterrorism : game theory, modeling, syndromic surveillance, and biometric authentication.   Publication : [S.l.] : Springer, 2006 . 292 p. ; , All the data was out there to warn us of this impending attack, why didn't we see it?" This was a frequently asked question in the weeks and months after the terrorist attacks on the World Trade Center and the Pentagon on September 11, 2001. In the wake of the attacks, statisticians moved quickly to become part of the national response to the global war on terror. This book is an overview of the emerging research program at the intersection of national security and statistical sciences. A wide range of talented researchers address issues in - Syndromic Surveillance---How do we detect and recognize bioterrorist events? - Modeling and Simulation---How do we better understand and explain complex processes so that decision makers can take the best course of action? - Biometric Authentication---How do we pick the terrorist out of the crowd of faces or better match the passport to the traveler? - Game Theory---How do we understand the rules that terrorists are playing by? This book includes technical treatments of statistical issues that will be of use to quantitative researchers as well as more general examinations of quantitative approaches to counterterrorism that will be accessible to decision makers with stronger policy backgrounds. Dr. Alyson G. Wilson is a statistician and the technical lead for DoD programs in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. Gregory D. Wilson is a rhetorician and ethnographer in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. David H. Olwell is chair of the Department of Systems Engineering at the Naval Postgraduate School in Monterey, California. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),
Tabu search / par Glover,, Fred W. Publication : [S.l.] : Springer, 1998 . 408 p. ; , This book explores the meta-heuristics approach called tabu search , which is dramatically changing our ability to solve a host of problems that stretch over the realms of resource planning, telecommunications, VLSI design, financial analysis, scheduling, space planning, energy distribution, molecular engineering, logistics, pattern classification, flexible manufacturing, waste management, mineral exploration, biomedical analysis, environmental conservation and scores of other problems. The major ideas of tabu search are presented with examples that show their relevance to multiple applications. Numerous illustrations and diagrams are used to clarify principles that deserve emphasis, and that have not always been well understood or applied. The book's goal is to provide `hands-on' knowledge and insight alike, rather than to focus exclusively either on computational recipes or on abstract themes. This book is designed to be useful and accessible to researchers and practitioners in management science, industrial engineering, economics, and computer science. It can appropriately be used as a textbook in a masters course or in a doctoral seminar. Because of its emphasis on presenting ideas through illustrations and diagrams, and on identifying associated practical applications, it can also be used as a supplementary text in upper division undergraduate courses. Finally, there are many more applications of tabu search than can possibly be covered in a single book, and new ones are emerging every day. The book's goal is to provide a grounding in the essential ideas of tabu search that will allow readers to create successful applications of their own. Along with the essential ideas, understanding of advanced issues is provided, enabling researchers to go beyond today's developments and create the methods of tomorrow. 24 cm. Date : 1998 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha