IMIST


Affiner votre recherche

Votre recherche a retourné 1302 résultats.

Real-time applications with stochastic task execution times : analysis and optimisation / par Manolache,, Sorin. Publication : [S.l.] : Springer-Verlag New York Inc., 2007 . 152 p. ; , ReliØ. 24 cm. Date : 2007 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Remote sensing digital image analysis : an introduction / par Richards, John A. Publication : [S.l.] : Springer, 2005 . 439 p. ; , Remote Sensing Digital Image Analysis provides the non-specialist with an introduction to quantitative evaluation of satellite and aircraft derived remotely retrieved data. Each chapter covers the pros and cons of digital remotely sensed data, without detailed mathematical treatment of computer based algorithms, but in a manner conductive to an understanding of their capabilities and limitations. Problems conclude each chapter. This fourth edition has been developed to reflect the changes that have occurred in this area over the past several years. Its focus is on those procedures that seem now to have become part of the set of tools regularly used to perform thematic mapping. As with previous revisions, the fundamental material has been preserved in its original form because of its tutorial value; its style has been revised in places and it has been supplemented if newer aspects have emerged in the time since the third edition appeared. It still meets, however, the needs of the senior student and practitioner. 25 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Exactes et Naturelles (1),

Reversing secrets of reverse engineering par Eilam, Eldad. Publication : [S.l.] Wiley 2005 . 624 pages , Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (2),

Security and game theory algorithms, deployed systems, lessons learned par Tambe, Milind Publication : Cambridge | New York Cambridge University Press 2012 . xiv, 319 pages , "Global threats of terrorism, drug-smuggling and other crimes have led to a significant increase in research on game theory for security. Game theory provides a sound mathematical approach to deploy limited security resources to maximize their effectiveness. A typical approach is to randomize security schedules to avoid predictability, with the randomization using artificial intelligence techniques to take into account the importance of different targets and potential adversary reactions. This book distills the forefront of this research to provide the first and only study of long-term deployed applications of game theory for security for key organizations such as the Los Angeles International Airport police and the US Federal Air Marshals Service. The author and his research group draw from their extensive experience working with security officials to intelligently allocate limited security resources to protect targets, outlining the applications of these algorithms in research and the real world"-- 24 cm. Date : 2012 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Semantic techniques in quantum computation   Publication : Cambridge | New York Cambridge University Press 2010 . xiv, 478 pages , "The study of computational processes based on the laws of quantum mechanics has led to the discovery of new algorithms, cryptographic techniques, and communication primitives. This book explores quantum computation from the perspective of the branch of theoretical computer science known as semantics, as an alternative to the more well-known studies of algorithmics, complexity theory, and information theory. It collects chapters from leading researchers in the field, discussing the theory of quantum programming languages, logics and tools for reasoning about quantum systems, and novel approaches to the foundations of quantum mechanics. This book is suitable for graduate students and researchers in quantum information and computation, as well as those in semantics, who want to learn about a new field arising from the application of semantic techniques to quantum information and computation"--Provided by publisher. | "The study of computational processes based on the laws of quantum mechanics has led to the discovery of new algorithms, cryptographic techniques, and communication primitives. This book explores quantum computation from the perspective of the branch of theoretical computer science known as semantics, as an alternative to the more well-known studies of algorithmics, complexity theory, and information theory. It collects chapters fromleading researchers in the field, discussing the theory of quantum programming languages, logics and tools for reasoning about quantum systems, and novel approaches to the foundations of quantum mechanics. This book is suitable for graduate students and researchers in quantum information and computation, as well as those in semantics, who want to learn about a new field arising from the application of semantic techniques to quantum information and computation"--Provided by publisher. 25 cm. Date : 2010 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),
Smart clothing technology and applications   Publication : Boca Raton CRC Press 2010 . 275 p. , GPS-embedded clothing for finding children or skiers when they are lost, bio-monitoring smart shirts, and vests that monitor a patient’s vital signs are no longer science fiction but science fact. It is quite likely that within 20 or 30 years, computers, telephones, and televisions will be a part of our intimate clothing. Covering the whole design cycle of smart clothes, Smart Clothing: Technology and Applications examines applications for the general public and highlights the important human factors aspects that make products not only usable but marketable. The book discusses the state of the art in smart clothing technology and applications. The chapters address usability and human aspects relevant to the manufacture and sale of such products and detail the evolving and increasingly wide-ranging applications in fields such as information technology, healthcare, and entertainment. They also cover technology topics including interface, communication, energy supply, data management, processors, and actuators. Discussions of packaging and interconnection, shape memory alloy, and design and modeling of electronic textile applications round out the coverage. With technology news blaring headlines such as Smart Clothing Coming Soon to Your Galaxy and Futuristic Fashions Will Fight Our Health Scares , can clothing that communicates with your washer and dryer be far behind? It is not enough to understand the technology, you must also grasp the human factor aspects. Identifying the challenges and potential benefits of smart clothing from both perspectives, this book provides integrated coverage that establishes the need for methods significantly different from traditional ones. Its up-to-date coverage allows you to visualize trends and provides a glimpse into the future. 24 cm. Date : 2010 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),
Software configuration management using vesta / par Heydon,, Clark Allan. Publication : [S.l.] : Springer, 2006 . 262 p. ; , This monograph addresses two core problems in developing large software projects: versioning and building. In order to develop and evolve large software code bases, software engineers need to understand the central role of automated, scalable software configuration management (SCM). Using the well-known Vesta system (an open-source SCM system developed at the Digital/Compaq Systems Research Center), the authors meticulously develop, demonstrate, and assess key concepts and methods to manage the evolution of large software systems. This book and the code of the Vesta system allow researchers to develop a deeper understanding of the problems inherent in large-scale software construction practices and techniques for their effective solution. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Software modeling and design : UML, use cases, patterns, and software architectures / par Gomaa, Hassan. Publication : Cambridge ; | New York : Cambridge University Press, 2011 . xxv, 550 pages : 27 cm Date : 2011 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Start your own computer business : the unembellished guide par Rosenthal, Morris. Publication : [S.l.] : Foner Books 2002 . 160 p. : , 2013 UPDATED EDITION - If you purchase the book as new or used through Marketplace, check with the seller that you are getting the updated edition with an "Updated" banner on the cover. From buying and selling PC hardware to product development and selling services, "Start Your Own Computer Business: The Unembellished Guide" offers a realistic picture of making it on your own. Bestselling author, Morris Rosenthal, has 15 years of experience in the computer business, building and repairing thousands of PCs and helping hundreds of customers. The book mixes practical advice and cautions with real-world anecdotes of successes and failures. Dollars and cents play a prominent role in the book, as Rosenthal stresses that the real challenge of succeeding in the computer business is the business part of the equation. Managing employees, inventory and scarce financial resources are covered, along with how to remain sane and when to quit. The book is illustrated with a series of original cartoons on the computer business subject. 23 cm. Date : 2002 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Statistical inference : the minimum distance approach / par Basu, Ayanendranath. Publication : Boca Raton, FL : CRC Press, 2011 . xix, 409 pages : 25 cm. Date : 2011 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Exactes et Naturelles (1),

Statistical methods in counterterrorism : game theory, modeling, syndromic surveillance, and biometric authentication.   Publication : [S.l.] : Springer, 2006 . 292 p. ; , All the data was out there to warn us of this impending attack, why didn't we see it?" This was a frequently asked question in the weeks and months after the terrorist attacks on the World Trade Center and the Pentagon on September 11, 2001. In the wake of the attacks, statisticians moved quickly to become part of the national response to the global war on terror. This book is an overview of the emerging research program at the intersection of national security and statistical sciences. A wide range of talented researchers address issues in - Syndromic Surveillance---How do we detect and recognize bioterrorist events? - Modeling and Simulation---How do we better understand and explain complex processes so that decision makers can take the best course of action? - Biometric Authentication---How do we pick the terrorist out of the crowd of faces or better match the passport to the traveler? - Game Theory---How do we understand the rules that terrorists are playing by? This book includes technical treatments of statistical issues that will be of use to quantitative researchers as well as more general examinations of quantitative approaches to counterterrorism that will be accessible to decision makers with stronger policy backgrounds. Dr. Alyson G. Wilson is a statistician and the technical lead for DoD programs in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. Gregory D. Wilson is a rhetorician and ethnographer in the Statistical Sciences Group at Los Alamos National Laboratory. Dr. David H. Olwell is chair of the Department of Systems Engineering at the Naval Postgraduate School in Monterey, California. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),
Strategic software engineering : an interdisciplinary approach / par P,, Deek Fadi. Publication : [S.l.] : Auerbach Publishers Inc., 2005 . 333 p. ; , ReliØ. 24 cm. Date : 2005 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Supervisory control of concurrent systems a petri net structural approach par Iordache, Marian V. Publication : Boston Birkhäuser 2006 . 281 p. , This book addresses the design of such tools for correct-by-construction synthesis of supervisors for systems and specifications represented in the discrete-event framework. The approach employed uses Petri nets as discrete-event models and structural methods for the synthesis of supervisors, and may lead to significant computational benefits. Highlighting recent progress in the design of supervisors by structural methods, the book represents a novel contribution to the field. One of the main features of the presentation is the demonstration that structural methods can address a variety of supervisor specifications under diverse supervision settings. 24 cm. Date : 2006 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Swarm intelligence par Kennedy, James F. Publication : San Francisco Morgan Kaufmann Publishers 2001 . xxvii, 512 p. 25 cm. Date : 2001 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),

Swarm intelligence : introduction and applications.   Publication : [S.l.] : Springer, 2008 . 286 p. ; , The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While individuals are rather unsophisticated, in cooperation they can solve complex tasks, a prime example being the ability of ant colonies to find shortest paths between their nests and food sources. Task-solving results from self-organization, which often evolves from simple means of communication, either directly or indirectly via changing the environment, the latter referred to as stigmergy. Scientists have applied these principles in new approaches, for example to optimization and the control of robots. Characteristics of the resulting systems include robustness and flexibility. This field of research is now referred to as swarm intelligence. The contributing authors are among the top researchers in their domain. The book is intended to provide an overview of swarm intelligence to novices, and to offer researchers in the field an update on interesting recent developments. Introductory chapters deal with the biological foundations, optimization, swarm robotics, and applications in new-generation telecommunication networks, while the second part contains chapters on more specific topics of swarm intelligence research such as the evolution of robot behavior, the use of particle swarms for dynamic optimization, and organic computing. 25 cm. Date : 2008 Disponibilité : Exemplaires disponibles: La bibliothèque des sciences de l'ingénieur (1),
Tabu search / par Glover,, Fred W. Publication : [S.l.] : Springer, 1998 . 408 p. ; , This book explores the meta-heuristics approach called tabu search , which is dramatically changing our ability to solve a host of problems that stretch over the realms of resource planning, telecommunications, VLSI design, financial analysis, scheduling, space planning, energy distribution, molecular engineering, logistics, pattern classification, flexible manufacturing, waste management, mineral exploration, biomedical analysis, environmental conservation and scores of other problems. The major ideas of tabu search are presented with examples that show their relevance to multiple applications. Numerous illustrations and diagrams are used to clarify principles that deserve emphasis, and that have not always been well understood or applied. The book's goal is to provide `hands-on' knowledge and insight alike, rather than to focus exclusively either on computational recipes or on abstract themes. This book is designed to be useful and accessible to researchers and practitioners in management science, industrial engineering, economics, and computer science. It can appropriately be used as a textbook in a masters course or in a doctoral seminar. Because of its emphasis on presenting ideas through illustrations and diagrams, and on identifying associated practical applications, it can also be used as a supplementary text in upper division undergraduate courses. Finally, there are many more applications of tabu search than can possibly be covered in a single book, and new ones are emerging every day. The book's goal is to provide a grounding in the essential ideas of tabu search that will allow readers to create successful applications of their own. Along with the essential ideas, understanding of advanced issues is provided, enabling researchers to go beyond today's developments and create the methods of tomorrow. 24 cm. Date : 1998 Disponibilité : Exemplaires disponibles: La bibliothèque des Sciences Juridiques, Economiques et de Gestion (1),

Vous ne trouvez pas ce que vous cherchez ?
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha