This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
Students studying computer animation and computer games have to be familiar with geometry, matrices, vectors, rotation transforms, quaternions, curves and surfaces, and as computer graphics software b
To provide structure and transparency to the complex world of IT, Enterprise Architecture was created. However, we created complexities within Enterprise Architecture with Frameworks that are not easi
To provide structure and transparency to the complex world of IT, Enterprise Architecture was created. However, we created complexities within Enterprise Architecture with Frameworks that are not easi
This collection of 21 articles on video games and education showcases current scholarship in a wide variety of topics related to gaming and games as instructional tools. Beginning with an introduction
Quantitative Neurophysiology is supplementary text for a junior or senior level course in neuroengineering. It may also serve as an quick-start for graduate students in engineering, physics or neurosc
This book offers a "hands-on" approach to teaching Discrete Mathematics. Using software that is freely available on Mac, PC & Unix platforms, the functional language Haskell allows students to exp
This book provides the readers with a timely guide to the application of biomimetic principles in architecture and engineering design. As a result of a combined effort by two internationally recognize
This book constitutes the proceedings of the 9th European Conference on Software Architecture, ECSA 2015, held in Dubrovnik / Cavtat, in September 2015 The 12 full papers and 15 short papers presented
This engaging and accessible book presents a set of representative concepts connected by the theme of information security, demonstrating how each allows us to solve real problems. The discussions are
This brief presents recent results obtained on the analysis, synthesis and design of systems described by linear equations. It is well known that linear equations arise in most branches of science and
In this monograph we introduce and examine four new temporal logic formalisms that can be used as specification languages for the automated verification of the reliability of hardware and software des
This thesis presents a significant contribution to decentralized resource allocation problems with strategic agents. The study focused on three classes of problems arising in communication networks. (
Fil Filipov has taken basic management tenets to the next level through unforgiving implementation. The beauty is in their simplicity, the pain/reward in their execution. All were formed in a dynamic
The purpose of this book is to highlight a comparative studies between developed and underdeveloped countries on the impact of policy making decisions and politics on education and business as Mohamed
The purpose of this book is to highlight a comparative studies between developed and underdeveloped countries on the impact of policy making decisions and politics on education and business as Mohamed
This is a sensitive record of involuntary inspiration to express poetically the personal reaction to guidance, comfort and contentment gained from reading the Christian Bible and observing the beautie
In his first book, "Entering The Promised Land, " Willie's quest to understand how embedded social biases affect business success led to a much broader revelation. Religious Scholar by training, Willi
In his first book, "Entering The Promised Land, " Willie's quest to understand how embedded social biases affect business success led to a much broader revelation. Religious Scholar by training, Willi
Online scheduling is recognized as the crucial decision-making process of production control at a phase of “being in production" according to the released shop floor schedule. Online scheduling can be
It's the journey, not the destination. Russ Oyer took his final step on this tangled path in March 2012 and now is a permanent resident in heaven. In this work, Russ shares how God revealed Himself to
This book is about depression and the despicable damage it does to our lives if not handled in a healthy way. However, this book proffers practical remedies-cum-suggestions in handling depression. The
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples
Embarking on yet another journey, Suzanne writes about her experiences and tries to make some sense of this confusion we call American education. With a European perspective, she will develop the best
You are about to read a much-needed book that will open your eyes to the Africa that has been hidden from us. Thinking out of the box of Western thought pattern, Dr. Jonathan has been able to give to
You are about to read a much-needed book that will open your eyes to the Africa that has been hidden from us. Thinking out of the box of Western thought pattern, Dr. Jonathan has been able to give to
An Introduction to Enterprise Architecture is the culmination of several decades of experience that I have gained through work initially as an information technology manager and then as a consultant t
There are several different themes running through my book but the predominant ones are as follows. One essential aspect is to assist the ordinary person in the street to find personal confirmation of
The 2/1 Game Force bidding system is an improvement over the Standard American System that has been in effect and played by bridge players for many years. The advantage of the 2/1 system is that it al
This third volume of the series Changing the Global Approach to Medicine explores the programmed command and control functions in a biologic cell. Command and control functions facilitate the intricat