This book follows on from Natural Computing in Computational Finance Volumes I, II and III. As in the previous volumes of this series, the book consists of a series of chapters each of which was
This is the second volume of Morgan Kaufmann's GPU Computing Gems, offering an all-new set of insights, ideas, and practical "hands-on" skills from researchers and developers worldwide. Each chapter g
This book constitutes the refereed proceedings of the International conference on Parallel and Distributed Computing and Networks, PDCN 2011, held in Chongqing, China, in December 2010. The 19 revised
Quantum computing and quantum information are two of the fastest growing and most exciting research fields in physics. Entanglement, teleportation and the possibility of using the non-local behavior o
This updated edition offers an indispensable exposition on real-time computing, with particular emphasis on predictable scheduling algorithms. It introduces the fundamental concepts of real-time compu
A large international conference in Electrical Engineering and Applied Computing was just held in London, 30 June – 2 July, 2010. This volume will contain revised and extended research articles writte
This book presents the state-of-the-art in simulation on supercomputers. Leading researchers present results achieved on systems of the High Performance Computing Center Stuttgart (HLRS) for the year
This collection of eighteen articles on distributed computing and next generation networking presents current scholarship in several areas of sensor and Internet technologies. The volume is divided in
This book constitutes the refereed proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST 2011, held in Pittsburgh, PA, USA in June 2011.The 23 revised full papers p
This book constitutes the refereed proceedings of the InternationalConference on Advances in Computing Communications and Control, ICAC32011, held in Mumbai, India, in January 2011.The 84 revised full
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environmentMany organizations are reporting or projecting a significant cost savings through the use of clou
Cloud computing, in which data is centrally stored, is introduced as enabling libraries to focus on their mission and services rather than on peripheral technical issues. In this Library and Informati
This two-volume set (CCIS 150 and CCIS 151) constitutes the refereed proceedings of the Second International Conference on Ubiquitous Computing and Multimedia Applications, UCMA 2011, held in Daejeon,
This two-volume set (CCIS 150 and CCIS 151) constitutes the refereed proceedings of the Second International Conference on Ubiquitous Computing and Multimedia Applications, UCMA 2011, held in Daejeon,
The purpose of the 12th Conference Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011) held on July 6-8, 2011 in Sydney, Australia was to bring tog
This book presents state-of-the-art research on architectures, algorithms, protocols and applications in pervasive computing and networksWith the widespread availability of wireless and mobile network
Computer scientists from many parts of the world describe recent efforts and achievements in overcoming problems and limitation associated with the service-oriented computing paradigm. Their topics in
This book constitutes the refereed proceedings of the 4th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, held in College Park, MD, USA, March 29-31, 2011. T
This timely text/reference presents the latest advances in various aspects of social media modeling and social media computing research. Gathering together superb research from a range of established
This book constitutes Part III of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010,
The 15 contributions in this volume propose frameworks for building pervasive computing systems and address the challenges posed by pervasive communications, context awareness, security, privacy, and
Computer scientists, software engineers, and other basic and application researchers explore approaches to computing that have emerged from distributed systems and exploit the ubiquity of computers an
This volume contains the refereed and revised papers of the Fourth International Conference on Design Computing and Cognition (DCC'10), held in Stuttgart, Germany. The material in this book represents
This collection of twenty-six articles on ambient computing, showcases current scholarship in the field of ubiquitous, user-oriented computer interface design. Topics discussed include context aware p
The primary purpose of this book is to capture the state-of-the-art in Cloud Computing technologies and applications. The book will also aim to identify potential research directions and technologies
ISGC 2010, The International Symposium on Grid Computing was held at Academia Sinica, Taipei, Taiwan, March, 2010. The 2010 symposium brought together prestigious scientists and engineers worldwide to
This two-volume set (CCIS 134 and CCIS 135) constitutes the refereedproceedings of the International Conference on Intelligent Computing andInformation Science, ICICIS2011, held in Chongqing, China, i
This two-volume set (CCIS 134 and CCIS 135) constitutes the refereedproceedings of the International Conference on Intelligent Computing andInformation Science, ICICIS2011, held in Chongqing, China, i
This is not a book about software project failure, or about prescriptive thinking about how to build software better. This is a book about the evil things that happen on computing and software projec
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereedproceedings of the 6th International Symposium on Visual Computing, ISVC 2010, heldin Las Vegas, NV, USA, in November/D
This book constitutes the refereed proceedings of the First International Conference on Swarm, Evolutionary, and Memetic Computing, SEMCCO 2010, held in Chennai, India, in December 2010.The 86 revised
Currently the methods of Soft Computing are successfully used for risk analysis in: budgeting, e-commerce development, portfolio selection, Black-Scholes option pricing models, corporate acquisition s
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereedproceedings of the 6th International Symposium on Visual Computing, ISVC 2010, heldin Las Vegas, NV, USA, in November/D
The topics of the conference are very timely as the phenomenal advancements of computing facilities have pierced every segment of science, engineering and technology to find solutions of complex probl
The three volume set LNCS 6453, LNCS 6454, and LNCS 6455 constitutes the refereedproceedings of the 6th International Symposium on Visual Computing, ISVC 2010, heldin Las Vegas, NV, USA, in November/D
The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing
The first complete overview of evolutionary computing, the collective name for a range of problem-solving techniques based on principles of biological evolution, such as natural selection and genetic
Cognitive Informatics (CI) is the science of cognitive information processing and its applications in cognitive computing. CI is a transdisciplinary enquiry of computer science, information science, c
Cloud computing enables businesses to do away with servers, cables and much of their other IT hardware by running their software online. It offers particular advantage to small business, as the
Innovations in Computing Sciences and Software Engineering includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Com