This book begins by explaining key concepts in programming, and elaborates on characteristic of class, including inheritance, derivation and polymorphism.
This book begins by explaining key concepts in programming, and elaborates on characteristic of class, including inheritance, derivation and polymorphism.
Dieses Werk stellt eine kompakte und zugleich umfassende Einführung zu Mathematica dar, einem sehr populären und äußerst vielseitigen Computeralgebrasystem, welches auf der Programmiersprache Wolfram Language beruht.
Dieses Werk stellt eine kompakte und zugleich umfassende Einführung zu Mathematica dar, einem sehr populären und äußerst vielseitigen Computeralgebrasystem, welches auf der Programmiersprache Wolfram Language beruht.
This book is intended to support ISPF application programmers to become professional in the smart programming of ISPF applications using the REXX language.
This book is intended to support ISPF application programmers to become professional in the smart programming of ISPF applications using the REXX language.
Java is now well-established as one of the world's major programming languages, used in everything from desktop applications to web-hosted applications, enterprise systems and mobile devices.
This guide covers the fundamental technical principles and various business applications of Generative AI for planning, developing, and evaluating AI-driven products.
Unlock the power of Python in ArcGIS(R) Pro with this definitive, easy-to-follow guide designed for users with limited programming or scripting experience.
This book concerns peer-to-peer applications and mechanisms operating on the Internet, particularly those that are not fully automated and involve significant human interaction.
This book describes the 5G mobile network from a systems perspective, focusing on the fundamental design principles that are easily obscured by an overwhelming number of acronyms and standards definitions that dominate this space.
This book discusses an efficient random linear network coding scheme, called BATched Sparse code, or BATS code, which is proposed for communication through multi-hop networks with packet loss.
The congestion control mechanism has been responsible for maintaining stability as the Internet scaled up by many orders of magnitude in size, speed, traffic volume, coverage, and complexity over the last three decades.
Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications.
This monograph presents a concise mathematical approach for modeling and analyzing the performance of communication networks with the aim of introducing an appropriate mathematical framework for modeling and analysis as well as understanding the phenomenon of statistical multiplexing.
With the explosive increase in the number of mobile devices and applications, it is anticipated that wireless traffic will increase exponentially in the coming years.
Packet delay and energy consumption are important considerations in wireless and sensor networks as these metrics directly affect the quality of service of the application and the resource consumption of the network; especially, for a rapidly growing class of real-time applications that impose strict restrictions on packet delays.
NS-2 is an open-source discrete event network simulator which is widely used by both the research community as well as by the people involved in the standardization protocols of IETF.
Diffusion processes in large networks have been used to model many real-world phenomena, including how rumors spread on the Internet, epidemics among human beings, emotional contagion through social networks, and even gene regulatory processes.
This book results from many years of teaching an upper division course on communication networks in the EECS department at the University of California, Berkeley.
Edited in collaboration with FoLLI, the Association of Logic, Language and Information this book constitutes the refereed proceedings of the 28th Workshop on Logic, Language, Information and Computation, WoLLIC 2022, Iasi, Romania, in September 2022.
This book constitutes the proceedings of the 41st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2022, which took place in Munich, Germany, in September 2022.
This book constitutes the selected papers from the scientific satellite events held in conjunction with the19th International Conference on Service-Oriented Computing, ICSOC 2021.
This textbook presents methods and techniques for time series analysis and forecasting and shows how to use Python to implement them and solve data science problems.
This book constitutes the refereed proceedings of the 12th International Symposium on Foundations of Information and Knowledge Systems, FoIKS 2022, held in Helsinki, Finland, in June 2022.
Networks naturally appear in many high-impact domains, ranging from social network analysis to disease dissemination studies to infrastructure system design.
With the explosive growth of mobile computing and Internet of Things (IoT) applications, as exemplified by AR/VR, smart city, and video/audio surveillance, billions of mobile and IoT devices are being connected to the Internet, generating zillions of bytes of data at the network edge.
This book constitutes the refereed proceedings of the 25th European Conference on Genetic Programming, EuroGP 2022, held as part of Evo*2021, as Virtual Event, in April 2022, co-located with the Evo*2022 events, EvoCOP, EvoMUSART, and EvoApplications.