Udvidet returret til d. 31. januar 2025

Bøger i Simula SpringerBriefs on Computing serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af Joakim Sundnes
    396,95 kr.

    This open access book offers an initial introduction to programming for scientific and computational applications using the Python programming language. At the same time, readers are introduced to the fundamental concepts of programming, including variables, functions, loops, classes, and object-oriented programming.

  • - The FEniCS Tutorial I
    af Hans Petter Langtangen & Anders Logg
    604,95 kr.

  • af Kjell Jorgen Hole
    272,95 kr.

    This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-fragile ICT systems that limit the impact of all incidents, and which learn from small-impact incidents how to function increasingly well in changing environments. The book applies four design principles and one operational principle to achieve anti-fragility for different classes of incidents. It discusses how systems can achieve high availability, prevent malware epidemics, and detect anomalies. Analyses of Netflix¿s media streaming solution, Norwegian telecom infrastructures, e-government platforms, and Numentäs anomaly detection software show that cloud computing is essential to achieving anti-fragility forclasses of events with negative impacts.

  • af Hans Petter Langtangen & Geir K. Pedersen
    270,95 kr.

    The book serves both as a reference forvarious scaled models with corresponding dimensionless numbers, and as aresource for learning the art of scaling. The scientific literature is full of scaled models, but in mostof the cases, the scales are just stated without thorough mathematicalreasoning.

  • - Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment?
    af Olav Lysne
    269,95 kr.

    This open access book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors?

  • - Understanding and Avoiding Unrealism in Project Planning and Everyday Life
    af Torleif Halkjelsvik & Magne Jorgensen
    267,95 kr.

    It describes methods for predicting time usage in situations with high uncertainty, explains why two plus two is usually more than four in time prediction contexts, reports on research on time prediction biases, and summarizes the evidence in support of different time prediction methods and principles.

  • - The EMI Framework
     
    523,95 kr.

    This open access volume presents a novel computational framework for understanding how collections of excitable cells work. The approach allows for very detailed analysis of small collections of excitable cells, but computational challenges limit the applicability in the presence of large collections of cells.

  • - With Benefit Points and Size Points
    af Jo Erskine Hannay
    392,95 kr.

    This open access book presents a set of basic techniques for estimating the benefit of IT development projects and portfolios.

  • af Olav Lysne, Valeriya Naumova & Ahmed Elmokashfi
    395,95 kr.

    This open access book describes Smittestopp, the first Norwegian system for digital contact tracing of Covid-19 infections, which was developed in March and early April 2020. The system was deployed after five weeks of development and was active for a little more than two months, when a drop in infection levels in Norway and privacy concerns led to shutting it down. The intention of this book is twofold. First, it reports on the design choices made in the development phase. Second, as one of the only systems in the world that collected population data into a central database and which was used for an entire population, we can share experience on how the design choices impacted the system's operation. By sharing lessons learned and the challenges faced during the development and deployment of the technology, we hope that this book can be a valuable guide for experts from different domains, such as big data collection and analysis, application development, and deployment in a national population, as well as digital tracing.

  • af Joakim Sundnes
    508,95 kr.

    This open access volume explains the foundations of modern solvers for ordinary differential equations (ODEs). Formulating and solving ODEs is an essential part of mathematical modeling and computational science, and numerous solvers are available in commercial and open source software. However, no single ODE solver is the best choice for every single problem, and choosing the right solver requires fundamental insight into how the solvers work. This book will provide exactly that insight, to enable students and researchers to select the right solver for any ODE problem of interest, or implement their own solvers if needed. The presentation is compact and accessible, and focuses on the large and widely used class of solvers known as Runge-Kutta methods. Explicit and implicit methods are motivated and explained, as well as methods for error control and automatic time step selection, and all the solvers are implemented as a class hierarchy in Python.

  • af Yan Zhang
    257,95 kr.

    This open access book offers comprehensive, self-contained knowledge on Digital Twin (DT), which is a very promising technology for achieving digital intelligence in the next-generation wireless communications and computing networks. DT is a key technology to connect physical systems and digital spaces in Metaverse.The objectives of this book are to provide the basic concepts of DT, to explore the promising applications of DT integrated with emerging technologies, and to give insights into the possible future directions of DT. For easy understanding, this book also presents several use cases for DT models and applications in different scenarios.The book starts with the basic concepts, models, and network architectures of DT. Then, we present the new opportunities when DT meets edge computing, Blockchain and Artificial Intelligence, anddistributed machine learning (e.g., federated learning, multi-agent deep reinforcement learning). We also present a wide application of DT as an enabling technology for 6G networks, Aerial-Ground Networks, and Unmanned Aerial Vehicles (UAVs).The book allows an easy cross-reference owing to the broad coverage on both the principle and applications of DT. The book is written for people interested in communications and computer networks at all levels. The primary audience includes senior undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators and research strategists.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.