Лучшая книга об игровой индустрии от известного американского журналиста Джейсона Шрейера. Автор собрал сотни уникальных и захватывающих историй создания лучших компьютерных игр десятилетия, рассказанных ему самими создателями. Получилась жизненная и нетривиальная книга о том, что стоит за каждой культовой игрой современности и какой ценой ее разработчики выпускают продукты, собирающие миллионы фанатов по всему миру. В книге вы найдете истории создания Diablo III и Dragon Age: Inquisition, Uncharted 4, Witcher III и многих других игровых бестселлеров.
In the forthcoming years, citizens of many countries will be provided with electronic identity cards. eID solutions may not only be used for passports, but also for communication with government authorities or local administrations, as well as for secure personal identification and access control in e-business. Further eID applications will be implemented in the healthcare sector. For some of these solutions we will not need a physical data carrier at all. The Handbook of eID Security is the first source presenting a comprehensive overview of this strongly discussed topic. It provides profound information on the following questions: – Which are the latest concepts, technical approaches, applications and trends in the field of eID? – Which areas of application are covered by the different eID concepts? – Which security mechanisms are used, for what reasons, and how can their reliability be ensured? – How will the security of personal data be guaranteed? This book is a perfect source of information for all persons working in industry, banking, healthcare, research institutes, administrations and public authorities: – who are involved in the development of eID application concepts, technical solutions, and of devices used for transfer and read out data to and from eIDs, – who have or will have to do with eID applications in their daily work, and – who participate in informing and discussing about the security and transparency of eID solutions.
Graph partitioning is a theoretical subject with applications in many areas, principally: numerical analysis, programs mapping onto parallel architectures, image segmentation, VLSI design. During the last 40 years, the literature has strongly increased and big improvements have been made. This book brings together the knowledge accumulated during many years to extract both theoretical foundations of graph partitioning and its main applications.
Explains for the first time how «computing with words» can aid in making subjective judgments Lotfi Zadeh, the father of fuzzy logic, coined the phrase «computing with words» (CWW) to describe a methodology in which the objects of computation are words and propositions drawn from a natural language. Perceptual Computing explains how to implement CWW to aid in the important area of making subjective judgments, using a methodology that leads to an interactive device—a «Perceptual Computer»—that propagates random and linguistic uncertainties into the subjective judgment in a way that can be modeled and observed by the judgment maker. This book focuses on the three components of a Perceptual Computer—encoder, CWW engines, and decoder—and then provides detailed applications for each. It uses interval type-2 fuzzy sets (IT2 FSs) and fuzzy logic as the mathematical vehicle for perceptual computing, because such fuzzy sets can model first-order linguistic uncertainties whereas the usual kind of fuzzy sets cannot. Drawing upon the work on subjective judgments that Jerry Mendel and his students completed over the past decade, Perceptual Computing shows readers how to: Map word-data with its inherent uncertainties into an IT2 FS that captures these uncertainties Use uncertainty measures to quantify linguistic uncertainties Compare IT2 FSs by using similarity and rank Compute the subsethood of one IT2 FS in another such set Aggregate disparate data, ranging from numbers to uniformly weighted intervals to nonuniformly weighted intervals to words Aggregate multiple-fired IF-THEN rules so that the integrity of word IT2 FS models is preserved Free MATLAB-based software is also available online so readers can apply the methodology of perceptual computing immediately, and even try to improve upon it. Perceptual Computing is an important go-to for researchers and students in the fields of artificial intelligence and fuzzy logic, as well as for operations researchers, decision makers, psychologists, computer scientists, and computational intelligence experts.
The only singular, all-encompassing textbook on state-of-the-art technical performance evaluation Fundamentals of Performance Evaluation of Computer and Telecommunication Systems uniquely presents all techniques of performance evaluation of computers systems, communication networks, and telecommunications in a balanced manner. Written by the renowned Professor Mohammad S. Obaidat and his coauthor Professor Noureddine Boudriga, it is also the only resource to treat computer and telecommunication systems as inseparable issues. The authors explain the basic concepts of performance evaluation, applications, performance evaluation metrics, workload types, benchmarking, and characterization of workload. This is followed by a review of the basics of probability theory, and then, the main techniques for performance evaluation—namely measurement, simulation, and analytic modeling—with case studies and examples. Contains the practical and applicable knowledge necessary for a successful performance evaluation in a balanced approach Reviews measurement tools, benchmark programs, design of experiments, traffic models, basics of queueing theory, and operational and mean value analysis Covers the techniques for validation and verification of simulation as well as random number generation, random variate generation, and testing with examples Features numerous examples and case studies, as well as exercises and problems for use as homework or programming assignments Fundamentals of Performance Evaluation of Computer and Telecommunication Systems is an ideal textbook for graduate students in computer science, electrical engineering, computer engineering, and information sciences, technology, and systems. It is also an excellent reference for practicing engineers and scientists.
Starting with an updated description of Allen's calculus, the book proceeds with a description of the main qualitative calculi which have been developed over the last two decades. It describes the connection of complexity issues to geometric properties. Models of the formalisms are described using the algebraic notion of weak representations of the associated algebras. The book also includes a presentation of fuzzy extensions of qualitative calculi, and a description of the study of complexity in terms of clones of operations.
Mochten Sie mit einem Roboter Handchen halten? Wie fuhlt sich das wohl an? Sind Bewusstsein und Emotionen konstruierbar – oder bleiben sie ein allein menschliches Privileg? Schon im Jahr 2015 sind PCs ahnlich leistungsfahig wie das menschliche Gehirn. Das klingt zwar wie Science-Fiction, ist jedoch die gut begrundete Prognose von Wissenschaftlern, die sich mit Kunstlicher Intelligenz beschaftigen. Dabei geht es dem Autor, Bernd Vowinkel, nicht nur ausschlie?lich um die blo?e technische Machbarkeit: er stellt sowohl Gedankenexperimente vor, die in die Grenzbereiche von Philosophie und Wissenschaft vorsto?en, aber er geht auch existenziellen Fragen nach den langfristigen Auswirkungen der KI auf unsere Zivilisation nicht aus dem Weg. Dank seiner allgemein verstandlichen Sprache ist das Buch fur Jeden, der an kunstlicher Intelligenz interessiert ist, eine spannende Wanderung auf dem Grat zwischen Realitat und Fiktion!
Candidates for the Oracle Certified Associate in Oracle Database 11g need to pass Exams 1Z0-051 and 1Z0-052 to achieve their certification—this guide prepares you for taking both those exams. This two-in-one study guide covers the Oracle Certified Associate certification for Oracle database 11g and reviews exam topics such as restricting and sorting data, using conversion functions and conditional expressions, displaying data from multiple tables, and exploring the Oracle database architecture. Plus, you’ll learn how to create and maintain an Oracle database, perform database backups and recovery, move and manipulate data, prepare the database environment, and more. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. For Instructors: Teaching supplements are available for this title.
Here's the book you need to prepare for Exam 70-229, Designing and Implementing Databases with Microsoft SQL Server 2000 Enterprise Edition: In-depth coverage of every exam objective–all the information you need to know Practical information on designing and implementing a SQL Server 2000 database Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software, including a testing engine and electronic flashcards Authoritative coverage of all exam objectives, including: Developing a logical data model Implementing the physical database Retrieving and modifying data Programming business logic Tuning and optimizing data access Designing a database security plan Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Here's the book you need to prepare for Cisco's revised CCDA exam, 640-861. This Study Guide provides: In-depth coverage of every CCDA exam objective Practical information on Cisco design solutions Hundreds of challenging practice questions, in the book and on the CD Leading-edge exam preparation software, including a test engine, electronic flashcards, and simulation software Authoritative coverage of all exam objectives, including: Gathering and evaluating information regarding current and future network requirements Identifying possible opportunities for network performance improvement Evaluating solutions for meeting IP addressing, routing protocol, and network management needs Incorporating equipment and technology within a campus design Applying the Enterprise Composite Network Model Addressing the issues of delivering voice traffic over a data network Evaluating solutions for compliance with SAFE architecture Developing implementation, prototype testing, and verification plans Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.