Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Computer Science  (1,584)
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV010983272
    Format: XIV, 468 S. , graph. Darst. , 1 Diskette (9 cm)
    ISBN: 0387945180
    Note: Bd. 1 u.d.T.: Economic and financial modeling with Mathematica. - Systemvoraussetzungen: files can be read on DOS/Windows, Macintosh, NeXT, and UNIX computers; Mathematica 2.2 or later is recommended for maximum use of the diskette files
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    Keywords: Ökonometrisches Modell ; Mathematica ; Finanzplanungsmodell ; Mathematica ; Aufsatzsammlung ; Lehrbuch
    Author information: Varian, Hal R. 1947-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham : Springer International Publishing AG
    UID:
    b3kat_BV048224438
    Format: 1 Online-Ressource (291 Seiten)
    ISBN: 9783030572501
    Series Statement: International Series in Operations Research and Management Science Ser. v.298
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Contents -- Chapter 1: Introduction to Modelling in Mathematical Programming -- 1.1 Model -- 1.2 Classical Components of a Mathematical Programming Model -- 1.3 Classification of Mathematical Programming Models -- 1.4 First Example -- 1.5 Considerations on the Format of a Mathematical Model -- 1.6 Justification of the Use of Mathematical Programming Models -- References -- Chapter 2: Structure of a Mathematical Programming Model -- 2.1 Environment of an Optimization Problem -- 2.2 Components of an Optimization Problem -- 2.3 Examples -- References -- Chapter 3: The Elements of a System -- 3.1 Introduction -- 3.2 Data of Elements -- 3.2.1 Belonging of the Data -- 3.2.2 Primary Element in a Shared Attribute -- 3.2.3 Type of Value of the Data -- 3.2.4 Representation -- 3.2.5 Inclusion of Calculated Data -- 3.3 The Quantitative Nature of the Elements -- 3.3.1 Collective Element vs Individual Items -- 3.4 Association of Elements in Sets -- 3.4.1 Assigning or Removing Data to Create Sets -- 3.4.2 Shared Data Between Elements of the Same Set -- 3.4.3 Hierarchical Definition of Sets -- 3.5 Data Generating Elements -- 3.6 Identification of Data in Graphic Environments. Elements in Graphs -- 3.6.1 Representation of Graphs -- 3.7 The Time Element -- 3.8 Element Duplication -- 3.9 Examples -- 3.9.1 Fire Stations (Source: Larrañeta et al. 2003) -- 3.9.2 Food Service (Source: Larrañeta et al. 2003) -- 3.9.3 Location of TV Cameras (Source: Larrañeta et al. 2003) -- 3.9.4 Trip Planning -- 3.9.5 Fixed Job Scheduling Problem (Kroon et al. 1995) -- 3.9.6 Health Centers -- References -- Chapter 4: Decision Activities -- 4.1 Introduction -- 4.2 Actions of a System -- 4.2.1 Actions with Calculated Value -- 4.2.2 Actions with Undetermined Value -- 4.3 Participating Elements in a Decision Activity -- 4.3.1 Rules of Participation , 4.4 Quantification of the Activity -- 4.5 Union of Activities -- 4.6 Examples -- 4.6.1 Fire Stations (Example 3.9.1 -- Source: Larrañeta et al. 2003) -- 4.6.2 Food Service (Example 3.9.2 -- Source: Larrañeta et al. 2003) -- 4.6.3 Location of TV Cameras (Example 3.9.3 -- Source: Larrañeta et al. 2003) -- 4.6.4 Trip Planning (Example 3.9.4) -- 4.6.5 Fixed Job Scheduling Problem (Example 3.9.5 -- Kroon et al. 1995 -- Kolen et al. 2007) -- 4.6.6 Health Centers (Example 3.9.6) -- References -- Chapter 5: Calculations in a System -- 5.1 Introduction -- 5.2 Auxiliary Calculations -- 5.2.1 Auxiliary Calculation of Value Selection -- 5.3 Logical Calculations -- 5.3.1 Logical Propositions and Logical Operators -- 5.3.2 Identification and Definition of a Logical Calculation -- 5.3.3 Reduction of the Definition of a Logical Calculation -- 5.4 Lower/Upper Bound Calculations -- 5.4.1 Bounds on Undetermined Variables -- References -- Chapter 6: Modelling and Types of Specifications -- 6.1 Introduction -- 6.2 Elements on Which the Specification Falls on -- 6.3 Quantitative Specifications of Selection -- 6.4 Capacity Specifications -- 6.4.1 Case 1: Variable Capacity Consumption and Fixed Contribution -- 6.4.2 Case 2: Variable Consumption with Fixed and Variable Capacity Contribution -- 6.4.3 Case 3: Fixed Capacity Demand and Variable Capacity Contribution -- 6.5 Supply of a Demand -- 6.6 Bound Imposition Specifications -- 6.7 Allocation, Balance, or Equilibrium Specifications -- 6.7.1 Explicit Case -- 6.7.2 Implicit Case -- 6.8 Modelling of Propositional Logic Specifications -- 6.8.1 Simple Propositions and Logical Operators -- 6.8.2 Reduction of Signs -- 6.8.3 Modelling Operators Individually -- 6.8.3.1 Negation Operator (NOT -- ) -- 6.8.3.2 Conditional Operator (IF THEN -- ) -- 6.8.3.3 Biconditional Operator (IF AND ONLY IF -- ) -- 6.8.3.4 Disjunction Operator (OR. , ) -- 6.8.3.5 Conjunction Operator (AND -- ) -- 6.8.3.6 Exclusive Disjunction Operator (EITHER OR -- ) -- 6.8.4 Modelling Compound Propositions with Various Operators -- 6.8.4.1 Negation Operator (NOT -- ): -- 6.8.4.2 Disjunction Operator (OR -- ) and Exclusive Disjunction (EITHER OR -- ): -- 6.8.4.3 Conjunction Operator (AND -- ) -- 6.8.4.4 Conditional and Biconditional Operators -- 6.8.5 Data as Propositions -- 6.8.6 Logical Propositions That Express Possibility -- 6.9 Objective Criterion -- 6.9.1 Cost According to Interval of Values -- 6.9.2 Cost According to the Value of Another Variable -- 6.9.3 Costs Depending on the Deviation of the Variable -- 6.9.3.1 Penalty by Excess -- 6.9.3.2 Bonus by Excess -- 6.9.3.3 Penalty by Default -- 6.9.3.4 Bonus by Default -- 6.10 Identification of Specifications -- References -- Chapter 7: The Quantitative Nature of the Elements -- 7.1 Introduction -- 7.2 Individual Element Not Measurable Defined as Measurable -- 7.3 Measurable Element with Both Measurable and Logical Decisions -- 7.4 Individual Elements with Capacity to be Grouped in Collective Elements: Redefining the System with Simple Changes -- 7.5 Individual Elements with Capacity to Be Grouped in Collective Elements: Redefining the System Description with Complex Cha... -- 7.6 Individual Elements with Capacity to be Grouped in Collective Elements: Through Grouping into Subsets -- 7.7 Individual Elements with Capacity to Be Grouped in Collective Elements: Through Small Changes in the Data Values -- 7.8 Items of Indeterminate Collective Elements that Need to Be Defined Individually -- References -- Chapter 8: Practical Examples -- 8.1 Production with Fixed Costs -- 8.2 Graph Coloring Problem [Jensen and Toft (1995)] -- 8.3 Configuration of Work Centers -- 8.4 Production and Delivery of Solar Panels -- 8.5 Selection of a Tree in a Graph , 8.6 Programming of Pilots for an Airline's Flights -- References -- Correction to: Modelling in Mathematical Programming
    Additional Edition: Erscheint auch als Druck-Ausgabe García Sánchez, José Manuel Modelling in Mathematical Programming Cham : Springer International Publishing AG,c2020 ISBN 9783030572495
    Language: English
    Subjects: Computer Science , Economics , Mathematics
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Optimierung ; Mathematische Modellierung
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV035032357
    Format: XXIII, 412 S. , 24 cm
    ISBN: 0471453803 , 9780471453802 , 0471253111 , 9780470226261
    Content: A primer in practical computer security aimed at those shopping, communication, or doing business online. -- almost everyone, in other words. -- P. 4 of cover.
    Note: Hier auch später erschienene, unveränderte Nachdrucke
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Datensicherung ; Rechnernetz ; Kryptologie ; Informationssystem ; Computersicherheit ; Informationssystem ; Datenübertragung ; Datensicherung ; Informationssystem ; Kryptologie ; Rechnernetz ; Computersicherheit
    Author information: Schneier, Bruce 1963-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Boston, Massachusetts : Harvard Business Review Press
    UID:
    b3kat_BV012440950
    Format: x, 352 Seiten
    ISBN: 9780875848631 , 087584863X
    Content: In Information Rules, authors Shapiro and Varian reveal that many classic economic concepts can provide the insight and understanding necessary to succeed in the information age. They argue that if managers seriously want to develop effective strategies for competing in the new economy, they must understand the fundamental economics of information technology. Whether information takes the form of software code or recorded music, is published in a book or magazine, or even posted on a website, managers must know how to evaluate the consequences of pricing, protecting, and planning new versions of information products, services, and systems. The first book to distill the economics of information and networks into practical business strategies, Information Rules is a guide to the winning moves that can help business leaders navigate successfully through the tough decisions of the information economy. Subjects covered include: Competitive advantage, Economic analysis, Game theory, Information age, Information economy, Information technology, Intellectual property, Marketing strategy, New economy, Pricing, Pricing strategy, Value of information
    Content: Also includes information on Adobe, Apple Computer, AT&T, Bell Atlantic, Cisco Systems, Computer Associates, customers, customer entrenchment, economies of scale, Electric Library, Encyclopedia Britannica, Federal Communications Commission (FCC), Federal Trade Commission (FTC), group pricing, high definition television (HDTV), IBM, information economy, installed base, Intel, Internet, Java, libraries, Macintosh, Microsoft Corp., Netscape Communications Corporation, network markets, Nintendo, Philips, positive feedback, Quicken, QWERTY keyboard, Rockwell, Sony, standards, standards wars, Sun Microsystems, switching costs, U.S. Department of Justice, U.S. Robotics, Windows, World Wide Web (WWW), etc
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    RVK:
    Keywords: Informationsökonomie ; Informationstechnik ; Wirtschaft ; Informationswirtschaft ; Electronic Commerce ; Internet ; Unternehmen ; Electronic Commerce ; Internet ; Wettbewerbsstrategie
    Author information: Shapiro, Carl 1955-
    Author information: Varian, Hal R. 1947-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV014936364
    Format: X, 232 S. , Ill., graph. Darst.
    ISBN: 3540002472
    Series Statement: Lecture notes in computer science 2539 : State-of-the-art survey
    Note: Preface: ...selected set of extended papers that were presented at the First and Second International Workshops on "Visual Interfaces to Digital Libraries," held at the Joint Conference on Digitial Libraries (JCDL) in 2001 and 2002 ...
    Language: English
    Subjects: Computer Science , General works
    RVK:
    RVK:
    Keywords: Elektronische Bibliothek ; Information Retrieval ; Visualisierung ; Mensch-Maschine-Kommunikation ; Graphische Benutzeroberfläche ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Konferenzschrift ; Aufsatzsammlung ; Aufsatzsammlung
    URL: Cover
    Author information: Börner, Katy 1967-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV010783997
    Format: XV, 636 S. , graph. Darst.
    ISBN: 0387946187
    Series Statement: Applications of mathematics 31
    Content: Pattern recognition presents one of the most significant challenges for scientists and engineers, and many different approaches have been proposed. The aim of this book is to provide a self-contained account of probabilistic analysis of these approaches. The book includes a discussion of distance measures, nonparametric methods based on kernels or nearest neighbors, Vapnik-Chervonenkis theory, epsilon entropy, parametric classification, error estimation, tree classifiers, and neural networks
    Content: Wherever possible, distribution-free properties and inequalities are derived. A substantial portion of the results or the analysis is new. Over 430 problems and exercises complement the material
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Mustererkennung ; Wahrscheinlichkeitstheorie ; Wahrscheinlichkeitsrechnung ; Aufgabensammlung
    URL: Cover
    URL: Inhaltsverzeichnis  (kostenfrei)
    Author information: Devroye, Luc
    Author information: Györfi, László
    Author information: Lugosi, Gábor 1964-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    New York [u.a.] : Springer
    UID:
    b3kat_BV009707075
    Format: X, 235 S.
    Edition: 2. ed.
    ISBN: 0387942939 , 3540942939
    Series Statement: Graduate texts in mathematics 114
    Content: The purpose of this book is to introduce the reader to arithmetic topics, both ancient and modern, that have been at the center of interest in applications of number theory, particularly in cryptography. No background in algebra or number theory is assumed, and the book begins with a discussion of the basic number theory that is needed. The approach taken is algorithmic, emphasizing estimates of the efficiency of the techniques that arise from the theory. A special feature is the inclusion of recent application of the theory of elliptic curves. Extensive exercises and careful answers have been included in all of the chapters. Because number theory and cryptography are fast-moving fields, this new edition contains substantial revisions and updated references.
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Zahlentheorie ; Kryptologie ; Kryptologie ; Zahlentheorie ; Einführung
    Author information: Koblitz, Neal 1948-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    b3kat_BV012810095
    Format: XII, 307 S. , Ill., graph. Darst.
    ISBN: 9780195131598 , 9780195131598 , 0195131592 , 0195131584
    Series Statement: Santa Fe Institute studies on the sciences of complexity
    Content: "This book provides a detailed look at models of social insect behavior and how to apply these models in the design of complex systems. The book shows how these models replace an emphasis on control, preprogramming, and centralization with designs featuring autonomy, emergence, and distributed functioning. These designs are proving immensely flexible and robust, able to adapt quickly to changing environments and to continue functioning even when individual elements fail
    Content: In particular, these designs are an exciting approach to the tremendous growth of complexity in software and information. Swarm Intelligence draws on up-to-date research from biology, neuroscience, artificial intelligence, robotics, operations research, and computer graphics, and each chapter is organized around a particular biological example, which is then used to develop an algorithm, a multiagent system, or a group of robots
    Content: The book will be an invaluable resource for a broad range of disciplines."--BOOK JACKET
    Note: Literaturverzeichnis Seite 275 - 296
    Language: English
    Subjects: Computer Science , Biology
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Soziale Insekten ; Intelligenz ; Schwarm ; Modell ; Künstliche Intelligenz ; Komplexes System ; Insektenstaat
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV010620355
    Format: XV, 316 S. , graph. Darst.
    Edition: 2., rev. ed.
    ISBN: 3540606912
    Content: Fuzzy controllers are a class of knowledge based controllers using artificial intelligence techniques with origins in fuzzy logic. They can be found either as stand-alone control elements or as integral parts of distributed control systems including conventional controllers in a wide range of industrial process control systems and consumer products
    Content: Applications of fuzzy controllers have become a well established practice for Japanese manufacturers of control equipment and systems, and are becoming more and more common in Europe and America. The main aim of this book is to show that fuzzy control is not totally ad hoc, that there exist formal techniques for the analysis of a fuzzy controller, and that fuzzy control can be implemented even when no expert knowledge is available
    Content: Thus the book is mainly oriented toward control engineers and theorists, although parts can be read without any knowledge of control theory and may be of interest to Al people. This 2nd, revised edition incorporates suggestions from numerous reviewers and updates and reorganizes some of the material
    Note: Literaturverz. S. 293 - 305
    Language: German
    Subjects: Computer Science , Engineering , Mathematics
    RVK:
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Regelungstheorie ; Fuzzy-Regelung ; Fuzzy-Menge ; Regelung
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Berkeley, CA : Apress L. P.
    UID:
    b3kat_BV048224470
    Format: 1 Online-Ressource (156 Seiten)
    ISBN: 9781484264614
    Note: Description based on publisher supplied metadata and other sources , Intro -- Contents -- About the Author -- Acknowledgments -- Introduction -- Part I: Agile Hybrids -- Chapter 1: Defining Agile Hybrids -- Hybrid Examples -- AgileFall -- ScrumBan -- Waterfall Plan - Agile Execution -- Mixed Environments -- Case Studies -- Practical Desperation - Trying Agile -- The Health Insurance Company -- SAP and Ecommerce in Biopharma and Cement -- Salesforce -- Summary -- Chapter 2: The Continuum Revisited -- Where Are You? -- Assessing Projects -- Assessing the Organization -- Critical Success Factors -- Tips for Successful Implementation -- Practical Examples -- Typical Impediments -- Summary -- Chapter 3: Building Your Agile Hybrid -- What Do You Know? -- Example - Technology Consulting Firm -- Example - Biopharma Company -- Example - State Investment Board -- Example - Marketing Software Company -- What Do You Have? -- Example - The Biopharma Corporation -- Example - Technical Consulting Firm -- Example - Marketing Software Company -- What Do You Need? -- Example - Technical Consulting Firm -- Example - Biopharma Corporation -- Example - A Technical College -- Who Do You Need? -- Example - Biopharma Company -- Example - Technical Consulting Firm -- Where Do You Start? -- Example - Financial Insurance Company -- Example - Biopharma -- What Next? -- Part II: Learning Agile -- Chapter 4: Agile History -- Roots of Agile Frameworks: Scrum -- Formation and Emergence -- Kanban and Lean -- 2001 - The Manifesto -- 2010-2020 -- Summary -- Chapter 5: Agile Values and Practices -- Agile Life Cycle Models -- Scrum - Basic Practices -- Agile Practices -- Backlog Grooming -- Agile Estimating -- Sizing and Story Points -- Estimating with Planning Poker -- Iteration or Sprint Planning -- Potentially Releasable Increments -- Sprint Planning Steps -- Demos -- Retrospectives -- Release Planning -- Summary , Chapter 6: Agile Teams and Challenges -- Challenge - Dedicated Teams -- Challenge - Cross-Functional Teams -- Challenge - Co-location -- Avoid the War Room Mentality -- Practical Examples -- Challenge - People -- Summary -- Chapter 7: Agile Servant- Leaders -- The Scrum Master -- The Agile Project Manager -- Servant-Leadership -- Practical Examples -- Helping Teams Self-Organize -- Facilitating Agile Processes -- Rigorous Definition of Done and Avoiding Technical Debt -- Technical Debt -- Technical Debt and the Case for Demos -- Teams That Demo Ship -- Facilitating the Daily Stand-Up -- Identifying and Removing Impediments -- Working with Product Owners -- Release Planning, Sprint Planning, and Prioritization -- Protecting Teams -- Using Agile Metrics, Artifacts, and Reporting -- Practicing Servant-Leadership -- Summary -- Chapter 8: The Product Owner in Agile -- Product Owner Responsibilities -- Project Inception -- Backlog Grooming -- Sprint Planning and Sprint Review -- Value Realization -- Product Owner Relationships -- The Team, Sprint Planning, and Value Realization -- Product Owner Relationship Issues -- Impacts of Product Owner Performance -- Common Product Owner Failures -- Effective and Ineffective Product Owner Behaviors -- How Ineffective Product Owners Impact Agile Projects -- Summary -- Chapter 9: The Agile Coach -- Coaching New Teams - Sink or Swim -- A First Release and Sprint Planning Scenario -- Coaching During Sprints -- Coaching in Sprint Reviews -- Coaching at Releases -- Summary -- Part III: Advanced Topics in Agile -- Chapter 10: Design Thinking with Agile -- What Is Design Thinking? -- Shared Concepts - Agile and Design Thinking -- User-Focused Design -- Problem-Solving -- Cross-Functional Teams -- Rapid Prototyping with Customer Feedback -- Failing Fast Revisited -- Alignment - Agile and Design Thinking , Design Thinking Phases -- Design Thinking Activities -- Outcomes -- Practical Examples - Design Thinking with Agile -- Promega and STR Normalization Manager -- CloudCraze and Coca-Cola -- Summary -- Chapter 11: The Executive Leader in Agile -- Leadership Misconceptions of Agile -- Leadership Mistakes with Agile -- How Executive Leadership Can Influence Agile's Benefits -- Don't Create Impediments - Remove Them -- Ruthless Prioritization -- Agile Governance -- Using Metrics for Agile Governance -- Making Leadership Decisions in Agile Environments -- Executive Servant-Leadership in Agile -- Impacts of Missing Servant-Leadership -- Summary -- Chapter 12: Implementing Agile -- Assessing Projects -- Assessing the Organization -- Critical Success Factors -- Practical Examples -- Typical Impediments -- Summary -- Chapter 13: Approaches to Scaling Agile -- Large-Scale Scrum (LeSS) -- Key Practices of LeSS -- Product and Process Focus -- Practices That Are Important to Success with LeSS -- When to Use LeSS -- Scaled Agile Framework (SAFe) -- Key Practices of SAFe -- Core Competencies of SAFe -- How to Determine If SAFe Fits -- Scrum@Scale -- Scrum@Scale Practices -- Key Practices of Scrum@Scale -- How to Determine If S@S Fits -- Determining If Your Organization Is Ready to Scale Agile -- Readiness to Change and Other Factors -- Assessing Organizational Fit -- Summary -- Bibliography -- Index
    Additional Edition: Erscheint auch als Druck-Ausgabe Belling, Shawn Succeeding with Agile Hybrids Berkeley, CA : Apress L. P.,c2020 ISBN 9781484264607
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages