Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.
Contents:A Lightweight Passive Replication Protocol for Deterministic Serves (J Ahn)A Fair Bandwidth Allocation Scheme for Multimedia Handoff Calls in Cellular Networks (M Salamah & I Candan)Characterizing Voice and Video Traffic Behavior over the Internet (P Calyam & C-G Lee)A Path Restoration Algorithm Sharing the Resource in GMPLS Network (T-M Han et al.)More Efficient Java RMI for GPRS Devices (J Kawash et al.)Cluster-Based Security Mechanism for Sensor Network Communication (I Doh et al.)Performance Considerations for Elliptic Curve Cryptography in Communications (O O Bozkurt)A Dynamic Route Optimization to Support Network Mobility by Using HMNR Scheme (M-S Jeong et al.)Performance Analysis of Reliable Multicast Protocols (C Celik & C F Bazlamacci)A New Algorithm for Horizontal Handover Management in Wireless Mobile Networks (A Tuysuz & M Yildirim)and other papers
Readership: Graduate students, academics and researchers in the field of computer networks and telecommunications.
Keywords:Computer Networks;Wireless Systems;Quality of Service (QoS);Internet and Multimedia;Parallel and Distributed Computing;Performance Evaluation
The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging.
The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27–8, 2014.
Based on a rigorous selection of worldwide submissions of advanced research papers, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks.
This book provides the reader with a timely access to the work of vibrant research groups in many different areas of the world where the new frontiers of computing and communications are being created.
Readership: Graduate students, academics, and professionals in the field of computer science.
Keywords:Computer Science History;Pioneering Contributions in Computer Science and Engineering;Computer Pioneers;Technical Breakthroughs;Pioneering Authors in Computer ScienceKey Features:The book gives an account of major conceptual and practical developments in computer science, which are presented here by the major contributors themselvesAll of the authors of the book are themselves pioneers of computers and of computer science, rather than people who may recount the major developments from a second-hand perspective
The contributions to the book include many of the principal leaders from industry and academia with a truly international coverage, including several IEEE and ACM Fellows, two Fellows of the US National Academy of Engineering and a Fellow of the European Academy, and a former President of the Association of Computing Machinery.Contents:Ken Sevcik as an Advisor and Mentor (E Lazowska et al.)Shadow Servers and Priority Scheduling (J P Buzen)On the Chronology of Dynamic Allocation Index Policies: The Pioneering Work of K C Sevcik (E Coffman)Operational Analysis (P J Denning)Function Approximation by Random Neural Networks with a Bounded Number of Layers (E Gelenbe et al.)The Achilles' Heel of Computer Performance Modeling and the Model Building Shield (V De Nitto Personè & G Lazeolla)Wireless Network Simulation: Towards a Systematic Approach (S K Tripathi et al.)Location- and Power-Aware Protocols for Wireless Networks with Asymmetric Links (G Wang et al.)Multi-Threaded Servers with High Service Time Variation for Layered Queueing Networks (G Franks et al.)Quantiles of Sojourn Times (P G Harrison & W J Knottenbelt)Asymptotic Solutions for Two Non-Stationary Problems in Internet Reliability (Y Kogan & G Choudhury)Burst Loss Probabilities in an OBS Network with Dynamic Simultaneous Link Possession (T Battestilli & H Perros)Stochastic Analysis of Resource Allocation in Parallel Processing Systems (M S Squillante)Periodic Task Cluster Scheduling in Distributed Systems (H Karatza)
Readership: Graduate students, Internet engineers, computer scientists, system engineers, and computer designers. Also suitable for use in professional development seminars in computers and networks.
Keywords:Computer Networks;Distributed Systems;Performance Analysis of Computer Systems;Performance Control and Optimization;System Performance Evaluation;Analytic Models;Simulation Methods
This book will have a broad appeal to students, practitioners and researchers in several different areas, including practicing computer engineers as well as computer science and engineering students.Contents:Basic Tools of Probabilistic ModellingThe Queue with Server of Walking Type and Its Applications to Computer System ModellingQueueing Network ModelsQueueing Networks with Multiple Classes of Positive and Negative Customers and Product Form SolutionMarkov-Modulated QueuesDiffusion Approximation Methods for General Queueing NetworksApproximate Decomposition and Iterative Techniques for Closed Model SolutionSynthesis Problems in Single-Resource Systems: Characterisation and Control of Achievable PerformanceControl of Performance in Mutliple-Resource SystemsA Queue with Server of Walking Type
Readership: Academic, students, professionals, telecommunications industry, operations management and industry.
Keywords:Computer Systems;Computer Networks;Queuing Theory;Quality of Service;Performance Evaluation
A Summer Reading Pick for President Barack Obama, Bill Gates, and Mark Zuckerberg
From a renowned historian comes a groundbreaking narrative of humanity’s creation and evolution—a #1 international bestseller—that explores the ways in which biology and history have defined us and enhanced our understanding of what it means to be “human.”
One hundred thousand years ago, at least six different species of humans inhabited Earth. Yet today there is only one—homo sapiens. What happened to the others? And what may happen to us?
Most books about the history of humanity pursue either a historical or a biological approach, but Dr. Yuval Noah Harari breaks the mold with this highly original book that begins about 70,000 years ago with the appearance of modern cognition. From examining the role evolving humans have played in the global ecosystem to charting the rise of empires, Sapiens integrates history and science to reconsider accepted narratives, connect past developments with contemporary concerns, and examine specific events within the context of larger ideas.
Dr. Harari also compels us to look ahead, because over the last few decades humans have begun to bend laws of natural selection that have governed life for the past four billion years. We are acquiring the ability to design not only the world around us, but also ourselves. Where is this leading us, and what do we want to become?
Featuring 27 photographs, 6 maps, and 25 illustrations/diagrams, this provocative and insightful work is sure to spark debate and is essential reading for aficionados of Jared Diamond, James Gleick, Matt Ridley, Robert Wright, and Sharon Moalem.
Inside, you'll learn about:
Interaction design and physical computingThe Arduino hardware and software development environmentBasics of electricity and electronicsPrototyping on a solderless breadboardDrawing a schematic diagram
And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED.
Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.
The CWNA: Certified Wireless Network Administrator Official Study Guide: Exam CWNA-106 is the officially endorsed CWNA test prep for the leading wireless certification. Expert authors and CWNEs David D. Coleman and David A. Westcott guide readers through the skills and concepts candidates need to know for the exam, using hands-on methods to convey an in-depth understanding of wireless network administration. Readers should have a basic knowledge of Radio Frequency behavior, experience with WLAN hardware peripherals and protocols, and an interest in designing, installing, and managing wireless networks.
Wireless technology is taking over the tech industry, and the demand for competent, certified professionals is far outpacing the supply. A CWNA certification denotes advanced-level proficiency in the field, with a complete understanding of wireless LAN components, features, and function—but the only way to pass the exam is to truly understand the material, not just the talking points. The CWNA: Certified Wireless Network Administrator Official Study Guide thoroughly covers each exam objective, and includes review questions, assessment tests, and exercises to test your skills. Topics include:Radio Frequency technologies, regulations, and standards 802.11 protocols Network implementation and security 802.11 RF site surveying
Readers also get access to a suite of study tools including an electronic test engine with hundreds or practice test questions, electronic flashcards, exercise peripherals, and industry White Papers, which serve as valuable backup references. In preparing for the CWNA-106 exam, the ideal study guide should cover all of the exam topics in depth—CWNA: Certified Wireless Network Administrator Official Study Guide does just that, making it an excellent, comprehensive study guide.
A must-read for any cat lover, Cat Sense challenges our most basic assumptions about cats and promises to dramatically improve their lives—and ours.
Inside, you’ll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram
Getting started with Arduino is a snap. To use the introductory examples in this guide, all you need an Arduino Uno or earlier model, along with USB A-B cable and an LED. The easy-to-use Arduino development environment is free to download.
Join hundreds of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, Getting Started with Arduino gets you in on all the fun!
#1 NEW YORK TIMES BESTSELLER
Her name was Henrietta Lacks, but scientists know her as HeLa. She was a poor black tobacco farmer whose cells—taken without her knowledge in 1951—became one of the most important tools in medicine, vital for developing the polio vaccine, cloning, gene mapping, and more. Henrietta's cells have been bought and sold by the billions, yet she remains virtually unknown, and her family can't afford health insurance. This phenomenal New York Times bestseller tells a riveting story of the collision between ethics, race, and medicine; of scientific discovery and faith healing; and of a daughter consumed with questions about the mother she never knew.
If you administer a DNS system or are thinking about running one, or if you need to upgrade to support IPv6 DNS, need to secure a DNS for zone transfer, dynamic update, or other reasons, or if you need to implement DNSSEC, or simply want to understand the DNS system, then this book provides you with a single point of reference. Pro DNS and BIND starts with simple concepts, then moves on to full security-aware DNSSEC configurations. Various features, parameters, and resource records are described and, in the majority of cases, illustrated with one or more examples.
The book contains a complete reference to zone files, Resource Records, and BINDs configuration file parameters. You can treat the book as as a simple paint-by-numbers guide to everything from a simple caching DNS, to the most complex secure DNS (DNSSEC) implementation. Background information is still included for when you need to know what to do and why you have to do it, and so that you can modify processes to meet your unique needs.
In this third edition of a widely acclaimed resource, three networking experts share their extensive experience, teaching you the cabling skills you need to build a reliable, efficient, and cost-effective network cabling infrastructure. As you master these techniques, you'll learn to avoid common pitfalls and troubleshoot problems as quickly as they arise. Coverage includes:Choosing the right cables and components for your network architecture and topology Avoiding unnecessary and unexpected costs Understanding the current limitations of data communications and network cabling Understanding how laws and building codes constrain cabling Understanding the function and importance of universal cabling standards Determining when you have a cabling-related network problem Assembling a complete cabling toolkit Integrating voice and data on the same cable system Setting up an infrastructure in which desktops, printers, copiers, and other nodes share cabling Understanding issues of bandwidth, impedance, resistance, attenuation, crosstalk, capacitance, propagation, delay, and delay skew Working effectively with USB and Firewire Knowing when to discard legacy cabling and begin anew Documenting your cabling Creating an RFP and selecting a vendor
By showing us the true nature of chance and revealing the psychological illusions that cause us to misjudge the world around us, Mlodinow gives us the tools we need to make more informed decisions. From the classroom to the courtroom and from financial markets to supermarkets, Mlodinow's intriguing and illuminating look at how randomness, chance, and probability affect our daily lives will intrigue, awe, and inspire.
From the Trade Paperback edition.
Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists.Investigate an assortment of practical and intriguing project ideasPrep your ZigBee toolbox with an extensive shopping list of parts and programsCreate a simple, working ZigBee network with XBee radios in less than two hours -- for under $100Use the Arduino open source electronics prototyping platform to build a series of increasingly complex projectsGet familiar with XBee's API mode for creating sensor networksBuild fully scalable sensing and actuation systems with inexpensive componentsLearn about power management, source routing, and other XBee technical nuancesMake gateways that connect with neighboring networks, including the Internet
In providing a very readable text that avoids getting immersed in low-level technical details, while still providing a useful, practical guide to network programming for both undergraduates and busy IT professionals, this third edition continues the trend of its predecessors. To retain its currency, the text has been updated to reflect changes that have taken place in Java's network technology over the past seven years (including the release of Java 7), whilst retaining its notable features of numerous code examples, screenshots and end-of-chapter exercises.
The Earth teems with life: in its oceans, forests, skies and cities. Yet there’s a black hole at the heart of biology. We do not know why complex life is the way it is, or, for that matter, how life first began. In The Vital Question, award-winning author and biochemist Nick Lane radically reframes evolutionary history, putting forward a solution to conundrums that have puzzled generations of scientists.
For two and a half billion years, from the very origins of life, single-celled organisms such as bacteria evolved without changing their basic form. Then, on just one occasion in four billion years, they made the jump to complexity. All complex life, from mushrooms to man, shares puzzling features, such as sex, which are unknown in bacteria. How and why did this radical transformation happen?
The answer, Lane argues, lies in energy: all life on Earth lives off a voltage with the strength of a lightning bolt. Building on the pillars of evolutionary theory, Lane’s hypothesis draws on cutting-edge research into the link between energy and cell biology, in order to deliver a compelling account of evolution from the very origins of life to the emergence of multicellular organisms, while offering deep insights into our own lives and deaths.
Both rigorous and enchanting, The Vital Question provides a solution to life’s vital question: why are we as we are, and indeed, why are we here at all?
Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors.
Topics and features: examines the physical security of computer hardware, networks, and digital data; introduces the different forms of rogue software (or malware), discusses methods for preventing and defending against malware, and describes a selection of viruses, worms and Trojans in detail; investigates the important threats to network security, and explores the subjects of authentication, spyware, and identity theft; discusses issues of privacy and trust in the online world, including children's privacy and safety; includes appendices which discuss the definition, meaning, and history of the term hacker, introduce the language of "l33t Speak", and provide a detailed virus timeline; provides numerous exercises and examples throughout the text, in addition to a Glossary of terms used in the book; supplies additional resources at the associated website, http://www.DavidSalomon.name/, including an introduction to cryptography, and answers to the exercises.
Clearly and engagingly written, this concise textbook is an ideal resource for undergraduate classes on computer security. The book is mostly non-mathematical, and is suitable for anyone familiar with the basic concepts of computers and computations.
Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts. Part I covers LAN Networks and Cabling Systems offers comprehensive coverage on current cabling methodologies and is updated to the latest industry standards. Part II addresses Fiber-Optic Cabling and Components probes deeper into fiber optics, and can be used to prepare for the Fiber Optics Installer (FOI) and/or Fiber Optics Technician (FOT) certifications, two of the Electronic Technician's Association's leading certifications.Explains why cutting corners is a bad idea Walks you through the obstacles to high-speed data transfer Encourages you to follow the golden rules of cabling
This new edition is the only book you need for current cabling methodologies and standards.
Whether you are a student struggling to fulfill a math or science requirement, or you are embarking on a career change that requires a new skill set, A Mind for Numbers offers the tools you need to get a better grasp of that intimidating material. Engineering professor Barbara Oakley knows firsthand how it feels to struggle with math. She flunked her way through high school math and science courses, before enlisting in the army immediately after graduation. When she saw how her lack of mathematical and technical savvy severely limited her options—both to rise in the military and to explore other careers—she returned to school with a newfound determination to re-tool her brain to master the very subjects that had given her so much trouble throughout her entire life.
In A Mind for Numbers, Dr. Oakley lets us in on the secrets to learning effectively—secrets that even dedicated and successful students wish they’d known earlier. Contrary to popular belief, math requires creative, as well as analytical, thinking. Most people think that there’s only one way to do a problem, when in actuality, there are often a number of different solutions—you just need the creativity to see them. For example, there are more than three hundred different known proofs of the Pythagorean Theorem. In short, studying a problem in a laser-focused way until you reach a solution is not an effective way to learn. Rather, it involves taking the time to step away from a problem and allow the more relaxed and creative part of the brain to take over. The learning strategies in this book apply not only to math and science, but to any subject in which we struggle. We all have what it takes to excel in areas that don't seem to come naturally to us at first, and learning them does not have to be as painful as we might think!
From the Trade Paperback edition.
This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors’ pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow’s smart grids.
Topics and features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs); explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource.
In the current debate about creationism and intelligent design, there is an element of the controversy that is rarely mentioned-the evidence. Yet the proof of evolution by natural selection is vast, varied, and magnificent. In this succinct and accessible summary of the facts supporting the theory of natural selection, Jerry A. Coyne dispels common misunderstandings and fears about evolution and clearly confirms the scientific truth that supports this amazing process of change. Weaving together the many threads of modern work in genetics, paleontology, geology, molecular biology, and anatomy that demonstrate the "indelible stamp" of the processes first proposed by Darwin, Why Evolution Is True does not aim to prove creationism wrong. Rather, by using irrefutable evidence, it sets out to prove evolution right.
This is a Quick Guide to Cloud Computing and Cyber Security - For Beginners.
Cloud computing has appeared in many small forms and now it is emerging as a huge solution to the problem of the fast changing and increasingly cyber world in which we live and work.
Table of Contents
What is Cloud Computing?
Types of Cloud Computing
Cloud Computing Examples
Cyber Security Dangers
Layers of Security
Cloud Computing and Security Threats
The Need for Policies
In this book, cloud computing and cyber security is described in a way that covers all sizes and implementations of businesses involved in using this method of computing.
Also by Marcia:
Silver & Gold Guide Top Tips: Learn How to Quickly Invest - Build your Wealth with Gold and Silver Bullion
Money Quick Makeovers Top Tips: Money Management Guide
"Intelligent Design" is being taught in our schools; educators are being asked to "teach the controversy" behind evolutionary theory. There is no controversy. Dawkins sifts through rich layers of scientific evidence—from living examples of natural selection to clues in the fossil record; from natural clocks that mark the vast epochs wherein evolution ran its course to the intricacies of developing embryos; from plate tectonics to molecular genetics—to make the airtight case that "we find ourselves perched on one tiny twig in the midst of a blossoming and flourishing tree of life and it is no accident, but the direct consequence of evolution by non-random selection." His unjaded passion for the natural world turns what might have been a negative argument, exposing the absurdities of the creationist position, into a positive offering to the reader: nothing less than a master’s vision of life, in all its splendor.
Topics covered include communications technologies, networking models and standards, local area and wide area networks, network protocols, TCP/IP-based networks and network management.
• Includes plenty of material on wireless communications, both fixed and mobile
• Offers coverage of network security
•Features many explanatory diagrams
• Incorporates a comprehensive glossary
Written by John Cowley, a lecturer with many years' experience teaching undergraduate programmes, the text takes the reader through the essentials of networking and provides a comprehensive, reliable and thorough treatment of the subject.
The Author's website http://www.fcet.staffs.ac.uk/jc9 provides further material in the form of solutions, further examples and other relevant subject materials.
This book is chock-full of helpful technical illustrations and code examples to help you get started on all of the major architectures and features of Juniper QFX5100 switches, whether you’re an enterprise or service provider. With this book, you’ll be well on your way to becoming a Juniper QFX5100 expert.
All of the examples and features are based on Junos releases 13.2X51-D20.2 and 14.1X53-D10.Fully understand the hardware and software architecture of the Juniper QFX5100Design your own IP Fabric architecturePerform in-service software upgradesBe familiar with the performance and scaling maximumsCreate a data center switching fabric with Virtual Chassis FabricAutomate networking devices with Python, Ruby, Perl, and GoBuild an overlay architecture with VMware NSX and Juniper ContrailExport real-time analytics information to graph latency, jitter, bandwidth, and other features
OpenBTS can distribute any internet connection as a mobile network across a large geographic region, and provide connectivity to remote devices in the Internet of Things. Ideal for telecom and software engineers new to this technology, this book helps you build a basic OpenBTS network with voice and SMS services and data capabilities. From there, you can create your own niche product or experimental feature.Select hardware, and set up a base operating system for your projectConfigure, troubleshoot, and use performance-tuning techniquesExpand to a true multinode mobile network complete with Mobility and HandoverAdd general packet radio service (GPRS) data connectivity, ideal for IoT devicesBuild applications on top of the OpenBTS NodeManager control and event APIs
This hands-on textbook/reference presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Each chapter opens with a concise introduction to a specific problem, supporting the theory with numerous examples, before providing a list of relevant algorithms. These algorithms are described in detail from conceptual basis to pseudocode, complete with graph templates for the stepwise implementation of the algorithm, followed by its analysis. The chapters then conclude with summarizing notes and programming exercises.
Topics and features: introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization; reviews graph-theoretical distributed approximation algorithms with applications in ad hoc wireless networks; describes in detail the implementation of each algorithm, with extensive use of supporting examples, and discusses their concrete network applications; examines key graph-theoretical algorithm concepts, such as dominating sets, and parameters for mobility and energy levels of nodes in wireless ad hoc networks, and provides a contemporary survey of each topic; presents a simple simulator, developed to run distributed algorithms; provides practical exercises at the end of each chapter.
This classroom-tested and easy-to-follow textbook is essential reading for all graduate students and researchers interested in discrete mathematics, algorithms and computer networks.
Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two.
This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network.
Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include:AuthenticationRemote GUI connectivityStorage managementFile sharing and synchronizing resourcesSecurity/lockdown instructionLog files and monitoringTroubleshootingSystem rescue, recovery, and repair
Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.
Early studies of the human brain used a simple method: wait for misfortune to strike -- strokes, seizures, infectious diseases, horrendous accidents -- and see how victims coped. In many cases their survival was miraculous, if puzzling. Observers were amazed by the transformations that took place when different parts of the brain were destroyed, altering victims' personalities. Parents suddenly couldn't recognize their own children. Pillars of the community became pathological liars. Some people couldn't speak but could still sing.
In The Tale of the Dueling Neurosurgeons, Sam Kean travels through time with stories of neurological curiosities: phantom limbs, Siamese twin brains, viruses that eat patients' memories, blind people who see through their tongues. He weaves these narratives together with prose that makes the pages fly by, to create a story of discovery that reaches back to the 1500s and the high-profile jousting accident that inspired this book's title.* With the lucid, masterful explanations and razor-sharp wit his fans have come to expect, Kean explores the brain's secret passageways and recounts the forgotten tales of the ordinary people whose struggles, resilience, and deep humanity made neuroscience possible.
*"The Tale of the Dueling Neurosurgeons" refers to the case of French king Henri II, who in 1559 was lanced through the skull during a joust, resulting in one of the most significant cases in neuroscience history. For hundreds of years scientists have gained important lessons from traumatic accidents and illnesses, and such misfortunes still represent their greatest resource for discovery.
In The Disappearing Spoon, bestselling author Sam Kean unlocked the mysteries of the periodic table. In THE VIOLINIST'S THUMB, he explores the wonders of the magical building block of life: DNA.
There are genes to explain crazy cat ladies, why other people have no fingerprints, and why some people survive nuclear bombs. Genes illuminate everything from JFK's bronze skin (it wasn't a tan) to Einstein's genius. They prove that Neanderthals and humans bred thousands of years more recently than any of us would feel comfortable thinking. They can even allow some people, because of the exceptional flexibility of their thumbs and fingers, to become truly singular violinists.
Kean's vibrant storytelling once again makes science entertaining, explaining human history and whimsy while showing how DNA will influence our species' future.
The math we learn in school can seem like a dull set of rules, laid down by the ancients and not to be questioned. In How Not to Be Wrong, Jordan Ellenberg shows us how terribly limiting this view is: Math isn’t confined to abstract incidents that never occur in real life, but rather touches everything we do—the whole world is shot through with it.
Math allows us to see the hidden structures underneath the messy and chaotic surface of our world. It’s a science of not being wrong, hammered out by centuries of hard work and argument. Armed with the tools of mathematics, we can see through to the true meaning of information we take for granted: How early should you get to the airport? What does “public opinion” really represent? Why do tall parents have shorter children? Who really won Florida in 2000? And how likely are you, really, to develop cancer?
How Not to Be Wrong presents the surprising revelations behind all of these questions and many more, using the mathematician’s method of analyzing life and exposing the hard-won insights of the academic community to the layman—minus the jargon. Ellenberg chases mathematical threads through a vast range of time and space, from the everyday to the cosmic, encountering, among other things, baseball, Reaganomics, daring lottery schemes, Voltaire, the replicability crisis in psychology, Italian Renaissance painting, artificial languages, the development of non-Euclidean geometry, the coming obesity apocalypse, Antonin Scalia’s views on crime and punishment, the psychology of slime molds, what Facebook can and can’t figure out about you, and the existence of God.
Ellenberg pulls from history as well as from the latest theoretical developments to provide those not trained in math with the knowledge they need. Math, as Ellenberg says, is “an atomic-powered prosthesis that you attach to your common sense, vastly multiplying its reach and strength.” With the tools of mathematics in hand, you can understand the world in a deeper, more meaningful way. How Not to Be Wrong will show you how.
It took Charles Darwin more than twenty years to publish this book, in part because he realized that it would ignite a firestorm of controversy. On the Origin of Species first appeared in 1859, and it remains a continuing source of conflict to this day. Even among those who reject its ideas, however, the work's impact is undeniable. In science, philosophy, and theology, this is a book that changed the world.
In addition to its status as the focus of a dramatic turning point in scientific thought, On the Origin of Species stands as a remarkably readable study. Carefully reasoned and well-documented in its arguments, the work offers coherent views of natural selection, adaptation, the struggle for existence, survival of the fittest, and other concepts that form the foundation of modern evolutionary theory. This volume is a reprint of the critically acclaimed first edition.
The 54 revised full papers presented in this volume were carefully reviewed and selected from 148 submissions.
The Algorithms and Data Structures Symposium - WADS (formerly Workshop on Algorithms And Data Structures), which alternates with the Scandinavian Workshop on Algorithm Theory, is intended as a forum for researchers in the area of design and analysis of algorithms and data structures. WADS includes papers presenting original research on algorithms and data structures in all areas, including bioinformatics, combinatorics, computational geometry, databases, graphics, and parallel and distributed computing.
Research into the human brain has exploded in recent years, and neuroscience has become a major program at many universities and a required course for a wide range of studies. Neuroscience For Dummies tracks to an introductory neuroscience class, giving you an understanding of the brain's structure and function, as well as a look into the relationship between memory, learning, emotions, and the brain. Providing insight into the biology of mental illness and a glimpse at future treatments and applications of neuroscience, Neuroscience For Dummies is a fascinating read for students and general interest readers alike.
The brain holds the secrets to our personalities, our use of language, our love of music, and our memories. Neuroscience For Dummies looks at how this complex structure works, according to the most recent scientific discoveries, illustrated by helpful diagrams and engaging anecdotes.Helpful diagrams and engaging anecdotes enhance material The latest scientific discoveries are sprinkled throughout Tracks to a typical introductory neuroscience class
From how the brain works to how you feel emotions, Neuroscience For Dummies offers a comprehensive overview of the fascinating study of the human brain.
We include handy “buyer’s guides” that tell you how to make smart choices when purchasing network hardware. With hardware in hand, we then show you how to roll up your shirtsleeves and put everything together, including configuring a router, laying cable, and connecting the devices. Next, we then show you how to wrangle with Windows Vista’s networking features. These techniques include using the Network and Sharing Center, managing wired and wireless connections, accessing shared network resources, sharing local resources on the network, and working with network files offline. And if you are a music and video aficionado, we’ve got you covered with a special chapter that shows you just how to set up a networked Vista PC as your digital media hub!
No networking book would be complete without extensive coverage of security issues that affect anyone connected to the Internet. We show you how to secure each computer, secure your global networking settings, and batten down your wireless connections. The last part of the book includes intermediate networking tasks such as
making remote connections, monitoring the network, troubleshooting network problems, and setting up Vista’s built-in web server and FTP server.
• No longer is networking a topic that only geeks need to understand.
If you have even one computer on the Internet or if you use wireless
in your home or office, you need this book!
• Extensive hardware coverage that shows you what equipment to
buy and how to set it up!
• Easy to follow buyer’s guides that enable anyone to make smart
and informed choices when purchasing networking hardware.
• Complete and comprehensive coverage of Windows Vista’s
• Thwart hackers, crackers, thieves and other Internet malefactors
by following our easy to understand chapters on security!
• Loaded with tips, tricks, and shortcuts to make networking easier
and more secure.
• Chock full of real-world examples and network configurations that
you can put to work today!
In her third enthralling book about the brain, Judith Horstman takes us on a lively tour of our most important sex and love organ and the whole smorgasbord of our many kinds of love-from the bonding of parent and child to the passion of erotic love, the affectionate love of companionship, the role of animals in our lives, and the love of God.
Drawing on the latest neuroscience, she explores why and how we are born to love-how we're hardwired to crave the companionship of others, and how very badly things can go without love. Among the findings: parental love makes our brain bigger, sex and orgasm make it healthier, social isolation makes it miserable-and although the craving for romantic love can be described as an addiction, friendship may actually be the most important loving relationship of your life.
Based on recent studies and articles culled from the prestigious Scientific American and Scientific American Mind magazines, The Scientific American Book of Love, Sex, and the Brain offers a fascinating look at how the brain controls our loving relationships, most intimate moments, and our deep and basic need for connection.
For those who slept through Stats 101, this book is a lifesaver. Wheelan strips away the arcane and technical details and focuses on the underlying intuition that drives statistical analysis. He clarifies key concepts such as inference, correlation, and regression analysis, reveals how biased or careless parties can manipulate or misrepresent data, and shows us how brilliant and creative researchers are exploiting the valuable data from natural experiments to tackle thorny questions.
And in Wheelan’s trademark style, there’s not a dull page in sight. You’ll encounter clever Schlitz Beer marketers leveraging basic probability, an International Sausage Festival illuminating the tenets of the central limit theorem, and a head-scratching choice from the famous game show Let’s Make a Deal—and you’ll come away with insights each time. With the wit, accessibility, and sheer fun that turned Naked Economics into a bestseller, Wheelan defies the odds yet again by bringing another essential, formerly unglamorous discipline to life.
The common ancestry of all humanity
The role of genes in sickness and health
Debates over the use of genetic technology
Written in an engaging, narrative manner, this concise introduction is an ideal starting point for anyone who wants to know more about genes, DNA, and the genetic ties that bind us all.
Rauber and Rünger take up these recent developments in processor architecture by giving detailed descriptions of parallel programming techniques that are necessary for developing efficient programs for multicore processors as well as for parallel cluster systems and supercomputers. Their book is structured in three main parts, covering all areas of parallel computing: the architecture of parallel systems, parallel programming models and environments, and the implementation of efficient application algorithms. The emphasis lies on parallel programming techniques needed for different architectures. For this second edition, all chapters have been carefully revised. The chapter on architecture of parallel systems has been updated considerably, with a greater emphasis on the architecture of multicore systems and adding new material on the latest developments in computer architecture. Lastly, a completely new chapter on general-purpose GPUs and the corresponding programming techniques has been added.
The main goal of the book is to present parallel programming techniques that can be used in many situations for a broad range of application areas and which enable the reader to develop correct and efficient parallel programs. Many examples and exercises are provided to show how to apply the techniques. The book can be used as both a textbook for students and a reference book for professionals. The material presented has been used for courses in parallel programming at different universities for many years.