Advances in computers. Volume 56 (©2002)
- Record Type:
- Book
- Title:
- Advances in computers. Volume 56 (©2002)
- Main Title:
- Advances in computers.
- Further Information:
- Note: Edited by M.V. Zelkowitz.
- Contents:
- Front Cover ; Advance in Computers ; Copyright Page ; Contents; Contributors; Preface; Chapter 1. Software Evolution and the Staged Model of the Software Lifecycle; 1. Introduction; 2. Initial Development; 3. Evolution-The Key Stage; 4. Servicing; 5. Phase-Out and Closedown; 6. Case Studies; 7. Software Change and Comprehension; 8. Sustaining Software Value; 9. Future Directions: Ultra Rapid Software Evolution; 10. Conclusions; Acknowledgments; References; Chapter 2. Embedded Software; 1. What is Embedded Software?; 2. Just Software on Small Computers? 3. Limitations of Prevailing Software Engineering Methods4. Actor-Oriented Design; 5. Examples of Models of Computation; 6. Choosing a Model of Computation; 7. Heterogeneous Models; 8. Component Interfaces; 9. Frameworks Supporting Models of Computation; 10. Conclusions; Acknowledgments; References; Chapter 3. Empirical Studies of Quality Models in Object-Oriented Systems; 1. Introduction; 2. Overview of Existing Studies; 3. Data Analysis Methodology; 4. Summary of Results; 5. Conclusions; Appendix A; Appendix B: Glossary; References. Chapter 4. Software Fault Prevention by Language Choice: Why C Is Not My Favorite Language1. Introduction and Background; 2. Why Use C?; 3. Why does Lisp Differ from C?; 4. Root Causes of Flaws: A Lisp Perspective; 5. Arguments against Lisp, and Responses; 6. But Why Is C Used by Lisp Implementors?; 7. Conclusion; Appendix 1: Cost of Garbage Collection; Appendix 2: Isn't C Free?; AcknowledgmentsFront Cover ; Advance in Computers ; Copyright Page ; Contents; Contributors; Preface; Chapter 1. Software Evolution and the Staged Model of the Software Lifecycle; 1. Introduction; 2. Initial Development; 3. Evolution-The Key Stage; 4. Servicing; 5. Phase-Out and Closedown; 6. Case Studies; 7. Software Change and Comprehension; 8. Sustaining Software Value; 9. Future Directions: Ultra Rapid Software Evolution; 10. Conclusions; Acknowledgments; References; Chapter 2. Embedded Software; 1. What is Embedded Software?; 2. Just Software on Small Computers? 3. Limitations of Prevailing Software Engineering Methods4. Actor-Oriented Design; 5. Examples of Models of Computation; 6. Choosing a Model of Computation; 7. Heterogeneous Models; 8. Component Interfaces; 9. Frameworks Supporting Models of Computation; 10. Conclusions; Acknowledgments; References; Chapter 3. Empirical Studies of Quality Models in Object-Oriented Systems; 1. Introduction; 2. Overview of Existing Studies; 3. Data Analysis Methodology; 4. Summary of Results; 5. Conclusions; Appendix A; Appendix B: Glossary; References. Chapter 4. Software Fault Prevention by Language Choice: Why C Is Not My Favorite Language1. Introduction and Background; 2. Why Use C?; 3. Why does Lisp Differ from C?; 4. Root Causes of Flaws: A Lisp Perspective; 5. Arguments against Lisp, and Responses; 6. But Why Is C Used by Lisp Implementors?; 7. Conclusion; Appendix 1: Cost of Garbage Collection; Appendix 2: Isn't C Free?; Acknowledgments and Disclaimers; References; Chapter 5. Quantum Computing and Communication; 1. Introduction; 2. The Surprising Quantum World; 3. The Mathematics of Quantum Mechanics; 4. Quantum Computing. 5. Quantum Communication and Cryptography6. Physical Implementations; 7. Conclusions; Appendix; References; Chapter 6. Exception Handling; 1. Introduction; 2. EHM Objectives; 3. Execution Environment; 4. EHM Overview; 5. Handling Models; 6. EHM Features; 7. Handler Context; 8. Propagation Models; 9. Propagation Mechanisms; 10. Exception Partitioning; 11. Matching; 12. Handler Clause Selection; 13. Preventing Recursive Resuming; 14. Multiple Executions and Threads; 15. Asynchronous Exception Events; 16. Conclusions; Appendix: Glossary; References. Chapter 7. Breaking the Robustness Barrier: Recent Progress on the Design of the Robust Multimodal System1. Introduction to Multimodal Systems; 2. Robustness Issues in the Design of Recognition-Based Systems; 3. Future Directions: Breaking the Robustness Barrier; 4. Conclusion; Acknowledgments; References; Chapter 8. Using Data Mining to Discover the Preferences of Computer Criminals; 1. Introduction; 2. The Target Selection Process of Criminals; 3. Predictive Modeling of Crime; 4. Discovering the Preferences of the Agents; 5. Methodology; 6. Testing with Synthetic Data; 7. Conclusions. … (more)
- Issue Display:
- Volume 56
- Volume:
- 56
- Issue Sort Value:
- 0000-0056-0000-0000
- Publisher Details:
- London San Diego, Calif : Academic Press
- Publication Date:
- 2002
- Copyright Date:
- 2002
- Extent:
- 1 online resource (xv, 400 pages)
- Subjects:
- 004
Computer science
Computers
Electronic data processing
COMPUTERS -- Reference
COMPUTERS -- Machine Theory
COMPUTERS -- Computer Literacy
COMPUTERS -- Information Technology
COMPUTERS -- Data Processing
COMPUTERS -- Computer Science
COMPUTERS -- Hardware -- General
Computer science
Electronic books - Languages:
- English
- ISBNs:
- 9780080526676
0080526675 - Notes:
- Note: Includes bibliographical references and indexes.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.35255
- Ingest File:
- 01_045.xml