This open book describes how elite studies theoretically and methodologically construct their object, i.e. how particular conceptualizations of elites are turned into research practice using different methods for collecting, dealing with and analyzing empirical data. The first of four sections focuses on what Mills named the power elite and include...
The GNU Debugger allows you to see what is going on "inside" a program while it executes - or what a program was doing at the moment it crashed. GDB supports C, C++, Java, Fortran and Assembly among other languages; it is also designed to work closely with the GNU Compiler Collection (GCC). The GNU Debugger Program has four special featur...
This book constitutes the refereed proceedings of the 7th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2001. The 36 revised full papers presented together with an invited contribution were carefully reviewed and selected from a total of 125 submissions. The papers are organized in sections on ...
The LNCS 11427 and 11428 proceedings set constitutes the proceedings of the 25th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019.
The tot...
This free book, or really a "coursebook" for a college freshman-level class, has been updated for Spring 2014 and provides an introduction to programming and problem solving using both Matlab and Mathcad. We provide a balanced selection of introductory exercises and real-world problems (i.e. no "contrived" problems). We include ...
This book summarises a number of core ideas relevant to Computational Engineering and Scientific Computing using Python. The emphasis is on introducing some basic Python (programming) concepts that are relevant for numerical algorithms. The later chapters touch upon numerical libraries such as numpy and scipy each of which deserves much more space ...
Types are the central organizing principle of the theory of programming languages. Language features are manifestations of type structure. The syntax of a language is governed by the constructs that define its types, and its semantics is determined by the interactions among those constructs. The soundness of a language design - the absence of ill-d...
Covering the design and implementation of assemblers and loaders, this comprehensive book opens with an introduction to one-pass and two-pass assemblers. Important concepts such as absolute and relocatable object files are discussed, as are assembler features such as local labels and multiple location counters. The format, meaning and implementatio...
How do social networking services earn money?What is the "second hand of the market" and how does it operate? Why does society need so many different kinds of goods? What does happiness economics not reveal about happiness?What is the link between talent, success and "stardom"? What is the business development model for the ent...
This volume discusses semiotics in mathematics education as an activity with a formal sign system, in which each sign represents something else. Theories presented by Saussure, Peirce, Vygotsky and other writers on semiotics are summarized in their relevance to the teaching and learning of mathematics. The significance of signs for mathematics educ...
This book explores specific migration, governance, and identity processes currently involving children and ideas of childhood. Migrancy as a social space allows majority populations to question the capabilities of migrants, and is a space in which an increasing number of children are growing up. In this space, families, nation-states, civil society...
This survey addresses the use of technology in upper secondary mathematics education from four points of view: theoretical analysis of epistemological and cognitive aspects of activity in new technology mediated learning environments, the changes brought by technology in the interactions between environment, students and teachers, the interrelation...
The book set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organ...
This book presents a consistent development of the Kohn-Nirenberg type global quantization theory in the setting of graded nilpotent Lie groups in terms of their representations. It contains a detailed exposition of related background topics on homogeneous Lie groups, nilpotent Lie groups, and the analysis of Rockland operators on graded Lie groups...
Symbolising the motivations of our actions and efforts, it reflects something much more aspirational and contributes to our global society. This book offers novel solutions to ensure employees support a wider organizational meaning whilst guaranteeing that the company benefits from the employee's individual sense of purpose. Advocating a shift...
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions. Written in a readily understandable style, the boo...
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this wa...
This book uses Pierre Bourdieu's field theory as a lens through which to examine military operations. Novel in its approach, this innovative text provides a better, more nuanced understanding of the modern 'battlespace', particularly in instances of prolonged low-intensity conflict. Formed in two parts, this book primarily explores t...
This book is the culmination of many years of research on what happened to the bodies of executed criminals in the past. Focusing on the eighteenth and nineteenth centuries, it looks at the consequences of the 1752 Murder Act. These criminal bodies had a crucial role in the history of medicine, and the history of crime, and great symbolic resonance...
This book presents computer programming as a key method for solving mathematical problems. This second edition of the well-received book has been extensively revised: All code is now written in Python version 3.6 (no longer version 2.7). In addition, the two first chapters of the previous edition have been extended and split up into five new chapte...
This book looks at the dramatic history of ovariotomy, an operation to remove ovarian tumours first practiced in the early nineteenth century. Bold and daring, surgeons who performed it claimed to be initiating a new era of surgery by opening the abdomen. Ovariotomy soon occupied a complex position within medicine and society, as an operation which...
At the core of institutional theories, 'values' is a central term and figures in most definitions; however it remains understudied and under-explored. The editors of this open access book identify a resurgence of interest in the values-construct which underpins discussions of identity, 'ethos' and the purpose/nature of public an...
There could be no more opportune time than the start of the third millennium AD to produce an entirely new atlas of world history. Not only does this symbolic (if arbitrary) moment provoke a mood of public retrospection, but the pace of global change itself demands a greater awareness of "whole world" history.
More than 20 years have p...
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap.
This book is for complete beginners who do not know anything about en...
The mission of the first edition of this book was to introduce the anykernel and rump kernels and motivate their existence. Additionally, we explored the characteristics of the technology through various experiments. The paramount, often criminally overlooked experiment was the one hiding in plain sight: is it possible to construct the system in a ...
How to Read a Folktale offers the first English translation of Ibonia, a spellbinding tale of old Madagascar. Ibonia is a folktale on epic scale. Much of its plot sounds familiar: a powerful royal hero attempts to rescue his betrothed from an evil adversary and, after a series of tests and duels, he and his lover are joyfully united with a marriage...
Business Mathematics was written to meet the needs of a twenty-first century student. It takes a systematic approach to helping students learn how to think and centers on a structured process termed the PUPP Model (Plan, Understand, Perform, and Present). This process is found throughout the text and in every guided example to help students develop...
Read the tips and tricks that top developers from the .NET and SQL Server communities use to boost code and query performance in their applications.
50 tips from the .NET and SQL Server communities for boosting performance in your .NET application; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers pe...
This book was written to serve as an introduction to logic, with in each chapter – if applicable – special emphasis on the interplay between logic and philosophy, mathematics, language and (theoretical) computer science. The reader will not only be provided with an introduction to classical logic, but to philosophical (modal, epistemic, deontic...
This book presents direct and concise explanations and examples to many LaTeX syntax and structures, allowing students and researchers to quickly understand the basics that are required for writing and preparing book manuscripts, journal articles, reports, presentation slides and academic theses and dissertations for publication.
Unlike much of th...
This textbook is a step-by-step tutorial on the applications of Geographic Information Systems (GIS) in environmental and water resource issues. It provides information about GIS and its applications, specifically using the most advanced ESRI GIS technology and its extensions. Eighteen chapters cover GIS applications in the field of earth sciences ...
Introductory Business Statistics is designed to meet the scope and sequence requirements of the one-semester statistics course for business, economics, and related majors. Core statistical concepts and skills have been augmented with practical business examples, scenarios, and exercises. The result is a meaningful understanding of the discipline, w...