0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (37)
  • R500+ (3,077)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Parallel Processing in Computational Mechanics (Hardcover): Hojjat Adeli Parallel Processing in Computational Mechanics (Hardcover)
Hojjat Adeli
R5,348 Discovery Miles 53 480 Ships in 10 - 15 working days

Introduces mechanical engineers to high-performance computing using the new generation of computers with vector and parallel processing capabilities that allow the solution to problems beyond the ken of traditional computers. The chapters present an introduction and overview, explain several methodo

Handbook of Communications Systems Management - 1999 Edition (Hardcover): Gilbert Held Handbook of Communications Systems Management - 1999 Edition (Hardcover)
Gilbert Held
R9,974 Discovery Miles 99 740 Ships in 10 - 15 working days

As a manager of the 90s, you know that IT departments like your own must continue to meet increasingly sophisticated end-user needs despite highly limited resources. Learn when it s best to farm out work to consultants, when to reserve internal resources for other tasks, and how best to use your in-house staff. Coverage unlike any other in the marketplace. Written by 41 experts all practitioners in the networking and IS management fields this guidebook provides unique depth and scope. In this Third Edition, you ll find all new material that clearly outlines today s hottest issues. Prepares you to quickly respond to management requirements. Are you aware of the latest on strategic planning, systems planning, and points-of-failure planning? Have you linked your IT architecture and business plans? Have you updated senior management as to how IT can help achieve corporate goals? Do you have a corporate technology plan? Turn to the Handbook for all this and more. Now you can get up to speed on the latest in client/server, on how to give your end users faster and greater access to corporate data at a lower cost, and on how to quantify the amount of network support that this improvement will require? The Handbook was written with you in mind. The perfect resource for today s successful communications systems manager. This comprehensive, highly authoritative reference is designed to help you select, maintain, and manage your communications systems. It provides all the tools you need to evaluate, formulate, and implement effective communications network strategies to keep pace with today s rapidly changing technology. You get illustrations, tables, and diagrams to clearly outline and guide you the entire way. Be aware of the latest technologies and their impact on you. Keep costs down by aiding your thinking through all the systems and network elements from concept through implementation and day-to-day operation.

Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover): Gilbert Held Windows Networking Tools - The Complete Guide to Management, Troubleshooting, and Security (Hardcover)
Gilbert Held
R5,084 Discovery Miles 50 840 Ships in 10 - 15 working days

Windows Networking Tools: The Complete Guide to Management, Troubleshooting, and Security explains how to use built-in Windows networking tools and third-party networking products to diagnose network problems, address performance issues, and enhance the overall security of your system and network. It starts with a review of the major components of the TCP/IP protocol suite, as well as IP and MAC addressing, to provide a clear understanding of the various networking tools and how they are used in a LAN and a TCP/IP networking environment. Although the book focuses on built-in Windows networking tools, it also investigates a number of third-party products that can enhance the performance of your computer. It identifies tools to help you to understand the traffic flow and operational status of your network , illustrates the use of numerous tools, and shows you several methods to protect your computers from malicious software. It also examines one of the best programs for examining the flow of data on a network Wireshark and explains how to use this program to scan for open ports and discover vulnerability issues. In addition to helping you gain insight into existing problems, the text highlights built-in Windows networking tools that can help to determine if you can expect future bandwidth bottlenecks or other problems to occur under different growth scenarios. Placing the proven methods of an industry veteran at your fingertips, the book includes a chapter devoted to software programs that can enhance the security of your network. It explains how to negate the operation of unwanted advertisement trackers as well as how to minimize and alleviate the various types of hacking from keyboard loggers to network viruses. In the event your computational device is lost or stolen a cryptographic program is described that results in data becoming meaningless to the person or persons attempting to read your

Parallel Supercomputing in MIMD Architectures (Hardcover): R.Michael Hord Parallel Supercomputing in MIMD Architectures (Hardcover)
R.Michael Hord
R7,910 Discovery Miles 79 100 Ships in 10 - 15 working days

Parallel Supercomputing in MIMD Architectures is devoted to supercomputing on a wide variety of Multiple-Instruction-Multiple-Data (MIMD)-class parallel machines. This book describes architectural concepts, commercial and research hardware implementations, major programming concepts, algorithmic methods, representative applications, and benefits and drawbacks. Commercial machines described include Connection Machine 5, NCUBE, Butterfly, Meiko, Intel iPSC, iPSC/2 and iWarp, DSP3, Multimax, Sequent, and Teradata. Research machines covered include the J-Machine, PAX, Concert, and ASP. Operating systems, languages, translating sequential programs to parallel, and semiautomatic parallelizing are aspects of MIMD software addressed in Parallel Supercomputing in MIMD Architectures. MIMD issues such as scalability, partitioning, processor utilization, and heterogenous networks are discussed as well.This book is packed with important information and richly illustrated with diagrams and tables, Parallel Supercomputing in MIMD Architectures is an essential reference for computer professionals, program managers, applications system designers, scientists, engineers, and students in the computer sciences.

Simulation of Local Area Networks (Hardcover): Matthew N.O Sadiku Simulation of Local Area Networks (Hardcover)
Matthew N.O Sadiku
R5,765 Discovery Miles 57 650 Ships in 10 - 15 working days

A fast-growing area in the communications industry is the internetworking of an ever-increasing proliferation of computers, particularly via local area networks (LANs). The LAN is a resource-sharing data communications network being used by many offices to interchange information such as electronic mail, word processing, and files among computers and other devices. This unique book shows the user how to establish the performance characteristics of a LAN before putting it to use in a particular type of situation. Simulation of Local Area Networks consists of eight chapters, each with its own extensive list of references. The first chapter provides a brief review of local area networks, and the second chapter gives the analytical models of popular LANs-token-passing bus and ring networks, CSMA/CD LANs, and star networks. Chapter 3 covers general principles of simulation, and Chapter 4 discusses fundamental concepts in probability and statistics relating to simulation modeling. Materials in Chapters 3 and 4 are specifically applied in developing simulation models on token-passing LANs, CSMA/CD LANs, and star LANs in Chapters 5 through 7. The computer code in Chapters 5, 6, and 7 is divided into segments, and a detailed explanation of each segment is provided. The last chapter reviews special-purpose languages such as GPSS, SIMSCRIPT, GASP, SIMULA, SLAM, and RESQ. Helpful criteria for language selection are included. The entire code is put together in the appendixes. This book has two major advantages over existing texts. First, it uses C, a well-developed general-purpose language that is familiar to most analysts. Second, the text specifically applies the simulation principles to local area networks. No other book available shows the systems analyst how to evaluate the performance of existing or proposed systems under different kinds of conditions.

Cooperative Cognitive Radio Networks - The Complete Spectrum Cycle (Paperback): Mohamed Ibnkahla Cooperative Cognitive Radio Networks - The Complete Spectrum Cycle (Paperback)
Mohamed Ibnkahla
R2,865 Discovery Miles 28 650 Ships in 10 - 15 working days

Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle provides a solid understanding of the foundations of cognitive radio technology, from spectrum sensing, access, and handoff to routing, trading, and security. Written in a tutorial style with several illustrative examples, this comprehensive book: Gives an overview of cognitive radio systems and explains the different components of the spectrum cycle Features step-by-step analyses of the different algorithms and systems, supported by extensive computer simulations, figures, tables, and references Fulfills the need for a single source of information on all aspects of the spectrum cycle, including the physical, link, medium access, network, and application layers Offering a unifying view of the various approaches and methodologies, Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle presents the state of the art of cognitive radio technology, addressing all phases of the spectrum access cycle.

Telecommunications Cost Management (Hardcover): Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr. Telecommunications Cost Management (Hardcover)
Brian Dimarsico, Thomas Phelps IV, William A. Yarberry Jr.
R5,078 Discovery Miles 50 780 Ships in 10 - 15 working days

Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to networking managers and administrators, is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide, The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to advanced topics in subnetting, network address translation, and configuring workstations, servers and routers. The book contains network tools that prepare you for testing and troubleshooting and highlights the need for techniques that conserve the use of IP addressing as well as the creation of a next generation IP addressing structure. While structured on a chapter by chapter basis, wherever possible each chapter was written to be independent, making the book convenient and easy to use in a hectic work environment. While you may find it possible to design a network or configure a workstation to operate without a detailed knowledge of IP addressing, the end results are not very efficient. And in the quickly changing global business environment, inefficiency wastes your time and money, both valuable resources for gaining and maintaining the competitive edge. With The ABCs of IP Addressing you get the comprehensive coverage of applications and protocols that help you do your job faster and more effectively.

Introduction to Scientific and Technical Computing (Hardcover): Frank T. Willmore, Eric Jankowski, Coray Colina Introduction to Scientific and Technical Computing (Hardcover)
Frank T. Willmore, Eric Jankowski, Coray Colina
R5,637 Discovery Miles 56 370 Ships in 10 - 15 working days

Created to help scientists and engineers write computer code, this practical book addresses the important tools and techniques that are necessary for scientific computing, but which are not yet commonplace in science and engineering curricula. This book contains chapters summarizing the most important topics that computational researchers need to know about. It leverages the viewpoints of passionate experts involved with scientific computing courses around the globe and aims to be a starting point for new computational scientists and a reference for the experienced. Each contributed chapter focuses on a specific tool or skill, providing the content needed to provide a working knowledge of the topic in about one day. While many individual books on specific computing topics exist, none is explicitly focused on getting technical professionals and students up and running immediately across a variety of computational areas.

CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover): Boisy G Pitre, Bill Loguidice CoCo - The Colorful History of Tandy's Underdog Computer (Hardcover)
Boisy G Pitre, Bill Loguidice
R5,764 Discovery Miles 57 640 Ships in 10 - 15 working days

CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64. The book takes you inside the interesting stories and people behind this unique, underdog computer. Both noted computer science and technology advocates, authors Pitre and Loguidice reveal the story of a pivotal period in the home computing revolution from the perspective of Tandy's CoCo. As these computers were sold in Radio Shack stores throughout the United States and other countries, they provide a critical point of reference for key events in the unprecedented evolutionary period for the PC industry in the 1980s. The book also features first-hand accounts from the people who created and promoted the CoCo, from the original Tandy executives and engineers to today's active product creators and information keepers. The CoCo impacted many lives, and this book leaves no stone unturned in recounting this fascinating slice of the PC revolution that is still in play today. From early telecommunications experiments to engineering and budgetary challenges, it covers all the aspects that made the CoCo a truly personal, useful computing experience in as small and inexpensive a package as possible.

Broadband RF and Microwave Amplifiers (Paperback): Andrei Grebennikov, Narendra Kumar, Binboga S Yarman Broadband RF and Microwave Amplifiers (Paperback)
Andrei Grebennikov, Narendra Kumar, Binboga S Yarman
R2,639 Discovery Miles 26 390 Ships in 10 - 15 working days

Broadband RF and Microwave Amplifiers provides extensive coverage of broadband radio frequency (RF) and microwave power amplifier design, including well-known historical and recent novel schematic configurations, theoretical approaches, circuit simulation results, and practical implementation strategies. The text begins by introducing two-port networks to illustrate the behavior of linear and nonlinear circuits, explaining the basic principles of power amplifier design, and discussing impedance matching and broadband power amplifier design using lumped and distributed parameters. The book then: Shows how dissipative or lossy gain-compensation-matching circuits can offer an important trade-off between power gain, reflection coefficient, and operating frequency bandwidth Describes the design of broadband RF and microwave amplifiers using real frequency techniques (RFTs), supplying numerous examples based on the MATLAB (R) programming process Examines Class-E power amplifiers, Doherty amplifiers, low-noise amplifiers, microwave gallium arsenide field-effect transistor (GaAs FET)-distributed amplifiers, and complementary metal-oxide semiconductor (CMOS) amplifiers for ultra-wideband (UWB) applications Broadband RF and Microwave Amplifiers combines theoretical analysis with practical design to create a solid foundation for innovative ideas and circuit design techniques.

Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover): Jesse Varsalone,... Defense against the Black Arts - How Hackers Do What They Do and How to Protect against It (Hardcover)
Jesse Varsalone, Matthew McFadden
R5,793 Discovery Miles 57 930 Ships in 10 - 15 working days

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, this book shows you how to outwit computer predators at their own game. Among the many things you'll learn: How to get into a Windows operating system without having the username or password Vulnerabilities associated with passwords and how to keep them out of the hands of hackers How hackers use the techniques of computer forensic examiners to wreak havoc on individuals and companies Hiding one's IP address to avoid detection Manipulating data to and from a web page or application for nefarious reasons How to find virtually anything on the internet How hackers research the targets they plan to attack How network defenders collect traffic across the wire to indentify intrusions Using Metasploit to attack weaknesses in systems that are unpatched or have poorly implemented security measures The book profiles a variety of attack tools and examines how Facebook and other sites can be used to conduct social networking attacks. It also covers techniques utilized by hackers to attack modern operating systems, such as Windows 7, Windows Vista, and Mac OS X. The author explores a number of techniques that hackers can use to exploit physical access, network access, and wireless vectors. Using screenshots to clarify procedures, this practical manual uses step-by-step examples and relevant analogies to facilitate u

Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover): Preston Deguise Enterprise Systems Backup and Recovery - A Corporate Insurance Policy (Hardcover)
Preston Deguise
R5,076 Discovery Miles 50 760 Ships in 10 - 15 working days

The success of information backup systems does not rest on IT administrators alone. Rather, a well-designed backup system comes about only when several key factors coalesce business involvement, IT acceptance, best practice designs, enterprise software, and reliable hardware. Enterprise Systems Backup and Recovery: A Corporate Insurance Policy provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Instead of focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information to any organization, regardless of which operating systems or applications are deployed, what backup system is in place, or what planning has been done for business continuity. It explains how backup must be included in every phase of system planning, development, operation, and maintenance. It also provides techniques for analyzing and improving current backup system performance. After reviewing the concepts in this book, organizations will be able to answer these questions with respect to their enterprise: What features and functionality should be expected in a backup environment? What terminology and concepts are unique to backup software, and what can be related to other areas? How can a backup system be monitored successfully? How can the performance of a backup system be improved? What features are just "window dressing" and should be ignored, as opposed to those features that are relevant? Backup and recovery systems touch on just about every system in an organization. Properly implemented, they can provide an enterprise with greater assurance that its information is safe. By utilizing the

Design of Low Power Integrated Radios for Emerging Standards (Hardcover, 1st ed. 2020): Mustafijur Rahman, Ramesh Harjani Design of Low Power Integrated Radios for Emerging Standards (Hardcover, 1st ed. 2020)
Mustafijur Rahman, Ramesh Harjani
R3,106 Discovery Miles 31 060 Ships in 18 - 22 working days

This book describes novel and disruptive architecture and circuit design techniques, toward the realization of low-power, standard-compliant radio architectures and silicon implementation of the circuits required for a variety of leading-edge applications. Readers will gain an understanding of the circuit level challenges that exist for low power radios, compatible with the IEEE 802.15.6 standard. The authors discuss current techniques to address some of these challenges, helping readers to understand the state-of-the-art, and to address the various, open research problems that exist with respect to realizing low power radios. Enables readers to face challenging bottleneck in low power radio design, with state-of-the-art, circuit-level design techniques; Provides readers with basic knowledge of circuits suitable for low power radio circuits compatible with the IEEE 802.15.6 standard; Discusses new and emerging architectures and circuit techniques, enabling applications such as body area networks and internet of things.

Parallel Computing - Methods, Algorithms and Applications (Hardcover): D.J. Evans, C.N. Sutti Parallel Computing - Methods, Algorithms and Applications (Hardcover)
D.J. Evans, C.N. Sutti
R2,729 Discovery Miles 27 290 Ships in 10 - 15 working days

Parallel Computing: Methods, Algorithms and Applications presents a collection of original papers presented at the international meeting on parallel processing, methods, algorithms, and applications at Verona, Italy in September 1989.

VLSI Risc Architecture and Organization (Hardcover): S. B. Furber VLSI Risc Architecture and Organization (Hardcover)
S. B. Furber
R7,906 Discovery Miles 79 060 Ships in 10 - 15 working days

With the expectation that architectural improvements will play a significant role inadvancing processor performance, it is critical for readers to maintain an up-to-date,unified overview of technological advances in this vital research area.Gathering into one place material that had been scattered throughout the literaturemakingit difficult to obtain detailed information on computer designs-this importantbook describes the main architectural and organizational features of modem mini- andmicrocomputers. In addition, it explains the RISC philosophy by supplying historicalbackground information and excellent examples of several commercially available RISCmicroprocessors.Limiting attention to VLSI implementations of RISC processors, VLSI RISCArchitecture and Organization offers insight into design issues that arose indeveloping a RISC system, using the VLSI RISC chip set developed at AcornComputers Limited as an example ... discusses options considered during the designprocess, the basis for the decisions made, and implementation details . . . describescontemporary RISC architecture, comparing and contrasting different designs ... andlooks at future trends in RISC research.Discussing the topic cohesively and comprehensively-from initial study into reducedinstructions sets to the widespread introduction of RISC architectures into mainstreamcomputer products-VLSI RISC Architecture and Organization is aninvaluable reference for electrical, electronics, and computer engineers; computerarchitects and scientists; hardware systems designers; and upper-level undergraduate andgraduate students in computer science and electrical engineering courses.

Information Technology and Organizations - Strategies, Networks, and Integration (Hardcover, New): Brian P. Bloomfield, Rod... Information Technology and Organizations - Strategies, Networks, and Integration (Hardcover, New)
Brian P. Bloomfield, Rod Coombs, David Knights, Dale Littler
R4,741 Discovery Miles 47 410 Ships in 10 - 15 working days

This book is concerned with the ways in which organizations design, build and use information technology systems. In particular it looks at the interaction between these IT-centred activities and the broader management processes within organizations. The authors adopt a critical social science perspective on these issues, and are primarily concerned with advancing theoretical debates on how best to understand the related processes of technological and organizational change. To this end, the book examines and deploys recent work on power/knowledge, actor-network theory and critical organization theory. The result is an account of the nature and significance of information systems in organizations which is an alternative perspective to pragmatic and recipe-based approaches to this topic which dominate much contemporary management literature on IT. This book is intended for academic: Management and social science academics and postgraduate students of IT strategy and organization. Practitioner: Senior managers concerned with IT and strategy issues.

Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020): Felipe Rocha... Soft Error Reliability Using Virtual Platforms - Early Evaluation of Multicore Systems (Hardcover, 1st ed. 2020)
Felipe Rocha da Rosa, Luciano Ost, Ricardo Reis
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book describes the benefits and drawbacks inherent in the use of virtual platforms (VPs) to perform fast and early soft error assessment of multicore systems. The authors show that VPs provide engineers with appropriate means to investigate new and more efficient fault injection and mitigation techniques. Coverage also includes the use of machine learning techniques (e.g., linear regression) to speed-up the soft error evaluation process by pinpointing parameters (e.g., architectural) with the most substantial impact on the software stack dependability. This book provides valuable information and insight through more than 3 million individual scenarios and 2 million simulation-hours. Further, this book explores machine learning techniques usage to navigate large fault injection datasets.

Energy-Efficient Smart Temperature Sensors in CMOS Technology (Hardcover, 1st ed. 2018): Kamran Souri, Kofi Makinwa Energy-Efficient Smart Temperature Sensors in CMOS Technology (Hardcover, 1st ed. 2018)
Kamran Souri, Kofi Makinwa
R3,851 Discovery Miles 38 510 Ships in 18 - 22 working days

This book describes the design and implementation of energy-efficient smart (digital output) temperature sensors in CMOS technology. To accomplish this, a new readout topology, namely the zoom-ADC, is presented. It combines a coarse SAR-ADC with a fine Sigma-Delta (SD) ADC. The digital result obtained from the coarse ADC is used to set the reference levels of the SD-ADC, thereby zooming its full-scale range into a small region around the input signal. This technique considerably reduces the SD-ADC's full-scale range, and notably relaxes the number of clock cycles needed for a given resolution, as well as the DC-gain and swing of the loop-filter. Both conversion time and power-efficiency can be improved, which results in a substantial improvement in energy-efficiency. Two BJT-based sensor prototypes based on 1st-order and 2nd-order zoom-ADCs are presented. They both achieve inaccuracies of less than +/-0.2 DegreesC over the military temperature range (-55 DegreesC to 125 DegreesC). A prototype capable of sensing temperatures up to 200 DegreesC is also presented. As an alternative to BJTs, sensors based on dynamic threshold MOSTs (DTMOSTs) are also presented. It is shown that DTMOSTs are capable of achieving low inaccuracy (+/-0.4 DegreesC over the military temperature range) as well as sub-1V operation, making them well suited for use in modern CMOS processes.

Reconfigurable and Adaptive Computing - Theory and Applications (Hardcover): Nadia Nedjah, Chao Wang Reconfigurable and Adaptive Computing - Theory and Applications (Hardcover)
Nadia Nedjah, Chao Wang
R6,044 Discovery Miles 60 440 Ships in 10 - 15 working days

Reconfigurable computing techniques and adaptive systems are some of the most promising architectures for microprocessors. Reconfigurable and Adaptive Computing: Theory and Applications explores the latest research activities on hardware architecture for reconfigurable and adaptive computing systems. The first section of the book covers reconfigurable systems. The book presents a software and hardware codesign flow for coarse-grained systems-on-chip, a video watermarking algorithm for the H.264 standard, a solution for regular expressions matching systems, and a novel field programmable gate array (FPGA)-based acceleration solution with MapReduce framework on multiple hardware accelerators. The second section discusses network-on-chip, including an implementation of a multiprocessor system-on-chip platform with shared memory access, end-to-end quality-of-service metrics modeling based on a multi-application environment in network-on-chip, and a 3D ant colony routing (3D-ACR) for network-on-chip with three different 3D topologies. The final section addresses the methodology of system codesign. The book introduces a new software-hardware codesign flow for embedded systems that models both processors and intellectual property cores as services. It also proposes an efficient algorithm for dependent task software-hardware codesign with the greedy partitioning and insert scheduling method (GPISM) by task graph.

Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations (Hardcover, 1st ed. 2018):... Embedded Flash Memory for Embedded Systems: Technology, Design for Sub-systems, and Innovations (Hardcover, 1st ed. 2018)
Hideto Hidaka
R3,999 Discovery Miles 39 990 Ships in 10 - 15 working days

This book provides a comprehensive introduction to embedded flash memory, describing the history, current status, and future projections for technology, circuits, and systems applications. The authors describe current main-stream embedded flash technologies from floating-gate 1Tr, floating-gate with split-gate (1.5Tr), and 1Tr/1.5Tr SONOS flash technologies and their successful creation of various applications. Comparisons of these embedded flash technologies and future projections are also provided. The authors demonstrate a variety of embedded applications for auto-motive, smart-IC cards, and low-power, representing the leading-edge technology developments for eFlash. The discussion also includes insights into future prospects of application-driven non-volatile memory technology in the era of smart advanced automotive system, such as ADAS (Advanced Driver Assistance System) and IoE (Internet of Everything). Trials on technology convergence and future prospects of embedded non-volatile memory in the new memory hierarchy are also described. Introduces the history of embedded flash memory technology for micro-controller products and how embedded flash innovations developed; Includes comprehensive and detailed descriptions of current main-stream embedded flash memory technologies, sub-system designs and applications; Explains why embedded flash memory requirements are different from those of stand-alone flash memory and how to achieve specific goals with technology development and circuit designs; Describes a mature and stable floating-gate 1Tr cell technology imported from stand-alone flash memory products - that then introduces embedded-specific split-gate memory cell technologies based on floating-gate storage structure and charge-trapping SONOS technology and their eFlash sub-system designs; Describes automotive and smart-IC card applications requirements and achievements in advanced eFlash beyond 4 0nm node.

The Calculus of Computation - Decision Procedures with Applications to Verification (Hardcover, 2007 ed.): Aaron R. Bradley,... The Calculus of Computation - Decision Procedures with Applications to Verification (Hardcover, 2007 ed.)
Aaron R. Bradley, Zohar Manna
R2,072 Discovery Miles 20 720 Ships in 10 - 15 working days

Written with graduate and advanced undergraduate students in mind, this textbook introduces computational logic from the foundations of first-order logic to state-of-the-art decision procedures for arithmetic, data structures, and combination theories. The textbook also presents a logical approach to engineering correct software. Verification exercises are given to develop the reader's facility in specifying and verifying software using logic. The treatment of verification concludes with an introduction to the static analysis of software, an important component of modern verification systems. The final chapter outlines courses of further study.

Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE... Frontiers in Computer Education - Proceedings of the 2nd International Conference on Frontiers in Computer Education (ICFCE 2014), Wuhan, China, December 24-25, 2014 (Hardcover)
Yuanzhi Wang
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

This proceedings volume contains selected papers presented at the 2014 International Conference on Frontiers in Computer Education (ICFCE 2014), which was held December 24-25, 2014, in Wuhan, China. The objective of this conference was to provide a forum for different researchers in different fields, especially Computer Education as well as Information Technology, to exchange their various findings. The papers have been grouped under the following overarching themes: Computer Science, Computer Education, Education and Teaching Reform, and Communication and Intelligent Control.

Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover): Jeffrey S. Vetter Contemporary High Performance Computing - From Petascale toward Exascale, Volume Two (Hardcover)
Jeffrey S. Vetter
R3,364 Discovery Miles 33 640 Ships in 10 - 15 working days

HPC is used to solve a number of complex questions in computational and data-intensive sciences. These questions include the simulation and modeling of physical phenomena, such as climate change, energy production, drug design, global security, and materials design; the analysis of large data sets such as those in genome sequencing, astronomical observation, and cybersecurity; and the intricate design of engineered products, such as airplanes and automobiles. This second volume of Contemporary High Performance Computing: From Petascale toward Exascale continues to document international HPC ecosystems, including the sponsors and sites that host them. Each chapter is punctuated with a site's flagship system and: Presents highlights of applications, workloads, and benchmarks Describes hardware architectures, system software, and programming systems Explores storage, visualization, and analytics Examines the data center/facility as well as system statistics Featuring pictures of buildings and systems in production, floorplans, and many block diagrams and charts to illustrate system design and performance, Contemporary High Performance Computing: From Petascale toward Exascale, Volume Two delivers a detailed snapshot of the rich history of practice in modern HPC. This book provides a valuable reference for researchers in HPC and computational science.

Data Analysis with Python and PySpark (Paperback): Jonathan Rioux Data Analysis with Python and PySpark (Paperback)
Jonathan Rioux
R1,235 Discovery Miles 12 350 Ships in 10 - 15 working days

When it comes to data analytics, it pays tothink big. PySpark blends the powerful Spark big data processing engine withthe Python programming language to provide a data analysis platform that can scaleup for nearly any task. Data Analysis with Python and PySpark is yourguide to delivering successful Python-driven data projects. Data Analysis with Python and PySpark is a carefully engineered tutorial that helps you use PySpark to deliver your data-driven applications at any scale. This clear and hands-on guide shows you how to enlarge your processing capabilities across multiple machines with data from any source, ranging from Had oop-based clusters to Excel worksheets. You'll learn how to break down big analysis tasks into manageable chunks and how to choose and use the best PySpark data abstraction for your unique needs. The Spark data processing engine is an amazing analytics factory: raw data comes in,and insight comes out. Thanks to its ability to handle massive amounts of data distributed across a cluster, Spark has been adopted as standard by organizations both big and small. PySpark, which wraps the core Spark engine with a Python-based API, puts Spark-based data pipelines in the hands of programmers and data scientists working with the Python programming language. PySpark simplifies Spark's steep learning curve, and provides a seamless bridge between Spark and an ecosystem of Python-based data science tools.

Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback): Ilker OEzcelik, Richard Brooks Distributed Denial of Service Attacks - Real-world Detection and Mitigation (Paperback)
Ilker OEzcelik, Richard Brooks
R2,109 Discovery Miles 21 090 Ships in 10 - 15 working days

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Agile Software Architecture - Aligning…
Muhammad Ali Babar, Alan W. Brown, … Paperback R2,680 R2,187 Discovery Miles 21 870
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald Hardcover R5,315 Discovery Miles 53 150
Systems Engineering Neural Networks
A Migliaccio Hardcover R2,817 Discovery Miles 28 170
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,199 Discovery Miles 11 990
Thinking Machines - Machine Learning and…
Shigeyuki Takano Paperback R2,011 Discovery Miles 20 110
Advancements in Instrumentation and…
Srijan Bhattacharya Hardcover R6,138 Discovery Miles 61 380
Switched-Mode Power Supply Simulation…
Steven M. Sandler Hardcover R1,404 Discovery Miles 14 040
Heterogeneous Computing - Hardware and…
Mohamed Zahran Hardcover R1,517 Discovery Miles 15 170
CSS For Beginners - The Best CSS Guide…
Ethan Hall Hardcover R895 R773 Discovery Miles 7 730

 

Partners