0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (10)
  • R250 - R500 (37)
  • R500+ (3,138)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Parallel Computers 2 - Architecture, Programming and Algorithms (Hardcover, Revised): R.W. Hockney, C.R. Jesshope Parallel Computers 2 - Architecture, Programming and Algorithms (Hardcover, Revised)
R.W. Hockney, C.R. Jesshope
R4,321 Discovery Miles 43 210 Ships in 12 - 17 working days

Since the publication of the first edition, parallel computing technology has gained considerable momentum. A large proportion of this has come from the improvement in VLSI techniques, offering one to two orders of magnitude more devices than previously possible. A second contributing factor in the fast development of the subject is commercialization. The supercomputer is no longer restricted to a few well-established research institutions and large companies. A new computer breed combining the architectural advantages of the supercomputer with the advance of VLSI technology is now available at very attractive prices. A pioneering device in this development is the transputer, a VLSI processor specifically designed to operate in large concurrent systems.
Parallel Computers 2: Architecture, Programming and Algorithms reflects the shift in emphasis of parallel computing and tracks the development of supercomputers in the years since the first edition was published. It looks at large-scale parallelism as found in transputer ensembles. This extensively rewritten second edition includes major new sections on the transputer and the OCCAM language. The book contains specific information on the various types of machines available, details of computer architecture and technologies, and descriptions of programming languages and algorithms. Aimed at an advanced undergraduate and postgraduate level, this handbook is also useful for research workers, machine designers, and programmers concerned with parallel computers. In addition, it will serve as a guide for potential parallel computer users, especially in disciplines where large amounts of computer time are regularly used.

Getting Started with NSX-T: Logical Routing and Switching - The Basic Principles of Building Software-Defined Network... Getting Started with NSX-T: Logical Routing and Switching - The Basic Principles of Building Software-Defined Network Architectures with VMware NSX-T (Paperback, 1st ed.)
Iwan Hoogendoorn
R1,389 R1,153 Discovery Miles 11 530 Save R236 (17%) Ships in 10 - 15 working days

This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software. The book is the first in a series that will teach you the basics of NSX-T, which is an update of VMware's original software-defined networking (SDN) architecture aimed at making networks agile and flexible. You will become familiar with VMware's software-defined data center (SDDC) ecosystem and how NSX-T fits in. You will understand NSX-T components such as NSX-T Manager, NSX-T Edge Transport Nodes, and NSX-T Host Transport Nodes. And you will learn how to install and configure network services such as East/West and North/South routing capabilities, layer two switching, VRF, EVPN, multicast, and layer two bridging. The book provides best practices on how to configure routing and switching features, and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure. The book explains security, advanced network features, and multi-site capabilities and demonstrates how network and security services can be offered across multiple on-premise locations with a single pane of glass for networking and security policy management. The interface with public cloud services is discussed and the book explains NSX-T operation in an on-premise private cloud and positioning and integrating NSX-T on a public cloud (off premises). What You Will Learn Understand how NSX-T fits in the VMware SDDC ecosystem Know what NSX-T is, its components, and the terminology used Install NSX-T Configure NSX-T network services Manage the NSX-T network Who This Book Is For Virtualization administrators, system integrators, and network administrators

System-Scenario-based Design Principles and Applications (Paperback, 1st ed. 2020): Francky Catthoor, Twan Basten, Nikolaos... System-Scenario-based Design Principles and Applications (Paperback, 1st ed. 2020)
Francky Catthoor, Twan Basten, Nikolaos Zompakis, Marc Geilen, Per Gunnar Kjeldsberg
R4,573 Discovery Miles 45 730 Ships in 10 - 15 working days

This book introduces a generic and systematic design-time/run-time methodology for handling the dynamic nature of modern embedded systems, without adding large safety margins in the design. The techniques introduced can be utilized on top of most existing static mapping methodologies to deal effectively with dynamism and to increase drastically their efficiency. This methodology is based on the concept of system scenarios, which group system behaviors that are similar from a multi-dimensional cost perspective, such as resource requirements, delay, and energy consumption. Readers will be enabled to design systems capable to adapt to current inputs, improving system quality and/or reducing cost, possibly learning on-the-fly during execution. Provides an effective solution to deal with dynamic system design Includes a broad survey of the state-of-the-art approaches in this domain Enables readers to design for substantial cost improvements (e.g. energy reductions), by exploiting system scenarios Demonstrates how the methodology has been applied effectively on various, real design problems in the embedded system context

The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover): Parikshit N. Mahalle, Gitanjali Rahul Shinde,... The Convergence of Internet of Things and Cloud for Smart Computing (Hardcover)
Parikshit N. Mahalle, Gitanjali Rahul Shinde, Nancy Ambritta P., Arvind Vinayak Deshpande
R1,691 Discovery Miles 16 910 Ships in 12 - 17 working days

Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application

Advanced Boolean Techniques - Selected Papers from the 13th International Workshop on Boolean Problems (Paperback, 1st ed.... Advanced Boolean Techniques - Selected Papers from the 13th International Workshop on Boolean Problems (Paperback, 1st ed. 2020)
Rolf Drechsler, Mathias Soeken
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems. Provides a single-source reference to the state-of-the-art research in the field of logic synthesis and Boolean techniques; Includes a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems; Covers Boolean algebras, Boolean logic, Boolean modeling, Combinatorial Search, Boolean and bitwise arithmetic, Software and tools for the solution of Boolean problems, Applications of Boolean logic and algebras, Applications to real-world problems, Boolean constraint solving, and Extensions of Boolean logic.

Circadian Rhythms for Future Resilient Electronic Systems - Accelerated Active Self-Healing for Integrated Circuits (Paperback,... Circadian Rhythms for Future Resilient Electronic Systems - Accelerated Active Self-Healing for Integrated Circuits (Paperback, 1st ed. 2020)
Xinfei Guo, Mircea R Stan
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

This book describes methods to address wearout/aging degradations in electronic chips and systems, caused by several physical mechanisms at the device level. The authors introduce a novel technique called accelerated active self-healing, which fixes wearout issues by enabling accelerated recovery. Coverage includes recovery theory, experimental results, implementations and applications, across multiple nodes ranging from planar, FD-SOI to FinFET, based on both foundry provided models and predictive models. Presents novel techniques, tested with experiments on real hardware; Discusses circuit and system level wearout recovery implementations, many of these designs are portable and friendly to the standard design flow; Provides circuit-architecture-system infrastructures that enable the accelerated self-healing for future resilient systems; Discusses wearout issues at both transistor and interconnect level, providing solutions that apply to both; Includes coverage of resilient aspects of emerging applications such as IoT.

A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition): Bongsik Shin A Practical Introduction to Enterprise Network and Security Management (Paperback, 2nd edition)
Bongsik Shin
R1,613 Discovery Miles 16 130 Ships in 12 - 17 working days

A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.

Organizational Network Analysis - Auditing Intangible Resources (Paperback): Anna Ujwary-Gil Organizational Network Analysis - Auditing Intangible Resources (Paperback)
Anna Ujwary-Gil
R1,409 Discovery Miles 14 090 Ships in 12 - 17 working days

This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge.

Computer Architecture (Hardcover): Ken Spiner Computer Architecture (Hardcover)
Ken Spiner
R3,660 R3,303 Discovery Miles 33 030 Save R357 (10%) Ships in 10 - 15 working days
In-Memory Computing - Synthesis and Optimization (Paperback, 1st ed. 2020): Saeideh Shirinzadeh, Rolf Drechsler In-Memory Computing - Synthesis and Optimization (Paperback, 1st ed. 2020)
Saeideh Shirinzadeh, Rolf Drechsler
R3,020 Discovery Miles 30 200 Ships in 10 - 15 working days

This book describes a comprehensive approach for synthesis and optimization of logic-in-memory computing hardware and architectures using memristive devices, which creates a firm foundation for practical applications. Readers will get familiar with a new generation of computer architectures that potentially can perform faster, as the necessity for communication between the processor and memory is surpassed. The discussion includes various synthesis methodologies and optimization algorithms targeting implementation cost metrics including latency and area overhead as well as the reliability issue caused by short memory lifetime. Presents a comprehensive synthesis flow for the emerging field of logic-in-memory computing; Describes automated compilation of programmable logic-in-memory computer architectures; Includes several effective optimization algorithm also applicable to classical logic synthesis; Investigates unbalanced write traffic in logic-in-memory architectures and describes wear leveling approaches to alleviate it.

Microservices in SAP HANA XSA - A Guide to REST APIs Using Node.js (Paperback, 1st ed.): Sergio Guerrero Microservices in SAP HANA XSA - A Guide to REST APIs Using Node.js (Paperback, 1st ed.)
Sergio Guerrero
R1,244 R1,037 Discovery Miles 10 370 Save R207 (17%) Ships in 10 - 15 working days

Build enterprise-grade microservices in the SAP HANA Advanced Model (XSA). This book explains building scalable APIs in XSA and the benefits of building microservices with SAP HANA XSA. This book covers the cloud foundry (CF) architecture and how SAP HANA XSA follows the model. It begins with the details of the different architectural layers of applications hosted in XSA (specifically, microservices). Everything you need to know is presented, including analyzing requests, modularization, database ingestion, building JSON responses, and scaling your microservices. You will learn to use developmental tools such as the SAP WEB IDE, POSTMAN, and the SAP HANA Cockpit for XSA, including debugging examples on SAP HANA XSA with code snippets showing how microservices can be developed, debugged, scaled, and deployed on SAP HANA XSA. Microservices are divided into security and authentication, request handling, modularization of Node.js, and interaction with the SAP HANA database containers and response formatting. An end-to-end scenario is presented of a Node.js REST API that uses HTTP methods, concluding with deploying an SAP HANA XSA project to a production environment. This book is simple enough to help you implement a Node.js module in order to understand the development of microservices, and complex enough for architects to design their next business-ready solution integrating UAA security, application modularization, and an end-to-end REST API on SAP HANA XSA. What You Will Learn Know the definition and architecture of cloud foundry and its application on SAP HANA XSA Understand REST principles and different HTTP methods Explore microservices (Node.js) development Database interaction from Node (executing SQL statements and stored procedures) Who This Book Is For Architects designing business-ready solutions that integrate UAA security, application modularization, and an end-to-end REST API on SAP HANA XSA

Performance of Computer Communication Systems - A Model-Based Approach (Hardcover): B.R. Haverkort Performance of Computer Communication Systems - A Model-Based Approach (Hardcover)
B.R. Haverkort
R4,538 Discovery Miles 45 380 Ships in 12 - 17 working days

Performance of Computer Communication Systems A Model-Based Approach Boudewijn R. Haverkort Rheinisch-WestfAlische Technische Hochschule Aachen, Germany Computer communication systems and distributed systems are now able to provide an increasing range of services. As the timing requirements in the operation of these services are becoming crucial for the global community. performance assessment and selection of communication and distributed systems are, therefore, becoming more important. In this book, the author illustrates the techniques and methods used to evaluate the performance of computer communication systems, thereby covering all aspects of model-based performance evaluation. Unlike other books on this topic, there is no restriction to a particular performance evaluation technique. Notable features in this book include:
* coverage of all major techniques of performance evaluation
* non-mathematical problem solving approach, explaining and illustrating performance evaluation techniques
* assessment techniques for stochastic processes, single server queues, networks of queues and stochastic Petri nets
* numerous application studies, including token ring systems, client-server systems, and wide-area networks
* substantial number of practical exercises and examples.
For computer or electrical engineers who design and implement computer communication systems, this book provides an excellent overview of the methods and techniques used to construct and solve performance models. It is also a valuable source of information for postgraduate students in computer science and related subjects. Visit Our Web Page! http: //www.wiley.com/

Clean Architecture - A Craftsman's Guide to Software Structure and Design (Paperback): Robert Martin Clean Architecture - A Craftsman's Guide to Software Structure and Design (Paperback)
Robert Martin 1
R973 R847 Discovery Miles 8 470 Save R126 (13%) Ships in 12 - 17 working days

Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to bring greater professionalism and discipline to application architecture and design. As with his other books, Martin's Clean Architecture doesn't merely present multiple choices and options, and say "use your best judgment": it tells you what choices to make, and why those choices are critical to your success. Martin offers direct, no-nonsense answers to key architecture and design questions like: What are the best high level structures for different kinds of applications, including web, database, thick-client, console, and embedded apps? What are the core principles of software architecture? What is the role of the architect, and what is he/she really trying to achieve? What are the core principles of software design? How do designs and architectures go wrong, and what can you do about it? What are the disciplines and practices of professional architects and designers? Clean Architecture is essential reading for every software architect, systems analyst, system designer, and software manager -- and for any programmer who aspires to these roles or is impacted by their work.

High-speed Serial Buses in Embedded Systems (Paperback, 1st ed. 2020): Feng Zhang High-speed Serial Buses in Embedded Systems (Paperback, 1st ed. 2020)
Feng Zhang
R3,823 Discovery Miles 38 230 Ships in 10 - 15 working days

This book describes the most frequently used high-speed serial buses in embedded systems, especially those used by FPGAs. These buses employ SerDes, JESD204, SRIO, PCIE, Aurora and SATA protocols for chip-to-chip and board-to-board communication, and CPCIE, VPX, FC and Infiniband protocols for inter-chassis communication. For each type, the book provides the bus history and version info, while also assessing its advantages and limitations. Furthermore, it offers a detailed guide to implementing these buses in FPGA design, from the physical layer and link synchronization to the frame format and application command. Given its scope, the book offers a valuable resource for researchers, R&D engineers and graduate students in computer science or electronics who wish to learn the protocol principles, structures and applications of high-speed serial buses.

Security and Privacy in the Internet of Things (Hardcover): Syed Rameem Zahra, Mohammad Ahsan Chishti Security and Privacy in the Internet of Things (Hardcover)
Syed Rameem Zahra, Mohammad Ahsan Chishti
R3,611 Discovery Miles 36 110 Ships in 12 - 17 working days

This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. * Covers all aspects of security * Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions * Discusses ways for achieving better access control and trust in the IoT ecosystem * Contributes exhaustive strategic plans to deal with security issues of IoT * Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.

Robust Computing with Nano-scale Devices - Progresses and Challenges (Hardcover, 2010 ed.): Chao Huang Robust Computing with Nano-scale Devices - Progresses and Challenges (Hardcover, 2010 ed.)
Chao Huang
R3,131 Discovery Miles 31 310 Ships in 10 - 15 working days

Robust Nano-Computing focuses on various issues of robust nano-computing, defect-tolerance design for nano-technology at different design abstraction levels. It addresses both redundancy- and configuration-based methods as well as fault detecting techniques through the development of accurate computation models and tools. The contents present an insightful view of the ongoing researches on nano-electronic devices, circuits, architectures, and design methods, as well as provide promising directions for future research.

A Primer on Memory Consistency and Cache Coherence, Second Edition (Paperback): Vijay Nagarajan, Daniel J. Sorin, Mark D. Hill,... A Primer on Memory Consistency and Cache Coherence, Second Edition (Paperback)
Vijay Nagarajan, Daniel J. Sorin, Mark D. Hill, David A. Wood
R2,009 Discovery Miles 20 090 Ships in 10 - 15 working days

Many modern computer systems, including homogeneous and heterogeneous architectures, support shared memory in hardware. In a shared memory system, each of the processor cores may read and write to a single shared address space. For a shared memory machine, the memory consistency model defines the architecturally visible behavior of its memory system. Consistency definitions provide rules about loads and stores (or memory reads and writes) and how they act upon memory. As part of supporting a memory consistency model, many machines also provide cache coherence protocols that ensure that multiple cached copies of data are kept up-to-date. The goal of this primer is to provide readers with a basic understanding of consistency and coherence. This understanding includes both the issues that must be solved as well as a variety of solutions. We present both high-level concepts as well as specific, concrete examples from real-world systems. This second edition reflects a decade of advancements since the first edition and includes, among other more modest changes, two new chapters: one on consistency and coherence for non-CPU accelerators (with a focus on GPUs) and one that points to formal work and tools on consistency and coherence.

IoT Security Paradigms and Applications - Research and Practices (Hardcover): Sudhir Kumar Sharma, Bharat Bhushan, Narayan C... IoT Security Paradigms and Applications - Research and Practices (Hardcover)
Sudhir Kumar Sharma, Bharat Bhushan, Narayan C Debnath
R4,878 Discovery Miles 48 780 Ships in 12 - 17 working days

Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment

Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework (Paperback, 1st... Practical Security Properties on Commodity Computing Platforms - The uber eXtensible Micro-Hypervisor Framework (Paperback, 1st ed. 2019)
Amit Vasudevan
R1,597 Discovery Miles 15 970 Ships in 10 - 15 working days

This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation. uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called "uberapps"). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation. The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues. The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.

IoT - Security and Privacy Paradigm (Hardcover): Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le IoT - Security and Privacy Paradigm (Hardcover)
Souvik Pal, Vicente Garcia Diaz, Dac-Nhuong Le
R5,190 Discovery Miles 51 900 Ships in 12 - 17 working days

IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.

Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers (Paperback, 1st ed. 2019)
Tanja Lange, Orr Dunkelman
R2,157 Discovery Miles 21 570 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.

Internet of Things (IoT) - Technologies, Applications, Challenges and Solutions (Paperback): B. K. Tripathy, J Anuradha Internet of Things (IoT) - Technologies, Applications, Challenges and Solutions (Paperback)
B. K. Tripathy, J Anuradha
R1,909 Discovery Miles 19 090 Ships in 12 - 17 working days

The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points: * Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture. * Discusses recent security and privacy studies and social behavior of human beings over IoT. * Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges. * Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation. * Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security.

Biomimetic and Biohybrid Systems - 8th International Conference, Living Machines 2019, Nara, Japan, July 9-12, 2019,... Biomimetic and Biohybrid Systems - 8th International Conference, Living Machines 2019, Nara, Japan, July 9-12, 2019, Proceedings (Paperback, 1st ed. 2019)
Uriel Martinez-Hernandez, Vasiliki Vouloutsi, Anna Mura, Michael Mangan, Minoru Asada, …
R1,631 Discovery Miles 16 310 Ships in 10 - 15 working days

This book constitutes the proceedings of the 8th International Conference on Biomimetic and Biohybrid Systems, Living Machines 2019, held in Nara, Japan, in July 2019. The 26 full and 16 short papers presented in this volume were carefully reviewed and selected from 45 submissions. They deal with research on novel life-like technologies inspired by the scientific investigation of biological systems, biomimetics, and research that seeks to interface biological and artificial systems to create biohybrid systems.

Computational Science - ICCS 2019 - 19th International Conference, Faro, Portugal, June 12-14, 2019, Proceedings, Part III... Computational Science - ICCS 2019 - 19th International Conference, Faro, Portugal, June 12-14, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Joao M. F. Rodrigues, Pedro J.S. Cardoso, Janio Monteiro, Roberto Lam, Valeria V. Krzhizhanovskaya, …
R3,161 Discovery Miles 31 610 Ships in 10 - 15 working days

The five-volume set LNCS 11536, 11537, 11538, 11539 and 11540 constitutes the proceedings of the 19th International Conference on Computational Science, ICCS 2019, held in Faro, Portugal, in June 2019.The total of 65 full papers and 168 workshop papers presented in this book set were carefully reviewed and selected from 573 submissions (228 submissions to the main track and 345 submissions to the workshops). The papers were organized in topical sections named: Part I: ICCS Main Track Part II: ICCS Main Track; Track of Advances in High-Performance Computational Earth Sciences: Applications and Frameworks; Track of Agent-Based Simulations, Adaptive Algorithms and Solvers; Track of Applications of Matrix Methods in Artificial Intelligence and Machine Learning; Track of Architecture, Languages, Compilation and Hardware Support for Emerging and Heterogeneous Systems Part III: Track of Biomedical and Bioinformatics Challenges for Computer Science; Track of Classifier Learning from Difficult Data; Track of Computational Finance and Business Intelligence; Track of Computational Optimization, Modelling and Simulation; Track of Computational Science in IoT and Smart Systems Part IV: Track of Data-Driven Computational Sciences; Track of Machine Learning and Data Assimilation for Dynamical Systems; Track of Marine Computing in the Interconnected World for the Benefit of the Society; Track of Multiscale Modelling and Simulation; Track of Simulations of Flow and Transport: Modeling, Algorithms and Computation Part V: Track of Smart Systems: Computer Vision, Sensor Networks and Machine Learning; Track of Solving Problems with Uncertainties; Track of Teaching Computational Science; Poster Track ICCS 2019 Chapter "Comparing Domain-decomposition Methods for the Parallelization of Distributed Land Surface Models" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Computational Science - ICCS 2019 - 19th International Conference, Faro, Portugal, June 12-14, 2019, Proceedings, Part II... Computational Science - ICCS 2019 - 19th International Conference, Faro, Portugal, June 12-14, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Joao M. F. Rodrigues, Pedro J.S. Cardoso, Janio Monteiro, Roberto Lam, Valeria V. Krzhizhanovskaya, …
R2,886 Discovery Miles 28 860 Ships in 10 - 15 working days

The five-volume set LNCS 11536, 11537, 11538, 11539 and 11540 constitutes the proceedings of the 19th International Conference on Computational Science, ICCS 2019, held in Faro, Portugal, in June 2019.The total of 65 full papers and 168 workshop papers presented in this book set were carefully reviewed and selected from 573 submissions (228 submissions to the main track and 345 submissions to the workshops). The papers were organized in topical sections named: Part I: ICCS Main Track Part II: ICCS Main Track; Track of Advances in High-Performance Computational Earth Sciences: Applications and Frameworks; Track of Agent-Based Simulations, Adaptive Algorithms and Solvers; Track of Applications of Matrix Methods in Artificial Intelligence and Machine Learning; Track of Architecture, Languages, Compilation and Hardware Support for Emerging and Heterogeneous Systems Part III: Track of Biomedical and Bioinformatics Challenges for Computer Science; Track of Classifier Learning from Difficult Data; Track of Computational Finance and Business Intelligence; Track of Computational Optimization, Modelling and Simulation; Track of Computational Science in IoT and Smart Systems Part IV: Track of Data-Driven Computational Sciences; Track of Machine Learning and Data Assimilation for Dynamical Systems; Track of Marine Computing in the Interconnected World for the Benefit of the Society; Track of Multiscale Modelling and Simulation; Track of Simulations of Flow and Transport: Modeling, Algorithms and Computation Part V: Track of Smart Systems: Computer Vision, Sensor Networks and Machine Learning; Track of Solving Problems with Uncertainties; Track of Teaching Computational Science; Poster Track ICCS 2019 Chapter "Comparing Domain-decomposition Methods for the Parallelization of Distributed Land Surface Models" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crystallization as Studied by Broadband…
Tiberio A. Ezquerra, Aurora Nogales Hardcover R3,054 Discovery Miles 30 540
Advanced Techniques for Power, Energy…
Santiago Pagani, Jian-Jia Chen, … Hardcover R4,384 Discovery Miles 43 840
Traceability, Validation and Measurement…
Nineta Hrastelj, Ricardo Bettencourt Da Silva Hardcover R3,020 Discovery Miles 30 200
Turner Acrylic Gouache Paint - 20ml…
R168 Discovery Miles 1 680
Holbein Artists' Irodori Gouache Paint…
R196 Discovery Miles 1 960
Dala Gouache - Process Yellow (30ml)
R52 Discovery Miles 520
Turner Acrylic Gouache - Permanent Green…
R302 Discovery Miles 3 020
Arizona's Amphibians & Reptiles - A…
John C. Murphy Hardcover R1,890 Discovery Miles 18 900
Organic Gardening for Beginners - An…
Lisa Lombardo Paperback R519 R414 Discovery Miles 4 140
The Magical Ritual of the Sanctum Regnum…
W.Wynn Westcott Hardcover R870 Discovery Miles 8 700

 

Partners