![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
Since the publication of the first edition, parallel computing
technology has gained considerable momentum. A large proportion of
this has come from the improvement in VLSI techniques, offering one
to two orders of magnitude more devices than previously possible. A
second contributing factor in the fast development of the subject
is commercialization. The supercomputer is no longer restricted to
a few well-established research institutions and large companies. A
new computer breed combining the architectural advantages of the
supercomputer with the advance of VLSI technology is now available
at very attractive prices. A pioneering device in this development
is the transputer, a VLSI processor specifically designed to
operate in large concurrent systems.
This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software. The book is the first in a series that will teach you the basics of NSX-T, which is an update of VMware's original software-defined networking (SDN) architecture aimed at making networks agile and flexible. You will become familiar with VMware's software-defined data center (SDDC) ecosystem and how NSX-T fits in. You will understand NSX-T components such as NSX-T Manager, NSX-T Edge Transport Nodes, and NSX-T Host Transport Nodes. And you will learn how to install and configure network services such as East/West and North/South routing capabilities, layer two switching, VRF, EVPN, multicast, and layer two bridging. The book provides best practices on how to configure routing and switching features, and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure. The book explains security, advanced network features, and multi-site capabilities and demonstrates how network and security services can be offered across multiple on-premise locations with a single pane of glass for networking and security policy management. The interface with public cloud services is discussed and the book explains NSX-T operation in an on-premise private cloud and positioning and integrating NSX-T on a public cloud (off premises). What You Will Learn Understand how NSX-T fits in the VMware SDDC ecosystem Know what NSX-T is, its components, and the terminology used Install NSX-T Configure NSX-T network services Manage the NSX-T network Who This Book Is For Virtualization administrators, system integrators, and network administrators
This book introduces a generic and systematic design-time/run-time methodology for handling the dynamic nature of modern embedded systems, without adding large safety margins in the design. The techniques introduced can be utilized on top of most existing static mapping methodologies to deal effectively with dynamism and to increase drastically their efficiency. This methodology is based on the concept of system scenarios, which group system behaviors that are similar from a multi-dimensional cost perspective, such as resource requirements, delay, and energy consumption. Readers will be enabled to design systems capable to adapt to current inputs, improving system quality and/or reducing cost, possibly learning on-the-fly during execution. Provides an effective solution to deal with dynamic system design Includes a broad survey of the state-of-the-art approaches in this domain Enables readers to design for substantial cost improvements (e.g. energy reductions), by exploiting system scenarios Demonstrates how the methodology has been applied effectively on various, real design problems in the embedded system context
Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application
This book describes recent findings in the domain of Boolean logic and Boolean algebra, covering application domains in circuit and system design, but also basic research in mathematics and theoretical computer science. Content includes invited chapters and a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems. Provides a single-source reference to the state-of-the-art research in the field of logic synthesis and Boolean techniques; Includes a selection of the best papers presented at the 13th annual International Workshop on Boolean Problems; Covers Boolean algebras, Boolean logic, Boolean modeling, Combinatorial Search, Boolean and bitwise arithmetic, Software and tools for the solution of Boolean problems, Applications of Boolean logic and algebras, Applications to real-world problems, Boolean constraint solving, and Extensions of Boolean logic.
This book describes methods to address wearout/aging degradations in electronic chips and systems, caused by several physical mechanisms at the device level. The authors introduce a novel technique called accelerated active self-healing, which fixes wearout issues by enabling accelerated recovery. Coverage includes recovery theory, experimental results, implementations and applications, across multiple nodes ranging from planar, FD-SOI to FinFET, based on both foundry provided models and predictive models. Presents novel techniques, tested with experiments on real hardware; Discusses circuit and system level wearout recovery implementations, many of these designs are portable and friendly to the standard design flow; Provides circuit-architecture-system infrastructures that enable the accelerated self-healing for future resilient systems; Discusses wearout issues at both transistor and interconnect level, providing solutions that apply to both; Includes coverage of resilient aspects of emerging applications such as IoT.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner's perspective. Because of the critical importance of cybersecurity in today's enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.
This book makes a significant contribution to the development of management sciences, in terms of strategic management and more strictly resource approach to the company through structural definition of knowledge.
This book describes a comprehensive approach for synthesis and optimization of logic-in-memory computing hardware and architectures using memristive devices, which creates a firm foundation for practical applications. Readers will get familiar with a new generation of computer architectures that potentially can perform faster, as the necessity for communication between the processor and memory is surpassed. The discussion includes various synthesis methodologies and optimization algorithms targeting implementation cost metrics including latency and area overhead as well as the reliability issue caused by short memory lifetime. Presents a comprehensive synthesis flow for the emerging field of logic-in-memory computing; Describes automated compilation of programmable logic-in-memory computer architectures; Includes several effective optimization algorithm also applicable to classical logic synthesis; Investigates unbalanced write traffic in logic-in-memory architectures and describes wear leveling approaches to alleviate it.
Build enterprise-grade microservices in the SAP HANA Advanced Model (XSA). This book explains building scalable APIs in XSA and the benefits of building microservices with SAP HANA XSA. This book covers the cloud foundry (CF) architecture and how SAP HANA XSA follows the model. It begins with the details of the different architectural layers of applications hosted in XSA (specifically, microservices). Everything you need to know is presented, including analyzing requests, modularization, database ingestion, building JSON responses, and scaling your microservices. You will learn to use developmental tools such as the SAP WEB IDE, POSTMAN, and the SAP HANA Cockpit for XSA, including debugging examples on SAP HANA XSA with code snippets showing how microservices can be developed, debugged, scaled, and deployed on SAP HANA XSA. Microservices are divided into security and authentication, request handling, modularization of Node.js, and interaction with the SAP HANA database containers and response formatting. An end-to-end scenario is presented of a Node.js REST API that uses HTTP methods, concluding with deploying an SAP HANA XSA project to a production environment. This book is simple enough to help you implement a Node.js module in order to understand the development of microservices, and complex enough for architects to design their next business-ready solution integrating UAA security, application modularization, and an end-to-end REST API on SAP HANA XSA. What You Will Learn Know the definition and architecture of cloud foundry and its application on SAP HANA XSA Understand REST principles and different HTTP methods Explore microservices (Node.js) development Database interaction from Node (executing SQL statements and stored procedures) Who This Book Is For Architects designing business-ready solutions that integrate UAA security, application modularization, and an end-to-end REST API on SAP HANA XSA
Performance of Computer Communication Systems A Model-Based
Approach Boudewijn R. Haverkort Rheinisch-WestfAlische Technische
Hochschule Aachen, Germany Computer communication systems and
distributed systems are now able to provide an increasing range of
services. As the timing requirements in the operation of these
services are becoming crucial for the global community. performance
assessment and selection of communication and distributed systems
are, therefore, becoming more important. In this book, the author
illustrates the techniques and methods used to evaluate the
performance of computer communication systems, thereby covering all
aspects of model-based performance evaluation. Unlike other books
on this topic, there is no restriction to a particular performance
evaluation technique. Notable features in this book include:
Building upon the success of best-sellers The Clean Coder and Clean Code, legendary software craftsman Robert C. "Uncle Bob" Martin shows how to bring greater professionalism and discipline to application architecture and design. As with his other books, Martin's Clean Architecture doesn't merely present multiple choices and options, and say "use your best judgment": it tells you what choices to make, and why those choices are critical to your success. Martin offers direct, no-nonsense answers to key architecture and design questions like: What are the best high level structures for different kinds of applications, including web, database, thick-client, console, and embedded apps? What are the core principles of software architecture? What is the role of the architect, and what is he/she really trying to achieve? What are the core principles of software design? How do designs and architectures go wrong, and what can you do about it? What are the disciplines and practices of professional architects and designers? Clean Architecture is essential reading for every software architect, systems analyst, system designer, and software manager -- and for any programmer who aspires to these roles or is impacted by their work.
This book describes the most frequently used high-speed serial buses in embedded systems, especially those used by FPGAs. These buses employ SerDes, JESD204, SRIO, PCIE, Aurora and SATA protocols for chip-to-chip and board-to-board communication, and CPCIE, VPX, FC and Infiniband protocols for inter-chassis communication. For each type, the book provides the bus history and version info, while also assessing its advantages and limitations. Furthermore, it offers a detailed guide to implementing these buses in FPGA design, from the physical layer and link synchronization to the frame format and application command. Given its scope, the book offers a valuable resource for researchers, R&D engineers and graduate students in computer science or electronics who wish to learn the protocol principles, structures and applications of high-speed serial buses.
This book provides a comprehensive study of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for discussion by introducing the vulnerable intrinsic features of IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT related to security and privacy. * Covers all aspects of security * Algorithms, protocols and technologies used in IoT have been explained and the security flaws in them analyzed with solutions * Discusses ways for achieving better access control and trust in the IoT ecosystem * Contributes exhaustive strategic plans to deal with security issues of IoT * Gathers contributions from leading-edge researchers from academia and industry Graduates, researchers, people from the industry and security professionals who want to explore the IoT security field will find this book useful. The book will give an in-depth insight in to what has happened, what new is happening and what opportunities exist in the field.
Robust Nano-Computing focuses on various issues of robust nano-computing, defect-tolerance design for nano-technology at different design abstraction levels. It addresses both redundancy- and configuration-based methods as well as fault detecting techniques through the development of accurate computation models and tools. The contents present an insightful view of the ongoing researches on nano-electronic devices, circuits, architectures, and design methods, as well as provide promising directions for future research.
Many modern computer systems, including homogeneous and heterogeneous architectures, support shared memory in hardware. In a shared memory system, each of the processor cores may read and write to a single shared address space. For a shared memory machine, the memory consistency model defines the architecturally visible behavior of its memory system. Consistency definitions provide rules about loads and stores (or memory reads and writes) and how they act upon memory. As part of supporting a memory consistency model, many machines also provide cache coherence protocols that ensure that multiple cached copies of data are kept up-to-date. The goal of this primer is to provide readers with a basic understanding of consistency and coherence. This understanding includes both the issues that must be solved as well as a variety of solutions. We present both high-level concepts as well as specific, concrete examples from real-world systems. This second edition reflects a decade of advancements since the first edition and includes, among other more modest changes, two new chapters: one on consistency and coherence for non-CPU accelerators (with a focus on GPUs) and one that points to formal work and tools on consistency and coherence.
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well. Aimed at graduate students, researchers in computer science and engineering, communication networking, IoT, machine learning and pattern recognition, this book Showcases the basics of both IoT and various security paradigms supporting IoT, including Blockchain Explores various machine learning-based IoT security solutions and highlights the importance of IoT for industries and smart cities Presents various competitive technologies of Blockchain, especially concerned with IoT security Provides insights into the taxonomy of challenges, issues, and research directions in IoT-based applications Includes examples and illustrations to effectively demonstrate the principles, algorithm, applications, and practices of security in the IoT environment
This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation. uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called "uberapps"). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation. The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues. The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente Garcia-Diaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.
The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points: * Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture. * Discusses recent security and privacy studies and social behavior of human beings over IoT. * Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges. * Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation. * Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security.
This book constitutes the proceedings of the 8th International Conference on Biomimetic and Biohybrid Systems, Living Machines 2019, held in Nara, Japan, in July 2019. The 26 full and 16 short papers presented in this volume were carefully reviewed and selected from 45 submissions. They deal with research on novel life-like technologies inspired by the scientific investigation of biological systems, biomimetics, and research that seeks to interface biological and artificial systems to create biohybrid systems.
The five-volume set LNCS 11536, 11537, 11538, 11539 and 11540 constitutes the proceedings of the 19th International Conference on Computational Science, ICCS 2019, held in Faro, Portugal, in June 2019.The total of 65 full papers and 168 workshop papers presented in this book set were carefully reviewed and selected from 573 submissions (228 submissions to the main track and 345 submissions to the workshops). The papers were organized in topical sections named: Part I: ICCS Main Track Part II: ICCS Main Track; Track of Advances in High-Performance Computational Earth Sciences: Applications and Frameworks; Track of Agent-Based Simulations, Adaptive Algorithms and Solvers; Track of Applications of Matrix Methods in Artificial Intelligence and Machine Learning; Track of Architecture, Languages, Compilation and Hardware Support for Emerging and Heterogeneous Systems Part III: Track of Biomedical and Bioinformatics Challenges for Computer Science; Track of Classifier Learning from Difficult Data; Track of Computational Finance and Business Intelligence; Track of Computational Optimization, Modelling and Simulation; Track of Computational Science in IoT and Smart Systems Part IV: Track of Data-Driven Computational Sciences; Track of Machine Learning and Data Assimilation for Dynamical Systems; Track of Marine Computing in the Interconnected World for the Benefit of the Society; Track of Multiscale Modelling and Simulation; Track of Simulations of Flow and Transport: Modeling, Algorithms and Computation Part V: Track of Smart Systems: Computer Vision, Sensor Networks and Machine Learning; Track of Solving Problems with Uncertainties; Track of Teaching Computational Science; Poster Track ICCS 2019 Chapter "Comparing Domain-decomposition Methods for the Parallelization of Distributed Land Surface Models" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
The five-volume set LNCS 11536, 11537, 11538, 11539 and 11540 constitutes the proceedings of the 19th International Conference on Computational Science, ICCS 2019, held in Faro, Portugal, in June 2019.The total of 65 full papers and 168 workshop papers presented in this book set were carefully reviewed and selected from 573 submissions (228 submissions to the main track and 345 submissions to the workshops). The papers were organized in topical sections named: Part I: ICCS Main Track Part II: ICCS Main Track; Track of Advances in High-Performance Computational Earth Sciences: Applications and Frameworks; Track of Agent-Based Simulations, Adaptive Algorithms and Solvers; Track of Applications of Matrix Methods in Artificial Intelligence and Machine Learning; Track of Architecture, Languages, Compilation and Hardware Support for Emerging and Heterogeneous Systems Part III: Track of Biomedical and Bioinformatics Challenges for Computer Science; Track of Classifier Learning from Difficult Data; Track of Computational Finance and Business Intelligence; Track of Computational Optimization, Modelling and Simulation; Track of Computational Science in IoT and Smart Systems Part IV: Track of Data-Driven Computational Sciences; Track of Machine Learning and Data Assimilation for Dynamical Systems; Track of Marine Computing in the Interconnected World for the Benefit of the Society; Track of Multiscale Modelling and Simulation; Track of Simulations of Flow and Transport: Modeling, Algorithms and Computation Part V: Track of Smart Systems: Computer Vision, Sensor Networks and Machine Learning; Track of Solving Problems with Uncertainties; Track of Teaching Computational Science; Poster Track ICCS 2019 Chapter "Comparing Domain-decomposition Methods for the Parallelization of Distributed Land Surface Models" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. |
![]() ![]() You may like...
Crystallization as Studied by Broadband…
Tiberio A. Ezquerra, Aurora Nogales
Hardcover
R3,054
Discovery Miles 30 540
Advanced Techniques for Power, Energy…
Santiago Pagani, Jian-Jia Chen, …
Hardcover
R4,384
Discovery Miles 43 840
Traceability, Validation and Measurement…
Nineta Hrastelj, Ricardo Bettencourt Da Silva
Hardcover
R3,020
Discovery Miles 30 200
|