Your cart is empty
This book focuses on a specialized branch of the vast domain of software engineering: component-based software engineering (CBSE). Component-Based Software Engineering: Methods and Metrics enhances the basic understanding of components by defining categories, characteristics, repository, interaction, complexity, and composition. It divides the research domain of CBSE into three major sub-domains: (1) reusability issues, (2) interaction and integration issues, and (3) testing and reliability issues. This book covers the state-of-the-art literature survey of at least 20 years in the domain of reusability, interaction and integration complexities, and testing and reliability issues of component-based software engineering. The aim of this book is not only to review and analyze the previous works conducted by eminent researchers, academicians, and organizations in the context of CBSE, but also suggests innovative, efficient, and better solutions. A rigorous and critical survey of traditional and advanced paradigms of software engineering is provided in the book. Features: In-interactions and Out-Interactions both are covered to assess the complexity. In the context of CBSE both white-box and black-box testing methods and their metrics are described. This work covers reliability estimation using reusability which is an innovative method. Case studies and real-life software examples are used to explore the problems and their solutions. Students, research scholars, software developers, and software designers or individuals interested in software engineering, especially in component-based software engineering, can refer to this book to understand the concepts from scratch. These measures and metrics can be used to estimate the software before the actual coding commences.
This book serves three basic purposes, as a 1) tutorial-type reference for complex systems engineering (CSE) concepts and associated terminology, 2) recommendation of a proposed methodology showing how the evolving practice of CSE can leads to a more unified theory, and 3) complex systems (CSs) initiative for organizations to invest some of their resources toward helping to make the world a better place. A wide variety of technical practitioners, e.g.,developers of new or improved systems, particularly systems engineers, program and projectmanagers, and associated staff/workers, funders and overseers, government executives, military officers, systems acquisition personnel,contract specialists,owners of large and small businesses,professional society members, and CS researchers,may be interested in further exploring these topics. Readers will learn more about CS characteristics and behaviors, and CSE principles, and will therefore be able to focus on techniques that will better serve them in their working/everyday environments in dealing with complexity. The fundamental observation is that many systems inherently involve a deeper complexity because stakeholders are engaged in the enterprise. This means that such CSs are more difficult to invent, create, or improve upon because no one can be in total control. since people cannot be completely controlled. Thereby, one needs to concentrate on trying to influence progress, then wait a suitable amount of time to see what happens, iterating as necessary. With just three chapters in this "focus" book, it seems to make sense to provide a tutorial introduction which readers can peruse only as necessary, considering their background and understanding, then a chapter laying out the suggested artefacts and methodology, followed by the chapter emphasizing worthwhile areas of application.
Examines the advantages of Embedded and FO-WLP technologies, potential application spaces, package structures available in the industry, process flows, and material challenges Embedded and fan-out wafer level packaging (FO-WLP) technologies have been developed across the industry over the past 15 years and have been in high volume manufacturing for nearly a decade. This book covers the advances that have been made in this new packaging technology and discusses the many benefits it provides to the electronic packaging industry and supply chain. It provides a compact overview of the major types of technologies offered in this field, on what is available, how it is processed, what is driving its development, and the pros and cons. Filled with contributions from some of the field's leading experts, Advances in Embedded and Fan-Out Wafer Level Packaging Technologies begins with a look at the history of the technology. It then goes on to examine the biggest technology and marketing trends. Other sections are dedicated to chip-first FO-WLP, chip-last FO-WLP, embedded die packaging, materials challenges, equipment challenges, and resulting technology fusions. Discusses specific company standards and their development results Content relates to practice as well as to contemporary and future challenges in electronics system integration and packaging Advances in Embedded and Fan-Out Wafer Level Packaging Technologies will appeal to microelectronic packaging engineers, managers, and decision makers working in OEMs, IDMs, IFMs, OSATs, silicon foundries, materials suppliers, equipment suppliers, and CAD tool suppliers. It is also an excellent book for professors and graduate students working in microelectronic packaging research.
A one-volume guide to the most essential techniques for designing and building dependable distributed systems Instead of covering a broad range of research works for each dependability strategy, this useful reference focuses on only a selected few (usually the most seminal works, the most practical approaches, or the first publication of each approach), explaining each in depth, usually with a comprehensive set of examples. Each technique is dissected thoroughly enough so that readers who are not familiar with dependable distributed computing can actually grasp the technique after studying the book. Building Dependable Distributed Systems consists of eight chapters. The first introduces the basic concepts and terminology of dependable distributed computing, and also provides an overview of the primary means of achieving dependability. Checkpointing and logging mechanisms, which are the most commonly used means of achieving limited degree of fault tolerance, are described in the second chapter. Works on recovery-oriented computing, focusing on the practical techniques that reduce the fault detection and recovery times for Internet-based applications, are covered in chapter three. Chapter four outlines the replication techniques for data and service fault tolerance. This chapter also pays particular attention to optimistic replication and the CAP theorem. Chapter five explains a few seminal works on group communication systems. Chapter six introduces the distributed consensus problem and covers a number of Paxos family algorithms in depth. The Byzantine generals problem and its latest solutions, including the seminal Practical Byzantine Fault Tolerance (PBFT) algorithm and a number of its derivatives, are introduced in chapter seven. The final chapter details the latest research results surrounding application-aware Byzantine fault tolerance, which represents an important step forward in the practical use of Byzantine fault tolerance techniques. Readership The primary market is networked and distributed computing system designers and developers, software architects, senior software engineers, and technical managers. The book will also prove very useful for upper-level undergraduate and graduate students in computer science and computer engineering interested in dependable computing research.
This book constitutes the refereed proceedings of the 7th International Workshop on OpenMP, IWOMP 2011, held in Chicago, IL, USA in June 2011. The 13 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections on using OpenMP with application, tools for OpenMP, extensions of OpenMP, and implementation and performance.
Systems Architecture, 6e, International Edition is the most comprehensive introduction to information systems hardware and software in business. This new edition remains an indispensable tool for IS students, emphasizing a managerial, broad systems perspective for a holistic approach to systems architecture. Each chapter has been updated thoroughly to reflect the changing nature of new technologies, and all end-of-chapter material has been enhanced and expanded.
Requirements engineering tasks have become increasingly complex. In order to ensure a high level of knowledge and competency among requirements engineers, the International Requirements Engineering Board (IREB) developed a standardized qualification called the Certified Professional for Requirements Engineering (CPRE). The certification defines the practical skills of a requirements engineer on various training levels. This book is designed for self-study and covers the curriculum for the Certified Professional for Requirements Engineering Foundation Level exam as defined by the IREB. The 2nd edition has been thoroughly revised and is aligned with the curriculum Version 2.2 of the IREB. In addition, some minor corrections to the 1st edition have been included. About IREB: The mission of the IREB is to contribute to the standardization of further education in the fields of business analysis and requirements engineering by providing syllabi and examinations, thereby achieving a higher level of applied requirements engineering. The IRE Board is comprised of a balanced mix of independent, internationally recognized experts in the fields of economy, consulting, research, and science.The IREB is a non-profit corporation.
For graduate and undergraduate courses in computer science, computer engineering, and electrical engineering Fundamentals of Processor and Computer Design Computer Organization and Architecture is a comprehensive coverage of the entire field of computer design updated with the most recent research and innovations in computer structure and function. With clear, concise, and easy-to-read material, the Tenth Edition is a user-friendly source for students studying computers. Subjects such as I/O functions and structures, RISC, and parallel processors are explored integratively throughout, with real world examples enhancing the text for student interest. With brand new material and strengthened pedagogy, this text engages students in the world of computer organization and architecture.
The Internet of Things (IoT) enabled spaces has made revolutionary advances in the utility grid that we know so far. Among these advances, intelligent and medical services are gaining lots of interest. The use of the Artificial Intelligence (AI) is increasing day after a day around us in fighting one of the most significant viruses, COVID-19. The purpose of this book is to present the detailed recent exploration of AI and IoT in the COVID-19 pandemic alike applications. The integrated AI and IoT paradigm is widely used in most of the medical applications as well as the sectors which deals with transacting data every day. This book can be used by Computer Science Undergraduate & Postgraduate Students, Researchers and Practitioners, city administrators, policy makers and government regulators. It presents the smart and up to date model for COVID-19 and alike applications. Novel architectural and medical use cases in the smart city project are the core aspects of this book. The wide variety in topics, it presents offers readers with multiple perspectives on a variety of disciplines. Prof. Dr. Fadi Al-Turjman received his Ph.D. in computer science from Queen's University, Kingston, Ontario, Canada, in 2011. He is a full professor and a research center director at Near East University, Nicosia, Cyprus.
Build your expertise in the BPF virtual machine in the Linux kernel with this practical guide for systems engineers. You'll not only dive into the BPF program lifecycle but also learn to write applications that observe and modify the kernel's behavior; inject code to monitor, trace, and securely observe events in the kernel; and more. Authors David Calavera and Lorenzo Fontana help you harness the power of BPF to make any computing system more observable. Familiarize yourself with the essential concepts you'll use on a day-to-day basis and augment your knowledge about performance optimization, networking, and security. Then see how it all comes together with code examples in C, Go, and Python. Write applications that use BPF to observe and modify the Linux kernel's behavior on demand Inject code to monitor, trace, and observe events in the kernel in a secure way-no need to recompile the kernel or reboot the system Explore code examples in C, Go, and Python Gain a more thorough understanding of the BPF program lifecycle
To understand the power of distributed systems, it is necessary to understand their inherent limitations: what problems cannot be solved in particular systems, or without sufficient resources (such as time or space). This book presents key techniques for proving such impossibility results and applies them to a variety of different problems in a variety of different system models. Insights gained from these results are highlighted, aspects of a problem that make it difficult are isolated, features of an architecture that make it inadequate for solving certain problems efficiently are identified, and different system models are compared.
Remember what a wild frontier the early days of home gaming were? Manufacturers releasing new consoles at a breakneck pace; developers creating games that kept us up all night, then going bankrupt the next day; and what self-respecting kid didn't beg their parents for an Atari or a Nintendo? This explosion of computers, consoles, and games was genuinely unlike anything the tech world has seen before or since. This thoroughly researched and geeky trip down memory lane pulls together the most entertaining stories from this dynamic era, and brings you the classic tech that should never be forgotten.
This book provides a comprehensive reference for everything that has to do with digital circuits. The author focuses equally on all levels of abstraction. He tells a bottom-up story from the physics level to the finished product level. The aim is to provide a full account of the experience of designing, fabricating, understanding, and testing a microchip. The content is structured to be very accessible and self-contained, allowing readers with diverse backgrounds to read as much or as little of the book as needed. Beyond a basic foundation of mathematics and physics, the book makes no assumptions about prior knowledge. This allows someone new to the field to read the book from the beginning. It also means that someone using the book as a reference will be able to answer their questions without referring to any external sources.
The QL&SC 2012 is a major symposium for scientists, and practitioners all around the world to present their latest researches, results, ideas, developments and applications in such areas as quantitative logic, many-valued logic, fuzzy logic, quantification of software, artificial intelligence, fuzzy sets and systems and soft computing.This invaluable book provides a broad introduction to the fuzzy reasoning and soft computing. It is certain one should not go too far in approximation and optimization, and a certain degree must be kept in mind. This is the essential idea of quantitative logic and soft computing.The explanations in the book are complete to provide the necessary background material needed to go further into the subject and explore the research literature. It is suitable reading for graduate students. It provides a platform for mutual exchanges from top experts and scholars around the world in this field.
This book will focus on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It will include contributions that discuss the security and privacy issues as well as the opportunities and applications that are tightly linked to sensitive infrastructures and strategic services. This book will address the complete functional framework and workflow in IoT-enabled RFID systems and explore the basic and high-level concepts. It is based on the latest technologies, and covers the major challenges, issues, and advances in the field. It will present data acquisition and case studies related to data intensive technologies in RFID-based IoT and includes WSN based systems and its security. It can serve as a manual for those in the industry while also helping beginners to understand both the basic and the advanced aspects in IoT-based RFID related issues. The book can be a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and find solutions that have been adopted in the fields of IoT and analytics.
Shrinking feature size and diminishing supply voltage are making circuits sensitive to supply voltage fluctuations within the microprocessor, caused by normal workload activity changes. If left unattended, voltage fluctuations can lead to timing violations or even transistor lifetime issues that degrade processor robustness. Mechanisms that learn to tolerate, avoid, and eliminate voltage fluctuations based on program and microarchitectural events can help steer the processor clear of danger, thus enabling tighter voltage margins that improve performance or lower power consumption. We describe the problem of voltage variation and the factors that influence this variation during processor design and operation. We also describe a variety of runtime hardware and software mitigation techniques that either tolerate, avoid, and/or eliminate voltage violations. We hope processor architects will find the information useful since tolerance, avoidance, and elimination are generalizable constructs that can serve as a basis for addressing other reliability challenges as well. Table of Contents: Introduction / Modeling Voltage Variation / Understanding the Characteristics of Voltage Variation / Traditional Solutions and Emerging Solution Forecast / Allowing and Tolerating Voltage Emergencies / Predicting and Avoiding Voltage Emergencies / Eliminiating Recurring Voltage Emergencies / Future Directions on Resiliency
Using the new International Standard IEC 1131-3, this text investigates the nature of PLCs and how they can be used in industry. It covers programming techniques including: instruction list; structured text; ladder diagram; fuction block diagram and sequential function chart. Special coding techniques for some common PLCs are covered inteh appendices.
This textbook is designed for graduate-level courses, and for self-study, in analog and sampled-data, including switched-capacitor, circuit theory and design for ongoing, or active electrical engineers, needing to become proficient in analog circuit design on a system, rather than on a device, level. After decades of experience in industry and teaching this material in academic settings, the author has extracted many of the most important and useful features of analog circuit theory and design and presented them in a manner that is easy to digest and utilize. The methodology and analysis techniques presented can be applied to areas well beyond those specifically addressed in this book. This book is meant to enable readers to gain a 'general knowledge' of one aspect of analog engineering (e.g., that of network theory, filter design, system theory and sampled-data signal processing). The presentation is self-contained and should be accessible to anyone with a first degree in electrical engineering.
This book presents a collection of automated methods that are useful for different aspects of fault analysis in cryptography. The first part focuses on automated analysis of symmetric cipher design specifications, software implementations, and hardware circuits. The second part provides automated deployment of countermeasures. The third part provides automated evaluation of countermeasures against fault attacks. Finally, the fourth part focuses on automating fault attack experiments. The presented methods enable software developers, circuit designers, and cryptographers to test and harden their products.
Service-Oriented Architecture (SOA) is at the heart of a revolutionary computing platform that is being adopted world-wide and has earned the support of every major software provider. In Service-Oriented Architecture: Concepts, Technology, and Design, Thomas Erl presents the first end-to-end tutorial that provides step-by-step instructions for modeling and designing service-oriented solutions from the ground up.
Erl uses more than 125 case study examples and over 300 diagrams to illuminate the most important facets of building SOA platforms: goals, obstacles, concepts, technologies, standards, delivery strategies, and processes for analysis and design.
His book's broad coverage includes:
The goal of this book is to help you attain a solid understanding of what constitutes contemporary SOA along with step-by-step guidance for realizing its successful implementation.
This book describes a flexible and largely automated methodology for adding the estimation of power consumption to high level simulations at the electronic system level (ESL). This method enables the inclusion of power consumption considerations from the very start of a design. This ability can help designers of electronic systems to create devices with low power consumption. The authors also demonstrate the implementation of the method, using the popular ESL language "SystemC". This implementation enables most existing SystemC ESL simulations for power estimation with very little manual work. Extensive case-studies of a Network on Chip communication architecture and a dual-core application processor "ARM Cortex-A9" showcase the applicability and accuracy of the method to different types of electronic devices. The evaluation compares various trade-offs regarding amount of manual work, types of ESL models, achieved estimation accuracy and impact on the simulation speed. Describes a flexible and largely automated ESL power estimation method; Shows implementation of power estimation methodology in SystemC; Uses two extensive case studies to demonstrate method introduced.
The expanded and updated 2nd edition of this classic text offers the reader a comprehensive introduction to the concepts of logic functions and equations and their applications across computer science. The approach emphasizes a thorough understanding of the fundamental principles as well as numerical and computer-based solution methods. Updated throughout, some major additions for the 2nd edition include: - an expanded introductory section on logic equations; - a new chapter on sets, lattices, and classes of logic functions; - a new chapter about SAT-problems; - a new chapter about methods to solve extremely complex problems; and - an expanded section with new decomposition methods utilizing the Boolean Differential Calculus extended to lattices of logic functions. The book provides insight into applications across binary arithmetic, coding, complexity, logic design, programming, computer architecture, and artificial intelligence. Based on the extensive teaching experience of the authors, Logic Functions and Equations is highly recommended for a one- or two-semester course in computer science and related programs. It provides straightforward high-level access to these methods and enables sophisticated applications, elegantly bridging the gap between mathematics and the theoretical foundations of computer science.
You may like...
System Architecture, Global Edition
Bruce Cameron, Edward Crawley, … Paperback R1,619 Discovery Miles 16 190
Kubernetes: Up and Running - Dive Into…
Brendan Burns, Joe Beda, … Paperback
Logic and Computer Design Fundamentals…
Morris Mano, Charles Kime, … Paperback R1,684 Discovery Miles 16 840
Storytelling in Design
Anna Dahlstrom Paperback
How to Speak Machine - Laws of Design…
John Maeda Paperback (1)
Parallel Processing Algorithms For GIS
Richard Healey, Steve Dowers, … Paperback R2,341 Discovery Miles 23 410
Learning Computer Architecture with…
Eben Upton, Jeffrey Duntemann, … Paperback (1)
FPGA Prototyping by SystemVerilog…
Pong P. Chu Hardcover R2,064 Discovery Miles 20 640
From Variability Tolerance to…
Abbas Rahimi, Luca Benini, … Hardcover R3,206 Discovery Miles 32 060
Fast Techniques for Integrated Circuit…
Mikael Sahrling Hardcover R2,009 Discovery Miles 20 090