|
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
This book is a celebration of Leslie Lamport's work on concurrency,
interwoven in four-and-a-half decades of an evolving industry: from
the introduction of the first personal computer to an era when
parallel and distributed multiprocessors are abundant. His works
lay formal foundations for concurrent computations executed by
interconnected computers. Some of the algorithms have become
standard engineering practice for fault tolerant distributed
computing - distributed systems that continue to function correctly
despite failures of individual components. He also developed a
substantial body of work on the formal specification and
verification of concurrent systems, and has contributed to the
development of automated tools applying these methods. Part I
consists of technical chapters of the book and a biography. The
technical chapters of this book present a retrospective on
Lamport's original ideas from experts in the field. Through this
lens, it portrays their long-lasting impact. The chapters cover
timeless notions Lamport introduced: the Bakery algorithm, atomic
shared registers and sequential consistency; causality and logical
time; Byzantine Agreement; state machine replication and Paxos;
temporal logic of actions (TLA). The professional biography tells
of Lamport's career, providing the context in which his work arose
and broke new grounds, and discusses LaTeX - perhaps Lamport's most
influential contribution outside the field of concurrency. This
chapter gives a voice to the people behind the achievements,
notably Lamport himself, and additionally the colleagues around
him, who inspired, collaborated, and helped him drive worldwide
impact. Part II consists of a selection of Leslie Lamport's most
influential papers. This book touches on a lifetime of
contributions by Leslie Lamport to the field of concurrency and on
the extensive influence he had on people working in the field. It
will be of value to historians of science, and to researchers and
students who work in the area of concurrency and who are interested
to read about the work of one of the most influential researchers
in this field.
Intelligent systems and related designs have become important
instruments leading to profound innovations in automated control
and interaction with computers and machines. Such systems depend
upon established methods and tools for solving complex learning and
decision-making problems under uncertain and continuously varying
conditions. Intelligent Applications for Heterogeneous System
Modeling and Design examines the latest developments in intelligent
system engineering being used across industries with an emphasis on
transportation, aviation, and medicine. Focusing on the latest
trends in artificial intelligence, systems design and testing, and
related topic areas, this publication is designed for use by
engineers, IT specialists, academicians, and graduate-level
students.
"High-Performance Embedded Computing, Second Edition," combines
leading-edge research with practical guidance in a variety of
embedded computing topics, including real-time systems, computer
architecture, and low-power design. Author Marilyn Wolf presents a
comprehensive survey of the state of the art, and guides you to
achieve high levels of performance from the embedded systems that
bring these technologies together.
The book covers CPU design, operating systems, multiprocessor
programs and architectures, and much more. Embedded computing is a
key component of cyber-physical systems, which combine physical
devices with computational resources for control and communication.
This revised edition adds new content and examples of
cyber-physical systems throughout the book, including design
methodologies, scheduling, and wide-area CPS to illustrate the
possibilities of these new systems.
Revised and updated with coverage of recently developed consumer
electronics architectures and models of computingIncludes new VLIW
processors such as the TI Da Vinci, and CPU simulation Learn
model-based verification and middleware for embedded systems
Supplemental material includes lecture slides, labs, and additional
resources"
Agile software development approaches have had significant
impact on industrial software development practices. Today, agile
software development has penetrated to most IT companies across the
globe, with an intention to increase quality, productivity, and
profitability. Comprehensive knowledge is needed to understand the
architectural challenges involved in adopting and using agile
approaches and industrial practices to deal with the development of
large, architecturally challenging systems in an agile way.
"Agile Software Architecture" focuses on gaps in the
requirements of applying architecture-centric approaches and
principles of agile software development and demystifies the agile
architecture paradox. Readers will learn how agile and
architectural cultures can co-exist and support each other
according to the context. Moreover, this book will also provide
useful leads for future research in architecture and agile to
bridge such gaps by developing appropriate approaches that
incorporate architecturally sound practices in agile methods.
Presents a consolidated view of the state-of-art and
state-of-practice as well as the newest research findings
Identifies gaps in the requirements of applying
architecture-centric approaches and principles of agile software
development and demystifies the agile architecture paradox Explains
whether or not and how agile and architectural cultures can
co-exist and support each other depending upon the context Provides
useful leads for future research in both architecture and agile to
bridge such gaps by developing appropriate approaches, which
incorporate architecturally sound practices in agile methods
"Network and System Security" provides focused coverage of
network and system security technologies. It explores practical
solutions to a wide range of network and systems security issues.
Chapters are authored by leading experts in the field and address
the immediate and long-term challenges in the authors respective
areas of expertise. Coverage includes building a secure
organization, cryptography, system intrusion, UNIX and Linux
security, Internet security, intranet security, LAN security;
wireless network security, cellular network security, RFID
security, and more.
Chapters contributed by leaders in the field covering foundational
and practical aspects of system and network security, providing a
new level of technical expertise not found elsewhereComprehensive
and updated coverage of the subject area allows the reader to put
current technologies to workPresents methods of analysis and
problem solving techniques, enhancing the reader s grasp of the
material and ability to implement practical solutions"
High-Performance Computing using FPGA covers the area of high
performance reconfigurable computing (HPRC). This book provides an
overview of architectures, tools and applications for
High-Performance Reconfigurable Computing (HPRC). FPGAs offer very
high I/O bandwidth and fine-grained, custom and flexible
parallelism and with the ever-increasing computational needs
coupled with the frequency/power wall, the increasing maturity and
capabilities of FPGAs, and the advent of multicore processors which
has caused the acceptance of parallel computational models. The
Part on architectures will introduce different FPGA-based HPC
platforms: attached co-processor HPRC architectures such as the
CHREC's Novo-G and EPCC's Maxwell systems; tightly coupled HRPC
architectures, e.g. the Convey hybrid-core computer; reconfigurably
networked HPRC architectures, e.g. the QPACE system, and standalone
HPRC architectures such as EPFL's CONFETTI system. The Part on
Tools will focus on high-level programming approaches for HPRC,
with chapters on C-to-Gate tools (such as Impulse-C, AutoESL,
Handel-C, MORA-C++); Graphical tools (MATLAB-Simulink, NI LabVIEW);
Domain-specific languages, languages for heterogeneous
computing(for example OpenCL, Microsoft's Kiwi and Alchemy
projects). The part on Applications will present case from several
application domains where HPRC has been used successfully, such as
Bioinformatics and Computational Biology; Financial Computing;
Stencil computations; Information retrieval; Lattice QCD;
Astrophysics simulations; Weather and climate modeling.
Computation and Storage in the Cloud is the first comprehensive
and systematic work investigating the issue of computation and
storage trade-off in the cloud in order to reduce the overall
application cost. Scientific applications are usually computation
and data intensive, where complex computation tasks take a long
time for execution and the generated datasets are often terabytes
or petabytes in size. Storing valuable generated application
datasets can save their regeneration cost when they are reused, not
to mention the waiting time caused by regeneration. However, the
large size of the scientific datasets is a big challenge for their
storage. By proposing innovative concepts, theorems and algorithms,
this book will help bring the cost down dramatically for both cloud
users and service providers to run computation and data intensive
scientific applications in the cloud. Covers cost models and
benchmarking that explain the necessary tradeoffs for both cloud
providers and usersDescribes several novel strategies for storing
application datasets in the cloudIncludes real-world case studies
of scientific research applications
Covers cost models and benchmarking that explain the necessary
tradeoffs for both cloud providers and users
Describes several novel strategies for storing application
datasets in the cloud
Includes real-world case studies of scientific research
applications
Within global commerce, services and management play a vital role
in the economy. Service systems are necessary for organisations,
and a multi-disciplinary approach is ideal to establish full
understanding of these systems. Best Practices and New Perspectives
in Service Science and Management provides original research on all
aspects of service science, service management, service
engineering, and its supporting technology in order to administer
cutting-edge knowledge to encourage the improvement of services.
This book is essential for researchers and practitioners in the
fields of computer science, software management, and engineering.
This book describes a new design approach for energy-efficient,
Domain-Specific Instruction set Processor (DSIP) architectures for
the wireless baseband domain. The innovative techniques presented
enable co-design of algorithms, architectures and technology, for
efficient implementation of the most advanced technologies. To
demonstrate the feasibility of the author's design approach, case
studies are included for crucial functionality of advanced wireless
systems with increased computational performance, flexibility and
reusability. Designers using this approach will benefit from
reduced development/product costs and greater scalability to future
process technology nodes.
Despite their widespread impact, computer networks that provide the
foundation for the World Wide Web and Internet have many
limitations. These networks are vulnerable to security threats,
break easily, and have a limited ability to respond to changing
conditions. Recent research on overcoming these limitations has
used biological systems for inspiration, resulting in the
development of biologically-inspired computer networks. These
networks are designed and developed using principles that are
commonly found in natural and biological systems. Biologically
Inspired Networking and Sensing: Algorithms and Architectures
offers current perspectives and trends in biologically-inspired
networking, exploring various approaches aimed at improving network
paradigms. Research contained within this compendium of papers and
surveys introduces studies in the fields of communication networks,
performance modeling, and distributed computing, as well as new
advances in networking.
As the future of software development in a global environment
continues to be influenced by the areas of service oriented
architecture (SOA) and cloud computing, many legacy applications
will need to migrate these environments to take advantage of the
benefits offered by the service environment. Migrating Legacy
Applications: Challenges in Service Oriented Architecture and Cloud
Computing Environments presents a closer look at the partnership
between service oriented architecture and cloud computing
environments while analyzing potential solutions to challenges
related to the migration of legacy applications. This reference is
essential for students and university scholars alike.
Enterprise Architecture (EA) is the organizing logic for a firm's
core business processes and IT capabilities captured in a set of
policies and technical choices. ""Handbook of Enterprise Systems
Architecture in Practice"" provides a comprehensive and unified
reference overview of practical aspects of enterprise architecture.
This premier reference source includes a complete analysis of EA
theory, concepts, strategies, implementation challenges, and case
studies. The impact of effective enterprise architecture on IT
governance, IT portfolio management, IT risks, and IT outsourcing
are described in this authoritative reference tool. Researchers and
IT professionals will gain insights into how firms can maximize the
business value of IT and increase competitiveness.
As the volume of global Internet traffic increases, the Internet is
beginning to suffer from a broad spectrum of performance-degrading
infrastructural limitations that threaten to jeopardize the
continued growth of new, innovative services. In answer to this
challenge, computer scientists seek to maintain the original design
principles of the Internet while allowing for a more dynamic
approach to the manner in which networks are designed and operated.
The Handbook of Research on Redesigning the Future of Internet
Architectures covers some of the hottest topics currently being
debated by the Internet community at large, including Internet
governance, privacy issues, service delivery automation, advanced
networking schemes, and new approaches to Internet
traffic-forwarding and path-computation mechanics. Targeting
students, network-engineers, and technical strategists, this book
seeks to provide a broad and comprehensive look at the next wave of
revolutionary ideas poised to reshape the very foundation of the
Internet as we know it.
This book provides a single-source reference to routing algorithms
for Networks-on-Chip (NoCs), as well as in-depth discussions of
advanced solutions applied to current and next generation, many
core NoC-based Systems-on-Chip (SoCs). After a basic introduction
to the NoC design paradigm and architectures, routing algorithms
for NoC architectures are presented and discussed at all
abstraction levels, from the algorithmic level to actual
implementation. Coverage emphasizes the role played by the routing
algorithm and is organized around key problems affecting current
and next generation, many-core SoCs. A selection of routing
algorithms is included, specifically designed to address key issues
faced by designers in the ultra-deep sub-micron (UDSM) era,
including performance improvement, power, energy, and thermal
issues, fault tolerance and reliability.
This edited book focuses on concepts and their applications using
the theory of conceptual spaces, one of today's most central tracks
of cognitive science discourse. It features 15 papers based on
topics presented at the Conceptual Spaces @ Work 2016 conference.
The contributors interweave both theory and applications in their
papers. Among the first mentioned are studies on metatheories,
logical and systemic implications of the theory, as well as
relations between concepts and language. Examples of the latter
include explanatory models of paradigm shifts and evolution in
science as well as dilemmas and issues of health, ethics, and
education. The theory of conceptual spaces overcomes many
translational issues between academic theoretization and practical
applications. The paradigm is mainly associated with structural
explanations, such as categorization and meronomy. However, the
community has also been relating it to relations, functions, and
systems. The book presents work that provides a geometric model for
the representation of human conceptual knowledge that bridges the
symbolic and the sub-conceptual levels of representation. The model
has already proven to have a broad range of applicability beyond
cognitive science and even across a number of disciplines related
to concepts and representation.
|
|