![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
"Ask not what your compiler can do for you, ask what you can do for your compiler." --John Levesque, Director of Cray's Supercomputing Centers of Excellence The next decade of computationally intense computing lies with more powerful multi/manycore nodes where processors share a large memory space. These nodes will be the building block for systems that range from a single node workstation up to systems approaching the exaflop regime. The node itself will consist of 10's to 100's of MIMD (multiple instruction, multiple data) processing units with SIMD (single instruction, multiple data) parallel instructions. Since a standard, affordable memory architecture will not be able to supply the bandwidth required by these cores, new memory organizations will be introduced. These new node architectures will represent a significant challenge to application developers. Programming for Hybrid Multi/Manycore MPP Systems attempts to briefly describe the current state-of-the-art in programming these systems, and proposes an approach for developing a performance-portable application that can effectively utilize all of these systems from a single application. The book starts with a strategy for optimizing an application for multi/manycore architectures. It then looks at the three typical architectures, covering their advantages and disadvantages. The next section of the book explores the other important component of the target-the compiler. The compiler will ultimately convert the input language to executable code on the target, and the book explores how to make the compiler do what we want. The book then talks about gathering runtime statistics from running the application on the important problem sets previously discussed. How best to utilize available memory bandwidth and virtualization is covered next, along with hybridization of a program. The last part of the book includes several major applications, and examines future hardware advancements and how the application developer may prepare for those advancements.
D2D-based proximity service is a very hot topic with great commercial potential from an application standpoint. Unlike existing books which focus on D2D communications technologies, this book fills a gap by summarizing and analyzing the latest applications and research results in academic, industrial fields, and standardization. The authors present the architecture, fundamental issues, and applications in a D2D networking environment from both application and interdisciplinary points of view.
The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.
Challenges in Design and Implementation of Middlewares for Real-Time Systems brings together in one place important contributions and up-to-date research results in this fast moving area. Challenges in Design and Implementation of Middlewares for Real-Time Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
The richly illustrated Interactive Web-Based Data Visualization with R, plotly, and shiny focuses on the process of programming interactive web graphics for multidimensional data analysis. It is written for the data analyst who wants to leverage the capabilities of interactive web graphics without having to learn web programming. Through many R code examples, you will learn how to tap the extensive functionality of these tools to enhance the presentation and exploration of data. By mastering these concepts and tools, you will impress your colleagues with your ability to quickly generate more informative, engaging, and reproducible interactive graphics using free and open source software that you can share over email, export to pdf, and more. Key Features: Convert static ggplot2 graphics to an interactive web-based form Link, animate, and arrange multiple plots in standalone HTML from R Embed, modify, and respond to plotly graphics in a shiny app Learn best practices for visualizing continuous, discrete, and multivariate data Learn numerous ways to visualize geo-spatial data This book makes heavy use of plotly for graphical rendering, but you will also learn about other R packages that support different phases of a data science workflow, such as tidyr, dplyr, and tidyverse. Along the way, you will gain insight into best practices for visualization of high-dimensional data, statistical graphics, and graphical perception. The printed book is complemented by an interactive website where readers can view movies demonstrating the examples and interact with graphics.
This classic reference work is a comprehensive guide to the design, evaluation, and use of reliable computer systems. It includes case studies of reliable systems from manufacturers, such as Tandem, Stratus, IBM, and Digital. It covers special systems such as the Galileo Orbiter fault protection system and AT&T telephone switching system processors.
Modelling Transitions shows what computational, formal and data-driven approaches can and could mean for sustainability transitions research, presenting the state-of-the-art and exploring what lies beyond. Featuring contributions from many well-known authors, this book presents the various benefits of modelling for transitions research. More than just taking stock, it also critically examines what modelling of transformative change means and could mean for transitions research and for other disciplines that study societal changes. This includes identifying a variety of approaches currently not part of the portfolios of transitions modellers. Far from only singing praise, critical methodological and philosophical introspection are key aspects of this important book. This book speaks to modellers and non-modellers alike who value the development of robust knowledge on transitions to sustainability, including colleagues in congenial fields. Be they students, researchers or practitioners, everyone interested in transitions should find this book relevant as reference, resource and guide.
This books aims to present fundamental aspects of optical communication techniques and advanced modulation techniques and extensive applications of optical communications systems and networks employing single-mode optical fibers as the transmission system. New digital techqniues such as chromatic dispersion, polarization mode dispersion, nonlinear phase distortion effects, etc. will be discussed. Practical models for practice and understanding the behavior and dynamics of the devices and systems will be included.
Smart Grid: Networking, Data Management, and Business Models delivers a comprehensive overview of smart grid communications, discussing the latest advances in the technology, the related cyber security issues, and the best ways to manage user demand and pricing. Comprised of 16 chapters authored by world-renowned experts, this book: Considers the use of cognitive radio and software-defined networking in the smart grid Explores the space of attacks in the energy management process, the need for a smart grid simulator, and the management issues that arise around smart cities Describes a real-time pricing scheme that aims to reduce the peak-to-average load ratio Explains how to realize low-carbon economies and the green smart grid through the pervasive management of demand Presents cutting-edge research on microgrids, electric vehicles, and energy trading in the smart grid Thus, Smart Grid: Networking, Data Management, and Business Models provides a valuable reference for utility operators, telecom operators, communications engineers, power engineers, electric vehicle original equipment manufacturers (OEMs), electric vehicle service providers, university professors, researchers, and students.
Detailing the advantages and limitations of multi-carrier communication, this book proposes possible solutions for these limitations. Multi-Carrier Communication Systems with Examples in MATLAB (R): A New Perspective addresses the two primary drawbacks of orthogonal frequency division multiplexing (OFDM) communication systems: the high sensitivity to carrier frequency offsets and phase noise, and the high peak-to-average power ratio (PAPR) of the transmitted signals. Presenting a new interleaving scheme for multicarrier communication, the book starts with a detailed overview of multi-carrier systems such as OFDM, multi-carrier code division multiple access (MC-CDMA), and single-carrier frequency division multiple access (SC-FDMA) systems. From there, it proposes a new way to deal with the frequency-selective fading channel: the single-carrier with frequency domain equalization (SC-FDE) scheme. The second part of the book examines the performance of the continuous phase modulation (CPM)-based OFDM (CPM-OFDM) system. It proposes a CPM-based single-carrier frequency domain equalization (CPM-SC-FDE) structure for broadband wireless communication systems. In the third part of the book, the author proposes a chaotic interleaving scheme for both CPM-OFDM and the CPM-SC-FDE systems. A comparison between the proposed chaotic interleaving and the conventional block interleaving is also performed in this part. The final part of the book presents efficient image transmission techniques over multi-carrier systems such as OFDM, MC-CDMA, and SC-FDMA. It details a new approach for efficient image transmission over OFDM and MC-CDMA systems using chaotic interleaving that transmits images over wireless channels efficiently. The book studies the performance of discrete cosine transform-based single-carrier frequency division multiple access (DCT-SC-FDMA) with image transmission. It also proposes a CPM-based DCT-SC-FDMA structure for efficient image transmission. The book includes MATLAB (R) simulations along with MATLAB code so you can practice carrying out your own extensive simulations.
Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.
Scalable and Secure Internet Services and Architecture provides an in-depth analysis of many key scaling technologies. Topics include: server clusters and load balancing; QoS-aware resource management; server capacity planning; Web caching and prefetching; P2P overlay network; mobile code and security; and mobility support for adaptive grid computing. The author discusses each topic by first defining a problem, then reviewing current representative approaches for solving it. He then describes in detail the underlying principles of the technologies and the application of these principles, along with balanced coverage of concepts and engineering trade-offs. The book demonstrates the effectiveness of the technologies via rigorous mathematical modeling and analysis, simulation, and practical implementations. It blends technologies in a unified framework for scalable and secure Internet services, delivering a systematic treatment based upon the author's cutting-edge research experience. This volume describes in breadth and depth advanced scaling technologies that support media streaming, e-commerce, grid computing, personalized content delivery, distributed file sharing, network management, and other Internet applications.
Computer systems have become an important element of the world economy, with billions of dollars spent each year on development, manufacture, operation, and maintenance. Combining coverage of computer system reliability, safety, usability, and other related topics into a single volume, Computer System Reliability: Safety and Usability eliminates the need to consult many different and diverse sources in the hunt for the information required to design better computer systems. After presenting introductory aspects of computer system reliability such as safety, usability-related facts and figures, terms and definitions, and sources for obtaining useful information on computer system reliability, safety, and usability, the book: Reviews mathematical concepts considered useful to understanding subsequent chapters Presents various introductory aspects of reliability, safety, and usability and computer system reliability basics Covers software reliability assessment and improvement methods Discusses important aspects of software quality and human error and software bugs in computer systems Highlights software safety and Internet reliability Details important aspects of software usability including the need for considering usability during the software development phase, software usability engineering process, software usability inspection methods, software usability test methods, and guidelines for conducting software usability testing Elucidates web usability facts and figures, common design errors, web page design, tools for evaluating web usability, and questions to evaluate website message communication effectiveness Examines important aspects of computer system life cycle costing Written by systems reliability expert B.S. Dhillon, the book is accessible to all levels of readership, making it useful to beginners and seasoned professiona
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes. Reflecting this emerging trend and evolving field, Process-Centric Architecture for Enterprise Software Systems provides a complete and accessible introduction explaining this architecture. The text presents, in detail, the analysis and design principles used in process-centric architecture. Illustrative examples demonstrate how to architect and design enterprise systems based on the business processes central to your organization. It covers the architectural aspects of business process management, the evolution of IT systems in enterprises, the importance of a business process focus, the role of workflows, business rules, enterprise application integration, and business process modeling languages such as WS-BPEL and BPML. It also investigates: Fundamental concepts of process-centric architecture style The PCA approach to architecting enterprise IT systems Business process driven applications and integration Two case studies that illustrate how to architect and design enterprise applications based on PCA SOA in the context of process-centric architecture Standards, technologies, and infrastructure behind PCA Explaining how to architect enterprise systems using a BPMS technology platform, J2EE components, and Web services, this forward-looking book will empower you to create systems centered on business processes and make today's enterprise processes successful and agile.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
Provides a truly accessible introduction and a fully integrated approach to fuzzy systems and neural networks—the definitive text for students and practicing engineers Researchers are already applying neural networks and fuzzy systems in series, from the use of fuzzy inputs and outputs for neural networks to the employment of individual neural networks to quantify the shape of a fuzzy membership function. But the integration of these two fields into a "neurofuzzy" technology holds even greater potential benefits in reducing computing time and optimizing results. Fuzzy and Neural Approaches in Engineering presents a detailed examination of the fundamentals of fuzzy systems and neural networks and then joins them synergistically—combining the feature extraction and modeling capabilities of the neural network with the representation capabilities of fuzzy systems. Exploring the value of relating genetic algorithms and expert systems to fuzzy and neural technologies, this forward-thinking text highlights an entire range of dynamic possibilities within soft computing. With examples specifically designed to illuminate key concepts and overcome the obstacles of notation and overly mathematical presentations often encountered in other sources, plus tables, figures, and an up-to-date bibliography, this unique work is both an important reference and a practical guide to neural networks and fuzzy systems.
Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today's always on mobile society. Describing how content delivery networks (CDN) function, it provides an understanding of Web architecture, as well as an overview of the TCP/IP protocol suite. The book reports on the development of the technologies that have evolved over the past decade as distribution mechanisms for various types of Web content. Using a structural and visual approach, it provides step-by-step guidance through the process of setting up a scalable CDN. Supplies a clear understanding of the framework and individual layers of design, including caching and load balancing Describes the terminology, tactics, and potential problems when implementing a CDN Examines cost-effective ways to load balance web service layers Explains how application servers connect to databases and how systems will scale as volume increases Illustrates the impact of video on data storage and delivery, as well as the need for data compression Covers Flash and the emerging HTML5 standard for video Highlighting the advantages and disadvantages associated with these types of networks, the book explains how to use the networks within the Internet operated by various ISPs as mechanisms for effectively delivering Web server based information. It emphasizes a best-of-breed approach to building your network to allow for an effective CDN to be built on practically any budget. To help you get started, this vendor-neutral reference explains how to code Web pages to optimize the delivery of various types of media. It also includes examples of successful approaches, from outsourcing to do it yourself.
For any digital TV developer or manager, the maze of standards and specifications related to MHP and OCAP is daunting-you have to patch together pieces from several standards to gather all the necessary knowledge you need to compete worldwide. The standards themselves can be confusing, and contain many inconsistencies and missing pieces. Interactive TV Standards provides a guide for actually deploying these technologies for a broadcaster or product and application developer. Understanding what the APIs do is essential for your job, but understanding how the APIs work and how they relate to each other at a deeper level helps you do it better, faster and easier. Learn how to spot when something that looks like a good solution to a problem really isn't. Understand how the many standards that make up MHP fit together, and implement them effectively and quickly. Two DVB insiders teach you which elements of the standards that are needed for digital TV, highlight those elements that are not needed, and explain the special requirements that MHP places on implementations of these standards. Once you've mastered the basics, you will learn how to develop products for US, European, and Asian markets--saving time and money. By detailing how a team can develop products for both the OCAP and MHP markets, Interactive TV Standards teaches you how to to leverage your experience with one of these standards into the skills and knowledge needed to work with the critical, related standards. Does the team developing a receiver have all the knowledge they need to succeed, or have they missed important information in an apparently unrelated standard? Does an application developer really know how to write a reliable piece of software that runs on any MHP or OCAP receiver? Does the broadcaster understand the business and technical issues well enough to deploy MHP successfully, or will their project fail? Increase your chances of success the first time with Interactive TV Standards.
Handbook on Networked Multipoint Multimedia Conferencing and Multistream Immsersive Telepresence using SIP: Scalable Distributed Applications and Media Control over Internet is the first book to put together all IETF request for comments (RFCs), and the internet drafts standards related to the multipoint conferencing and immersive telepresence. This book includes mandatory and optional texts of all standards in a chronological and systematic way almost with one-to-one integrity from the beginning to end, allowing the reader to understand all aspects of the highly complex real-time applications. It is a book that network designers, software developers, product manufacturers, implementers, interoperability testers, professionals, professors, and researchers will find to be immensely useful. Practitioners and engineers in all spectrums who are concentrating on building the real-time, scalable, interoperable multipoint applications, can use this book to make informed choices based on technical standards in the market place, on all proprietary non-scalable and non-interposable products. This book will provide focus and foundation for these decision makers.
* Targests readers with a background in programming, interested in an introduction/refresher in statistical hypothesis testing * Uses Python throughout * Provides the reader with the opportunity of using the book whenever needed rather than following a sequential path.
This book offers a comprehensive introduction to seven commonly used image understanding techniques in modern information technology. Readers of various levels can find suitable techniques to solve their practical problems and discover the latest development in these specific domains. The techniques covered include camera model and calibration, stereo vision, generalized matching, scene analysis and semantic interpretation, multi-sensor image information fusion, content-based visual information retrieval, and understanding spatial-temporal behavior. The book provides aspects from the essential concepts overview and basic principles to detailed introduction, explanation of the current methods and their practical techniques. It also presents discussions on the research trends and latest results in conjunction with new development of technical methods. This is an excellent read for those who do not have a subject background in image technology but need to use these techniques to complete specific tasks. These essential information will also be useful for their further study in the relevant fields.
Imagine what you could do if scalability wasn't a problem. With this hands-on guide, you'll learn how the Cassandra database management system handles hundreds of terabytes of data while remaining highly available across multiple data centers. This third edition-updated for Cassandra 4.0-provides the technical details and practical examples you need to put this database to work in a production environment. Authors Jeff Carpenter and Eben Hewitt demonstrate the advantages of Cassandra's nonrelational design, with special attention to data modeling. If you're a developer, DBA, or application architect looking to solve a database scaling issue or future-proof your application, this guide helps you harness Cassandra's speed and flexibility. Understand Cassandra's distributed and decentralized structure Use the Cassandra Query Language (CQL) and cqlsh-the CQL shell Create a working data model and compare it with an equivalent relational model Develop sample applications using client drivers for languages including Java, Python, and Node.js Explore cluster topology and learn how nodes exchange data
Provides detailed introduction to Internet of Healthcare Things (IoHT) and its applications Reviews underlying sensor and hardware technologies Includes recent advances in the IoHT such as remote healthcare monitoring and wearable devices Explores applications of Data Analytics/Data Mining in IoHT, including data management and data governance Focusses on regulatory and compliance issues in IoHT
Features Teaches software design by showing programmers how to build the tools they use every day. Each chapter includes exercises to help readers check and deepen their understanding. All the example code can be downloaded, re-used, and modified under an open license. |
![]() ![]() You may like...
New Order and Progress - Development and…
Ben Ross Schneider
Hardcover
R3,839
Discovery Miles 38 390
Ageing In Asia: Contemporary Trends And…
Kai Hong Phua, Lee Gan Goh, …
Hardcover
R4,625
Discovery Miles 46 250
The Chicago Haymarket Affair: A Guide to…
Joseph Anthony Rulli
Paperback
The Elements of Structured Finance
Ann Rutledge, Sylvain Raines
Hardcover
R5,628
Discovery Miles 56 280
|