![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design
This book covers several futuristic computing technologies like quantum computing, quantum-dot cellular automata, DNA computing, and optical computing. In turn, it explains them using examples and tutorials on a CAD tool that can help beginners get a head start in QCA layout design. It discusses research on the design of circuits in quantum-dot cellular automata (QCA) with the objectives of obtaining low-complexity, robust designs for various arithmetic operations. The book also investigates the systematic reduction of majority logic in the realization of multi-bit adders, dividers, ALUs, and memory.
The increasing adoption of Business Process Management (BPM) has inspired pioneering software architects and developers to effectively leverage BPM-based software and process-centric architecture (PCA) to create software systems that enable essential business processes. Reflecting this emerging trend and evolving field, Process-Centric Architecture for Enterprise Software Systems provides a complete and accessible introduction explaining this architecture. The text presents, in detail, the analysis and design principles used in process-centric architecture. Illustrative examples demonstrate how to architect and design enterprise systems based on the business processes central to your organization. It covers the architectural aspects of business process management, the evolution of IT systems in enterprises, the importance of a business process focus, the role of workflows, business rules, enterprise application integration, and business process modeling languages such as WS-BPEL and BPML. It also investigates: Fundamental concepts of process-centric architecture style The PCA approach to architecting enterprise IT systems Business process driven applications and integration Two case studies that illustrate how to architect and design enterprise applications based on PCA SOA in the context of process-centric architecture Standards, technologies, and infrastructure behind PCA Explaining how to architect enterprise systems using a BPMS technology platform, J2EE components, and Web services, this forward-looking book will empower you to create systems centered on business processes and make today's enterprise processes successful and agile.
What exactly is a cloud-native platform? It's certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. This O'Reilly report explains the capabilities of cloud-native platforms and examines the fundamental changes enterprises need to make in process, organization, and culture if they're to take real advantage of this approach. Author Duncan Winn focuses on the open source platform Cloud Foundry, one of the more prominent cloud-native providers. You'll learn how cloud-native applications are designed to be "infrastructure unaware" so they can thrive and move at will in the highly distributed and constantly evolving cloud environment.With this report, you'll explore: Technical driving forces that are rapidly changing the way organizations develop and deliver software today How key concepts underpinning the Cloud Foundry platform leverage each of the technical forces discussed How cloud-native platforms remove the requirement to perform undifferentiated heavy lifting, such as provisioning VMs, middleware, and databases Why cloud-native platforms enable fast feedback loops as you move from agile development to agile deployment Recommended changes and practical considerations for organizations that want to build cloud-native applications.
This book explains in layman's terms how CMOS transistors work. The author explains step-by-step how CMOS transistors are built, along with an explanation of the purpose of each process step. He describes for readers the key inventions and developments in science and engineering that overcame huge obstacles, enabling engineers to shrink transistor area by over 1 million fold and build billions of transistor switches that switch over a billion times a second, all on a piece of silicon smaller than a thumbnail.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
This book analyzes the challenges in verifying Dynamically
Reconfigurable Systems (DRS) with respect to the user design and
the physical implementation of such systems. The authors describe
the use of a simulation-only layer to emulate the behavior of
target FPGAs and accurately model the characteristic features of
reconfiguration. Readers are enabled with this simulation-only
layer to maintain verification productivity by abstracting away the
physical details of the FPGA fabric. Two implementations of the
simulation-only layer are included: Extended ReChannel is a SystemC
library that can be used to check DRS designs at a high level;
ReSim is a library to support RTL simulation of a DRS reconfiguring
both its logic and state. Through a number of case studies, the
authors demonstrate how their approach integrates seamlessly with
existing, mainstream DRS design flows and with well-established
verification methodologies such as top-down modeling and
coverage-driven verification.
Following in the tradition of its popular predecessor, A Practical Guide to Content Delivery Networks, Second Edition offers an accessible and organized approach to implementing networks capable of handling the increasing data requirements of today's always on mobile society. Describing how content delivery networks (CDN) function, it provides an understanding of Web architecture, as well as an overview of the TCP/IP protocol suite. The book reports on the development of the technologies that have evolved over the past decade as distribution mechanisms for various types of Web content. Using a structural and visual approach, it provides step-by-step guidance through the process of setting up a scalable CDN. Supplies a clear understanding of the framework and individual layers of design, including caching and load balancing Describes the terminology, tactics, and potential problems when implementing a CDN Examines cost-effective ways to load balance web service layers Explains how application servers connect to databases and how systems will scale as volume increases Illustrates the impact of video on data storage and delivery, as well as the need for data compression Covers Flash and the emerging HTML5 standard for video Highlighting the advantages and disadvantages associated with these types of networks, the book explains how to use the networks within the Internet operated by various ISPs as mechanisms for effectively delivering Web server based information. It emphasizes a best-of-breed approach to building your network to allow for an effective CDN to be built on practically any budget. To help you get started, this vendor-neutral reference explains how to code Web pages to optimize the delivery of various types of media. It also includes examples of successful approaches, from outsourcing to do it yourself.
An introductory text to computer architecture, this comprehensive volume covers the concepts from logic gates to advanced computer architecture. It comes with a full spectrum of exercises and web-downloadable support materials, including assembler and simulator, which can be used in the context of different courses. The authors also make available a hardware description, which can be used in labs and assignments, for hands-on experimentation with an actual, simple processor.This unique compendium is a useful reference for undergraduates, graduates and professionals majoring in computer engineering, circuits and systems, software engineering, biomedical engineering and aerospace engineering.Related Link(s)
For any digital TV developer or manager, the maze of standards and specifications related to MHP and OCAP is daunting-you have to patch together pieces from several standards to gather all the necessary knowledge you need to compete worldwide. The standards themselves can be confusing, and contain many inconsistencies and missing pieces. Interactive TV Standards provides a guide for actually deploying these technologies for a broadcaster or product and application developer. Understanding what the APIs do is essential for your job, but understanding how the APIs work and how they relate to each other at a deeper level helps you do it better, faster and easier. Learn how to spot when something that looks like a good solution to a problem really isn't. Understand how the many standards that make up MHP fit together, and implement them effectively and quickly. Two DVB insiders teach you which elements of the standards that are needed for digital TV, highlight those elements that are not needed, and explain the special requirements that MHP places on implementations of these standards. Once you've mastered the basics, you will learn how to develop products for US, European, and Asian markets--saving time and money. By detailing how a team can develop products for both the OCAP and MHP markets, Interactive TV Standards teaches you how to to leverage your experience with one of these standards into the skills and knowledge needed to work with the critical, related standards. Does the team developing a receiver have all the knowledge they need to succeed, or have they missed important information in an apparently unrelated standard? Does an application developer really know how to write a reliable piece of software that runs on any MHP or OCAP receiver? Does the broadcaster understand the business and technical issues well enough to deploy MHP successfully, or will their project fail? Increase your chances of success the first time with Interactive TV Standards.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooperation to develop. Bringing together expertise from technology-oriented sciences, law, philosophy, and social sciences, Managing Trust in Cyberspace addresses fundamental issues underpinning computational trust models and covers trust management processes for dynamic open systems and applications in a tutorial style that aids in understanding. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book also presents a walk-through of online identity management and examines using trust and argumentation in recommender systems. It concludes with a comprehensive survey of anti-forensics for network security and a review of password security and protection. Researchers and practitioners in fields such as distributed computing, Internet technologies, networked systems, information systems, human computer interaction, human behavior modeling, and intelligent informatics especially benefit from a discussion of future trust management research directions including pervasive and ubiquitous computing, wireless ad-hoc and sensor networks, cloud computing, social networks, e-services, P2P networks, near-field communications (NFC), electronic knowledge management, and nano-communication networks.
While there are sporadic journal articles on socio-technical networks, there's long been a need for an integrated resource that addresses concrete socio-technical network (STN) design issues from algorithmic and engineering perspectives. Filling this need, Socio-Technical Networks: Science and Engineering Design provides a complete introduction to the fundamentals of one of the hottest research areas across the social sciences, networking, and computer science-including its definition, historical background, and models. Covering basic STN architecture from a physical/technological perspective, the book considers the system design process in a typical STN, including inputs, processes/actions, and outputs/products. It covers current applications, including transportation networks, energy systems, tele-healthcare, financial networks, and the World Wide Web. A group of STN expert contributors addresses privacy and security topics in the interdependent context of critical infrastructure, which include risk models, trust models, and privacy preserving schemes. Covers the physical and technological designs in a typical STN Considers STN applications in popular fields, such as healthcare and the virtual community Details a method for mapping and measuring complexity, uncertainty, and interactions among STN components The book examines the most important STN models, including graph theory, inferring agent dynamics, decision theory, and information mining. It also explains structural studies, behavioral studies, and agent/actor system studies and policy studies in different STN contexts. Complete with in-depth case studies, this book supplies the practical insight needed to address contemporary STN design issues.
This Open Access book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have emerged particularly within the last five years. This book introduces the most prominent reliability concerns from today's points of view and roughly recapitulates the progress in the community so far. Unlike other books that focus on a single abstraction level such circuit level or system level alone, the focus of this book is to deal with the different reliability challenges across different levels starting from the physical level all the way to the system level (cross-layer approaches). The book aims at demonstrating how new hardware/software co-design solution can be proposed to ef-fectively mitigate reliability degradation such as transistor aging, processor variation, temperature effects, soft errors, etc. Provides readers with latest insights into novel, cross-layer methods and models with respect to dependability of embedded systems; Describes cross-layer approaches that can leverage reliability through techniques that are pro-actively designed with respect to techniques at other layers; Explains run-time adaptation and concepts/means of self-organization, in order to achieve error resiliency in complex, future many core systems.
• Showcases today's most influential architectural voices who have been instrumental in shifting the direction of design in the last decade • Includes perspectives of influential architects, practitioners and academics, as well as critics including philosophers • Case studies and essays engage and deploy a range of topics and technologies from speculative realism and Object Oriented Ontology to high computation, Big Data, parametricism, digital fabrication, artificial intelligence, augmented reality and virtual reality • A rigorous account of architecture's theoretical and technological concerns over the last decade
Recent developments in computer communications and networks have enabled the deployment of exciting new areas such as Internet of Things and collaborative big data analysis. The design and implementation of energy efficient future generation communication and networking technologies also require the clever research and development of mobile, pervasive, and large-scale computing technologies. Advances in Computer Communications and Networks: from Green, Mobile, Pervasive Networking to Big Data Computing studies and presents recent advances in communication and networking technologies reflecting the state-of-the-art research achievements in novel communication technology and network optimization. Technical topics discussed in the book include: Data Center Networks Mobile Ad Hoc Networks Multimedia Networks Internet of Things Wireless Spectrum Network Optimization. This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, electrical engineering and telecommunication systems.
This textbook provides semester-length coverage of computer architecture and design, providing a strong foundation for students to understand modern computer system architecture and to apply these insights and principles to future computer designs. It is based on the author's decades of industrial experience with computer architecture and design, as well as with teaching students focused on pursuing careers in computer engineering. Unlike a number of existing textbooks for this course, this one focuses not only on CPU architecture, but also covers in great detail in system buses, peripherals and memories. This book teaches every element in a computing system in two steps. First, it introduces the functionality of each topic (and subtopics) and then goes into "from-scratch design" of a particular digital block from its architectural specifications using timing diagrams. The author describes how the data-path of a certain digital block is generated using timing diagrams, a method which most textbooks do not cover, but is valuable in actual practice. In the end, the user is ready to use both the design methodology and the basic computing building blocks presented in the book to be able to produce industrial-strength designs.
This book provides readers with a comprehensive, state-of-the-art overview of approximate computing, enabling the design trade-off of accuracy for achieving better power/performance efficiencies, through the simplification of underlying computing resources. The authors describe in detail various efforts to generate approximate hardware systems, while still providing an overview of support techniques at other computing layers. The book is organized by techniques for various hardware components, from basic building blocks to general circuits and systems.
System engineering (SE) using models (MBSE) is currently in vogue in the community of SE practitioners, whether they are analysts, architects, developers or testers. INCOSE has contributed greatly to the definition of a language for the community, henceforth standardized under ISO-19514: SysML. However, this language is not associated by default with any particular MBSE procedure. This is a major difficulty hampering its implementation. In order to overcome this difficulty, this book describes, in addition to the SysML notation, a generic approach based on the main principles of SE and relative standards, serving as the basis for a specific MBSE approach to be built. This is in order to respond to the specificities of the field of projects in which the practitioners evolve. In order to carry out the procedure in a pragmatic way, a simplified but realistic example serves as a guideline from the initial requirements to the validation of the system, putting into action the SysML modeling tool Cameo Systems Modeler by No Magic.
Arcadia is a system engineering method based on the use of models, with a focus on the collaborative definition, evaluation and exploitation of its architecture. This book describes the fundamentals of the method and its contribution to engineering issues such as requirements management, product line, system supervision, and integration, verification and validation (IVV). It provides a reference for the modeling language defined by Arcadia. The author discusses the range of applications, from the assessment of different architectures and their suitability, to the collaboration between system engineering, specialties such as safety or security, subsystems engineering teams, software and hardware. This is illustrated by several examples of representative models which constitute a common thread.
This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.
This essential handbook for the data communications/network manager and planner covers a variety of data communication and IS topics. The Network Manager's Handbook addresses technical issues associated with local and wide area networking, purchasing communications services, supporting the network's users, understanding the telecommunications regulatory environment, personnel issues, and more.
Servers are the heart of the network. The Handbook of Server Management and Administration keeps you up-to-date with the very latest server technology and gives you the tools you need to choose, configure and maintain a server that will serve users, data streams and corporate goals with equal efficiency. The practical tips and case studies you'll find in the Handbook include detailed explanations of: the case for mainframe servers in the enterprise server installation considerations server security policies server data bus standards migrating to NetWare 4.1 and Novell Directory Services Windows NT Workstation vs. Server 4.0 UNIX as an application server fax servers Internet e-mail servers the art of placing images and multimedia on the corporate network and more! The contributing authors to the Handbook of Server Management and Administration are industry experts. Some work at corporations that have designed innovative solutions. Some wear battle scars from the field. Many are experienced writers and public speakers. All of them know what they're talking about. These leading authorities give you a wealth of practical advice, tips and strategies on how to: evaluate anti-virus solutions within distributed environments set up fault tolerance protection and RAID technology for networks choose the best network data and storage management techniques
This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing; Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system; Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.
Systems Architecture Modeling with the Arcadia Method is an illustrative guide for the understanding and implementation of model-based systems and architecture engineering with the Arcadia method, using Capella, a new open-source solution. More than just another systems modeling tool, Capella is a comprehensive and extensible Eclipse application that has been successfully deployed in a wide variety of industrial contexts. Based on a graphical modeling workbench, it provides systems architects with rich methodological guidance using the Arcadia method and modeling language. Intuitive model editing and advanced viewing capabilities improve modeling quality and productivity, and help engineers focus on the design of the system and its architecture. This book is the first to help readers discover the richness of the Capella solution.
Parallel Programming: Concepts and Practice provides an upper level introduction to parallel programming. In addition to covering general parallelism concepts, this text teaches practical programming skills for both shared memory and distributed memory architectures. The authors' open-source system for automated code evaluation provides easy access to parallel computing resources, making the book particularly suitable for classroom settings. |
You may like...
Cyber-Physical Systems for Social…
Maya Dimitrova, Hiroaki Wagatsuma
Hardcover
R6,528
Discovery Miles 65 280
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,281
Discovery Miles 22 810
|