0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (38)
  • R500+ (3,074)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Handbook of Server Management and Administration - 1999 (Hardcover): Kristin B. Marks Handbook of Server Management and Administration - 1999 (Hardcover)
Kristin B. Marks
R7,926 Discovery Miles 79 260 Ships in 10 - 15 working days

Servers are the heart of the network. The Handbook of Server Management and Administration keeps you up-to-date with the very latest server technology and gives you the tools you need to choose, configure and maintain a server that will serve users, data streams and corporate goals with equal efficiency. The practical tips and case studies you'll find in the Handbook include detailed explanations of: the case for mainframe servers in the enterprise server installation considerations server security policies server data bus standards migrating to NetWare 4.1 and Novell Directory Services Windows NT Workstation vs. Server 4.0 UNIX as an application server fax servers Internet e-mail servers the art of placing images and multimedia on the corporate network and more! The contributing authors to the Handbook of Server Management and Administration are industry experts. Some work at corporations that have designed innovative solutions. Some wear battle scars from the field. Many are experienced writers and public speakers. All of them know what they're talking about. These leading authorities give you a wealth of practical advice, tips and strategies on how to: evaluate anti-virus solutions within distributed environments set up fault tolerance protection and RAID technology for networks choose the best network data and storage management techniques

Trust & Fault in Multi Layered Cloud Computing Architecture (Hardcover, 1st ed. 2020): Punit Gupta, Pradeep Kumar Gupta Trust & Fault in Multi Layered Cloud Computing Architecture (Hardcover, 1st ed. 2020)
Punit Gupta, Pradeep Kumar Gupta
R2,665 Discovery Miles 26 650 Ships in 18 - 22 working days

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user. The discussion also includes new algorithms that overcome drawbacks of existing methods, using a performance matrix for each functionality. This book provide readers with an overview of cloud computing and how trust and faults in cloud datacenters affects the performance and quality of service assured to the users. Discusses fundamental issues related to trust and fault-tolerance in Cloud Computing; Describes trust and fault management techniques in multi layered cloud architecture to improve security, reliability and performance of the system; Includes methods to enhance power efficiency and network efficiency, using trust and fault based resource allocation.

Simulation of Local Area Networks (Hardcover): Matthew N.O Sadiku Simulation of Local Area Networks (Hardcover)
Matthew N.O Sadiku
R5,765 Discovery Miles 57 650 Ships in 10 - 15 working days

A fast-growing area in the communications industry is the internetworking of an ever-increasing proliferation of computers, particularly via local area networks (LANs). The LAN is a resource-sharing data communications network being used by many offices to interchange information such as electronic mail, word processing, and files among computers and other devices. This unique book shows the user how to establish the performance characteristics of a LAN before putting it to use in a particular type of situation. Simulation of Local Area Networks consists of eight chapters, each with its own extensive list of references. The first chapter provides a brief review of local area networks, and the second chapter gives the analytical models of popular LANs-token-passing bus and ring networks, CSMA/CD LANs, and star networks. Chapter 3 covers general principles of simulation, and Chapter 4 discusses fundamental concepts in probability and statistics relating to simulation modeling. Materials in Chapters 3 and 4 are specifically applied in developing simulation models on token-passing LANs, CSMA/CD LANs, and star LANs in Chapters 5 through 7. The computer code in Chapters 5, 6, and 7 is divided into segments, and a detailed explanation of each segment is provided. The last chapter reviews special-purpose languages such as GPSS, SIMSCRIPT, GASP, SIMULA, SLAM, and RESQ. Helpful criteria for language selection are included. The entire code is put together in the appendixes. This book has two major advantages over existing texts. First, it uses C, a well-developed general-purpose language that is familiar to most analysts. Second, the text specifically applies the simulation principles to local area networks. No other book available shows the systems analyst how to evaluate the performance of existing or proposed systems under different kinds of conditions.

Principles and Structures of FPGAs (Hardcover, 1st ed. 2018): Hideharu Amano Principles and Structures of FPGAs (Hardcover, 1st ed. 2018)
Hideharu Amano
R4,957 Discovery Miles 49 570 Ships in 10 - 15 working days

This comprehensive textbook on the field programmable gate array (FPGA) covers its history, fundamental knowledge, architectures, device technologies, computer-aided design technologies, design tools, examples of application, and future trends. Programmable logic devices represented by FPGAs have been rapidly developed in recent years and have become key electronic devices used in most IT products. This book provides both complete introductions suitable for students and beginners, and high-level techniques useful for engineers and researchers in this field. Differently developed from usual integrated circuits, the FPGA has unique structures, design methodologies, and application techniques. Allowing programming by users, the device can dramatically reduce the rising cost of development in advanced semiconductor chips. The FPGA is now driving the most advanced semiconductor processes and is an all-in-one platform combining memory, CPUs, and various peripheral interfaces. This book introduces the FPGA from various aspects for readers of different levels. Novice learners can acquire a fundamental knowledge of the FPGA, including its history, from Chapter 1; the first half of Chapter 2; and Chapter 4. Professionals who are already familiar with the device will gain a deeper understanding of the structures and design methodologies from Chapters 3 and 5. Chapters 6-8 also provide advanced techniques and cutting-edge applications and trends useful for professionals. Although the first parts are mainly suitable for students, the advanced sections of the book will be valuable for professionals in acquiring an in-depth understanding of the FPGA to maximize the performance of the device.

Advanced Simulation and Test Methodologies for VLSI Design (Hardcover, 1989 ed.): G. Russell, I.L. Sayers Advanced Simulation and Test Methodologies for VLSI Design (Hardcover, 1989 ed.)
G. Russell, I.L. Sayers
R4,221 Discovery Miles 42 210 Ships in 18 - 22 working days
The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Paperback): Catarina... The Dialogical Roots of Deduction - Historical, Cognitive, and Philosophical Perspectives on Reasoning (Paperback)
Catarina Dutilh Novaes
R811 Discovery Miles 8 110 Ships in 10 - 15 working days

This comprehensive account of the concept and practices of deduction is the first to bring together perspectives from philosophy, history, psychology and cognitive science, and mathematical practice. Catarina Dutilh Novaes draws on all of these perspectives to argue for an overarching conceptualization of deduction as a dialogical practice: deduction has dialogical roots, and these dialogical roots are still largely present both in theories and in practices of deduction. Dutilh Novaes' account also highlights the deeply human and in fact social nature of deduction, as embedded in actual human practices; as such, it presents a highly innovative account of deduction. The book will be of interest to a wide range of readers, from advanced students to senior scholars, and from philosophers to mathematicians and cognitive scientists.

Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis - A Transfer Function Approach (Hardcover, 2nd ed. 2023):... Fundamentals of Modern Electric Circuit Analysis and Filter Synthesis - A Transfer Function Approach (Hardcover, 2nd ed. 2023)
Afshin Izadian
R2,502 Discovery Miles 25 020 Ships in 18 - 22 working days

This textbook explains the fundamentals of electric circuits and uses the transfer function as a tool to analyze circuits, systems, and filters. The author avoids the Fourier transform, since this topic is often not taught in circuits courses. General transfer functions for low pass, high pass, band pass and band reject filters are demonstrated, with first order and higher order filters explained in plain language. The author's presentation is designed to be accessible to a broad audience, with the concepts of circuit analysis explained in basic language, reinforced by numerous, solved examples.

Smart Sensors Networks - Communication Technologies and Intelligent Applications (Paperback): Fatos Xhafa, Fang-Yie Leu,... Smart Sensors Networks - Communication Technologies and Intelligent Applications (Paperback)
Fatos Xhafa, Fang-Yie Leu, Li-Ling Hung
R2,842 R2,647 Discovery Miles 26 470 Save R195 (7%) Ships in 10 - 15 working days

Smart Sensors Networks: Communication Technologies and Intelligent Applications explores the latest sensor and sensor networks techniques and applications, showing how networked wireless sensors are used to monitor and gather intelligence from our surrounding environment. It provides a systematic look at the unique characteristics of wireless sensor networks through their usage in a broad range of areas, including healthcare for the elderly, energy consumption, industrial automation, intelligent transportation systems, smart homes and cities, and more. The book shows how sensor-networks work and how they are applied to monitor our surrounding environment. It explores the most important aspects of modern sensors technologies, providing insights on the newest technologies and the systems needed to operate them. Readers will find the book to be an entry point for understanding the fundamental differences between the various sensor technologies and their use in for different scenarios. Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

Network and Data Security for Non-Engineers (Hardcover): Frank M. Groom, Kevin Groom, Stephan S. Jones Network and Data Security for Non-Engineers (Hardcover)
Frank M. Groom, Kevin Groom, Stephan S. Jones
R5,351 Discovery Miles 53 510 Ships in 10 - 15 working days

Learn network and data security by analyzing the Anthem breach and step-by-step how hackers gain entry, place hidden software, download information, and hide the evidence of their entry. Understand the tools, establishing persistent presence, use of sites as testbeds to determine successful variations of software that elude detection, and reaching out across trusted connections to the entire healthcare system of the nation. Examine the components of technology being diverted, starting with application code and how to protect it with isolation approaches. Dissect forms of infections including viruses, worms, bots, and Trojans; and encryption with RSA algorithm as the working example.

The End of Error - Unum Computing (Hardcover): John L. Gustafson The End of Error - Unum Computing (Hardcover)
John L. Gustafson
R5,795 Discovery Miles 57 950 Ships in 10 - 15 working days

The Future of Numerical Computing Written by one of the foremost experts in high-performance computing and the inventor of Gustafson's Law, The End of Error: Unum Computing explains a new approach to computer arithmetic: the universal number (unum). The unum encompasses all IEEE floating-point formats as well as fixed-point and exact integer arithmetic. This new number type obtains more accurate answers than floating-point arithmetic yet uses fewer bits in many cases, saving memory, bandwidth, energy, and power. A Complete Revamp of Computer Arithmetic from the Ground Up Richly illustrated in color, this groundbreaking book represents a fundamental change in how to perform calculations automatically. It illustrates how this novel approach can solve problems that have vexed engineers and scientists for decades, including problems that have been historically limited to serial processing. Suitable for Anyone Using Computers for Calculations The book is accessible to anyone who uses computers for technical calculations, with much of the book only requiring high school math. The author makes the mathematics interesting through numerous analogies. He clearly defines jargon and uses color-coded boxes for mathematical formulas, computer code, important descriptions, and exercises.

Building an Information Security Awareness Program (Hardcover): Mark B. Desman Building an Information Security Awareness Program (Hardcover)
Mark B. Desman
R5,068 Discovery Miles 50 680 Ships in 10 - 15 working days

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions. Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step through the methodology for developing, distributing, and monitoring an information security awareness program. It includes detailed instructions on determining what media to use and where to locate it, and it describes how to efficiently use outside sources to optimize the output of a small staff. The author stresses the importance of security and the entire organizations' role and responsibility in protecting it. He presents the material in a fashion that makes it easy for nontechnical staff members to grasp the concepts. These attributes render Building an Information Security Awareness Program an immensely valuable reference in the arsenal of the IS professional.

Securing and Controlling Cisco Routers (Hardcover): Peter T. Davis Securing and Controlling Cisco Routers (Hardcover)
Peter T. Davis
R5,130 Discovery Miles 51 300 Ships in 10 - 15 working days

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.

Network and Application Security - Fundamentals and Practices (Hardcover): Debashis Ganguly Network and Application Security - Fundamentals and Practices (Hardcover)
Debashis Ganguly
R5,758 Discovery Miles 57 580 Ships in 10 - 15 working days

To deal with security issues effectively, knowledge of theories alone is not sufficient. Practical experience is essential. Helpful for beginners and industry practitioners, this book develops a concrete outlook, providing readers with basic concepts and an awareness of industry standards and best practices. Chapters address cryptography and network security, system-level security, and applications for network security. The book also examines application level attacks, practical software security, and securing application-specific networks. Ganguly Debashis speaks about Network and Application Security

Ethical Hacking and Penetration Testing Guide (Hardcover): Rafay Baloch Ethical Hacking and Penetration Testing Guide (Hardcover)
Rafay Baloch
R5,353 Discovery Miles 53 530 Ships in 10 - 15 working days

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each of the steps and tools in a structured, orderly manner allowing you to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process will allow you to clearly see how the various tools and phases relate to each other. An ideal resource for those who want to learn about ethical hacking but don't know where to start, this book will help take your hacking skills to the next level. The topics described in this book comply with international standards and with what is being taught in international certifications.

Communication Architectures for Systems-on-Chip (Paperback): Jose L. Ayala Communication Architectures for Systems-on-Chip (Paperback)
Jose L. Ayala
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

A presentation of state-of-the-art approaches from an industrial applications perspective, Communication Architectures for Systems-on-Chip shows professionals, researchers, and students how to attack the problem of data communication in the manufacture of SoC architectures. With its lucid illustration of current trends and research improving the performance, quality, and reliability of transactions, this is an essential reference for anyone dealing with communication mechanisms for embedded systems, systems-on-chip, and multiprocessor architectures-or trying to overcome existing limitations. Exploring architectures currently implemented in manufactured SoCs-and those being proposed-this book analyzes a wide range of applications, including: Well-established communication buses Less common networks-on-chip Modern technologies that include the use of carbon nanotubes (CNTs) Optical links used to speed up data transfer and boost both security and quality of service (QoS) The book's contributors pay special attention to newer problems, including how to protect transactions of critical on-chip information (personal data, security keys, etc.) from an external attack. They examine mechanisms, revise communication protocols involved, and analyze overall impact on system performance.

Op Amps: Design, Application, and Troubleshooting (Paperback, 2nd edition): David Terrell Op Amps: Design, Application, and Troubleshooting (Paperback, 2nd edition)
David Terrell
R3,127 Discovery Miles 31 270 Ships in 18 - 22 working days

OP Amps deliberately straddles that imaginary line between the technician and engineering worlds. Topics are carefully addressed on three levels: operational overview, numerical analysis, and design procedures. Troubleshooting techniques are presented that rely on the application of fundamental electronics principles. Systematic methods are shown that can be used to diagnose defects in many kinds of circuits that employ operational amplifiers.
One of the book's greatest strengths is the easy-to-read conversational
writing style. The author speaks directly to the student in a manner that encourages learning. This book explains the technical details of operational amplifier circuits in clear and understandable language without sacrificing technical depth.
Easy-to-read conversational style communicates procedures an technical details in simple language.
Three levels of technical material: operational overview, manericall analysis, and design procedures.
Mathematics limited to algebraic manipulation.

Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback): Daniel Minoli Designing Green Networks and Network Operations - Saving Run-the-Engine Costs (Paperback)
Daniel Minoli
R2,287 Discovery Miles 22 870 Ships in 10 - 15 working days

In recent years, socio-political trends toward environmental responsibility and the pressing need to reduce Run-the-Engine (RTE) costs have resulted in the concept of Green IT. Although a significant amount of energy is used to operate routing, switching, and transmission equipment, comparatively less attention has been paid to Green Networking. A clear and concise introduction to green networks and green network operations, Designing Green Networks and Network Operations: Saving Run-the-Engine Costs guides you through the techniques available to achieve efficiency goals for corporate and carrier networks, including deploying more efficient hardware, blade form-factor routers and switches, and pursuing consolidation, virtualization, and network and cloud computing. The book: Delineates techniques to minimize network power, cooling, floor space, and online storage while optimizing service performance, capacity, and availability Discusses virtualization, network computing, and Web services as approaches for green data centers and networks Emphasizes best practices and compliance with international standards for green operations Extends the green data center techniques to the networking environment Incorporates green principles in the intranet, extranet, and the entire IT infrastructures Reviews networking, power management, HVAC and CRAC basics Presents methodical steps toward a seamless migration to Green IT and Green Networking

Location-Based Services Handbook - Applications, Technologies, and Security (Paperback): Syed Ahson, Mohammad Ilyas Location-Based Services Handbook - Applications, Technologies, and Security (Paperback)
Syed Ahson, Mohammad Ilyas
R2,270 Discovery Miles 22 700 Ships in 10 - 15 working days

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks. It is a self-contained, comprehensive resource that presents: A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networks-and its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users. This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections-applications, technologies, and security-this material fully covers various location-based applications and the impact they will have on the future.

Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback): Jingzhao Ou, Viktor K. Prasanna Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware (Paperback)
Jingzhao Ou, Viktor K. Prasanna
R2,343 Discovery Miles 23 430 Ships in 10 - 15 working days

Rapid energy estimation for energy efficient applications using field-programmable gate arrays (FPGAs) remains a challenging research topic. Energy dissipation and efficiency have prevented the widespread use of FPGA devices in embedded systems, where energy efficiency is a key performance metric. Helping overcome these challenges, Energy Efficient Hardware-Software Co-Synthesis Using Reconfigurable Hardware offers solutions for the development of energy efficient applications using FPGAs. The book integrates various high-level abstractions for describing hardware and software platforms into a single, consistent application development framework, enabling users to construct, simulate, and debug systems. Based on these high-level concepts, it proposes an energy performance modeling technique to capture the energy dissipation behavior of both the reconfigurable hardware platform and the target applications running on it. The authors also present a dynamic programming-based algorithm to optimize the energy performance of an application running on a reconfigurable hardware platform. They then discuss an instruction-level energy estimation technique and a domain-specific modeling technique to provide rapid and fairly accurate energy estimation for hardware-software co-designs using reconfigurable hardware. The text concludes with example designs and illustrative examples that show how the proposed co-synthesis techniques lead to a significant amount of energy reduction. This book explores the advantages of using reconfigurable hardware for application development and looks ahead to future research directions in the field. It outlines the range of aspects and steps that lead to an energy efficient hardware-software application synthesis using FPGAs.

Synchronization and Control of Multiagent Systems (Paperback): Dong Sun Synchronization and Control of Multiagent Systems (Paperback)
Dong Sun
R2,400 Discovery Miles 24 000 Ships in 10 - 15 working days

Multiple intelligent agent systems are commonly used in research requiring complex behavior. Synchronization control provides an advantage in solving the problem of multi-agent coordination. This book focuses on the use of synchronization control to coordinate the group behavior of multiple agents. The author includes numerous real-world application examples from robotics, automation, and advanced manufacturing. Giving a detailed look at cross-coupling based synchronization control, the text covers such topics as adaptive synchronization control, synchronous tracking control of parallel manipulators, and minimization of contouring errors of CNC machine tools with synchronization controls.

Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback): Florin Balasa,... Energy-Aware Memory Management for Embedded Multimedia Systems - A Computer-Aided Design Approach (Paperback)
Florin Balasa, Dhiraj K. Pradhan
R2,303 Discovery Miles 23 030 Ships in 10 - 15 working days

Energy-Aware Memory Management for Embedded Multimedia Systems: A Computer-Aided Design Approach presents recent computer-aided design (CAD) ideas that address memory management tasks, particularly the optimization of energy consumption in the memory subsystem. It explains how to efficiently implement CAD solutions, including theoretical methods and novel algorithms. The book covers various energy-aware design techniques, including data-dependence analysis techniques, memory size estimation methods, extensions of mapping approaches, and memory banking approaches. It shows how these techniques are used to evaluate the data storage of an application, reduce dynamic and static energy consumption, design energy-efficient address generation units, and much more. Providing an algebraic framework for memory management tasks, this book illustrates how to optimize energy consumption in memory subsystems using CAD solutions. The algorithmic style of the text should help electronic design automation (EDA) researchers and tool developers create prototype software tools for system-level exploration, with the goal to ultimately obtain an optimized architectural solution of the memory subsystem.

Parallel Machines: Parallel Machine Languages - The Emergence of Hybrid Dataflow Computer Architectures (Hardcover, 1990 ed.):... Parallel Machines: Parallel Machine Languages - The Emergence of Hybrid Dataflow Computer Architectures (Hardcover, 1990 ed.)
Robert A. Iannucci
R4,130 Discovery Miles 41 300 Ships in 18 - 22 working days

It is universally accepted today that parallel processing is here to stay but that software for parallel machines is still difficult to develop. However, there is little recognition of the fact that changes in processor architecture can significantly ease the development of software. In the seventies the availability of processors that could address a large name space directly, eliminated the problem of name management at one level and paved the way for the routine development of large programs. Similarly, today, processor architectures that can facilitate cheap synchronization and provide a global address space can simplify compiler development for parallel machines. If the cost of synchronization remains high, the pro gramming of parallel machines will remain significantly less abstract than programming sequential machines. In this monograph Bob Iannucci presents the design and analysis of an architecture that can be a better building block for parallel machines than any von Neumann processor. There is another very interesting motivation behind this work. It is rooted in the long and venerable history of dataflow graphs as a formalism for ex pressing parallel computation. The field has bloomed since 1974, when Dennis and Misunas proposed a truly novel architecture using dataflow graphs as the parallel machine language. The novelty and elegance of dataflow architectures has, however, also kept us from asking the real question: "What can dataflow architectures buy us that von Neumann ar chitectures can't?" In the following I explain in a round about way how Bob and I arrived at this question."

Cloud Computing and Software Services - Theory and Techniques (Paperback): Syed A. Ahson, Mohammad Ilyas Cloud Computing and Software Services - Theory and Techniques (Paperback)
Syed A. Ahson, Mohammad Ilyas
R2,288 Discovery Miles 22 880 Ships in 10 - 15 working days

Whether you're already in the cloud, or determining whether or not it makes sense for your organization, Cloud Computing and Software Services: Theory and Techniques provides the technical understanding needed to develop and maintain state-of-the-art cloud computing and software services. From basic concepts and recent research findings to future directions, it gathers the insight of 50 experts from around to present a global perspective on the range of technical topics related to cloud computing and Software as a Service (SaaS). The book also: Reviews real cases and applications of cloud computing Discusses the infrastructure cloud and Infrastructure as a Service (IaaS) Considers data- and compute-intensive environments Examines security and reliability in the cloud Witten in a manner that makes this complex subject easy to understand, this is an ideal one-stop reference for anyone interested in cloud computing. The accessible language and wealth of illustrations also make it suitable for academic and research-oriented settings. The comprehensive coverage supplies you with the understanding of cloud computing technologies and trends in parallel computing needed to establish and maintain effective and efficient computing and software services.

Scientific Computing with Multicore and Accelerators (Paperback): Jakub Kurzak, David A. Bader, Jack Dongarra Scientific Computing with Multicore and Accelerators (Paperback)
Jakub Kurzak, David A. Bader, Jack Dongarra
R2,305 Discovery Miles 23 050 Ships in 10 - 15 working days

The hybrid/heterogeneous nature of future microprocessors and large high-performance computing systems will result in a reliance on two major types of components: multicore/manycore central processing units and special purpose hardware/massively parallel accelerators. While these technologies have numerous benefits, they also pose substantial performance challenges for developers, including scalability, software tuning, and programming issues. Researchers at the Forefront Reveal Results from Their Own State-of-the-Art Work Edited by some of the top researchers in the field and with contributions from a variety of international experts, Scientific Computing with Multicore and Accelerators focuses on the architectural design and implementation of multicore and manycore processors and accelerators, including graphics processing units (GPUs) and the Sony Toshiba IBM (STI) Cell Broadband Engine (BE) currently used in the Sony PlayStation 3. The book explains how numerical libraries, such as LAPACK, help solve computational science problems; explores the emerging area of hardware-oriented numerics; and presents the design of a fast Fourier transform (FFT) and a parallel list ranking algorithm for the Cell BE. It covers stencil computations, auto-tuning, optimizations of a computational kernel, sequence alignment and homology, and pairwise computations. The book also evaluates the portability of drug design applications to the Cell BE and illustrates how to successfully exploit the computational capabilities of GPUs for scientific applications. It concludes with chapters on dataflow frameworks, the Charm++ programming model, scan algorithms, and a portable intracore communication framework. Explores the New Computational Landscape of Hybrid Processors By offering insight into the process of constructing and effectively using the technology, this volume provides a thorough and practical introduction to the area of hybrid computing. It discusses introductory concepts and simple examples of parallel computing, logical and performance debugging for parallel computing, and advanced topics and issues related to the use and building of many applications.

RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Paperback): Yan Zhang, Laurence T. Yang,... RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Paperback)
Yan Zhang, Laurence T. Yang, Jiming Chen
R2,202 Discovery Miles 22 020 Ships in 10 - 15 working days

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for a resource that brings together timely coverage of RFIS, Sensor Networks, and their integration. Filling this need, RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insights into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples. This forward looking resource details the enhanced visibility and monitoring capabilities that are possible with RFID and WSNs and highlights contemporary applications including smart homes, surveillance systems, and personal health care. Providing a complete understanding of the essential fundamentals behind RFID and WSNs, this book will help you foster the skills needed to materialize the enhancements possible when these two promising technologies are used together.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Proverbs - Believers Church Bible…
John W Miller Paperback R576 Discovery Miles 5 760
End Times - Birth Pains of the Golden…
Peter I Koenig Von Deutschland Hardcover R1,176 R1,054 Discovery Miles 10 540
Jonathan Edwards and the Psalms - A…
David P. Barshinger Hardcover R2,895 Discovery Miles 28 950
Grace Abounding to the Chief of Sinners…
John Bunyan Hardcover R911 Discovery Miles 9 110
Disruptive Grace - Reflections on God…
Walter Brueggemann, Carolyn J. Sharp Hardcover R1,071 Discovery Miles 10 710
Goliath Must Fall Bible Study Guide plus…
Louie Giglio Paperback R427 R392 Discovery Miles 3 920
The Emerald Tablet of Hermes & The…
Hermes Trismegistus, The Three Initiates Paperback R296 Discovery Miles 2 960
Homilies on the Gospel of John 1 - 40…
Edmund Augustine Paperback R1,130 R964 Discovery Miles 9 640
Leviticus - A Commentary in the Wesleyan…
Thomas J King Paperback R790 R694 Discovery Miles 6 940
Genesis 1-11 - A Commentary in the…
Joseph Coleson Paperback R795 R698 Discovery Miles 6 980

 

Partners