0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (38)
  • R500+ (3,096)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Computer architecture & logic design

Parallel Computers 2 - Architecture, Programming and Algorithms (Paperback): R.W. Hockney, C.R. Jesshope Parallel Computers 2 - Architecture, Programming and Algorithms (Paperback)
R.W. Hockney, C.R. Jesshope
R1,792 Discovery Miles 17 920 Ships in 10 - 15 working days

Since the publication of the first edition, parallel computing technology has gained considerable momentum. A large proportion of this has come from the improvement in VLSI techniques, offering one to two orders of magnitude more devices than previously possible. A second contributing factor in the fast development of the subject is commercialization. The supercomputer is no longer restricted to a few well-established research institutions and large companies. A new computer breed combining the architectural advantages of the supercomputer with the advance of VLSI technology is now available at very attractive prices. A pioneering device in this development is the transputer, a VLSI processor specifically designed to operate in large concurrent systems. Parallel Computers 2: Architecture, Programming and Algorithms reflects the shift in emphasis of parallel computing and tracks the development of supercomputers in the years since the first edition was published. It looks at large-scale parallelism as found in transputer ensembles. This extensively rewritten second edition includes major new sections on the transputer and the OCCAM language. The book contains specific information on the various types of machines available, details of computer architecture and technologies, and descriptions of programming languages and algorithms. Aimed at an advanced undergraduate and postgraduate level, this handbook is also useful for research workers, machine designers, and programmers concerned with parallel computers. In addition, it will serve as a guide for potential parallel computer users, especially in disciplines where large amounts of computer time are regularly used.

Approximate Computing Techniques - From Component- to Application-Level (Hardcover, 1st ed. 2022): Alberto Bosio, Daniel... Approximate Computing Techniques - From Component- to Application-Level (Hardcover, 1st ed. 2022)
Alberto Bosio, Daniel Menard, Olivier Sentieys
R3,378 Discovery Miles 33 780 Ships in 10 - 15 working days

This book serves as a single-source reference to the latest advances in Approximate Computing (AxC), a promising technique for increasing performance or reducing the cost and power consumption of a computing system. The authors discuss the different AxC design and validation techniques, and their integration. They also describe real AxC applications, spanning from mobile to high performance computing and also safety-critical applications.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

What is a Logical System? (Hardcover, New): D. M. Gabbay What is a Logical System? (Hardcover, New)
D. M. Gabbay
R5,312 Discovery Miles 53 120 Ships in 10 - 15 working days

This superb collection of papers focuses on a fundamental question in logic and computation: What is a logical system? With contributions from leading researchers--including Ian Hacking, Robert Kowalski, Jim Lambek, Neil Tennent, Arnon Avron, L. Farinas del Cerro, Kosta Dosen, and Solomon Feferman--the book presents a wide range of views on how to answer such a question, reflecting current, mainstream approaches to logic and its applications. Written to appeal to a diverse audience of readers, What is a Logical System? will excite discussion among students, teachers, and researchers in mathematics, logic, computer science, philosophy, and linguistics.

The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback): Wu-chun Feng The Green Computing Book - Tackling Energy Efficiency at Large Scale (Paperback)
Wu-chun Feng
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

State-of-the-Art Approaches to Advance the Large-Scale Green Computing Movement Edited by one of the founders and lead investigator of the Green500 list, The Green Computing Book: Tackling Energy Efficiency at Large Scale explores seminal research in large-scale green computing. It begins with low-level, hardware-based approaches and then traverses up the software stack with increasingly higher-level, software-based approaches. In the first chapter, the IBM Blue Gene team illustrates how to improve the energy efficiency of a supercomputer by an order of magnitude without any system performance loss in parallelizable applications. The next few chapters explain how to enhance the energy efficiency of a large-scale computing system via compiler-directed energy optimizations, an adaptive run-time system, and a general prediction performance framework. The book then explores the interactions between energy management and reliability and describes storage system organization that maximizes energy efficiency and reliability. It also addresses the need for coordinated power control across different layers and covers demand response policies in computing centers. The final chapter assesses the impact of servers on data center costs.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,218 Discovery Miles 32 180 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021): Basel Halak Hardware Supply Chain Security - Threat Modelling, Emerging Attacks and Countermeasures (Hardcover, 1st ed. 2021)
Basel Halak
R3,118 Discovery Miles 31 180 Ships in 18 - 22 working days

This book presents a new threat modelling approach that specifically targets the hardware supply chain, covering security risks throughout the lifecycle of an electronic system. The authors present a case study on a new type of security attack, which combines two forms of attack mechanisms from two different stages of the IC supply chain. More specifically, this attack targets the newly developed, light cipher (Ascon) and demonstrates how it can be broken easily, when its implementation is compromised with a hardware Trojan. This book also discusses emerging countermeasures, including anti-counterfeit design techniques for resources constrained devices and anomaly detection methods for embedded systems.

Embedded Linux System Design and Development (Hardcover): P. Raghavan, Amol Lad, Sriram Neelakandan Embedded Linux System Design and Development (Hardcover)
P. Raghavan, Amol Lad, Sriram Neelakandan
R3,676 Discovery Miles 36 760 Ships in 10 - 15 working days

Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications. This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.

Energy Limits in Computation - A Review of Landauer's Principle, Theory and Experiments (Hardcover, 1st ed. 2019): Craig... Energy Limits in Computation - A Review of Landauer's Principle, Theory and Experiments (Hardcover, 1st ed. 2019)
Craig S. Lent, Alexei O. Orlov, Wolfgang Porod, Gregory L. Snider
R4,226 Discovery Miles 42 260 Ships in 10 - 15 working days

This book is a single-source reference to the issues involved in the Landauer principle, which has gained new prominence recently, due to the large amount of heat generated by today's computers. If Landauer's principle is correct, there may be ways to build computers that dissipate far less power (corresponding to heat generated) than today's computers. This book brings together all sides of the discussions regarding Landauer's principle, both theoretical and experimental, empowering readers to gain better understanding of dissipation in computation, and the limits if any to progress in computation related to energy dissipation. It represents the best and most thorough examination of the important issue of Landauer's principle that is available in one volume. Provides an in-depth investigation of the Landauer principle and how it relates to the possible existence of lower bounds on dissipation in computation; Gathers together both sides of the discussion: those who agree with Landauer and his conclusions, and those who think that Landauer was not correct, offering fresh perspective on the issues in the new light of experiments; Offers insight into the future of silicon CMOS and the limits if any to progress in computation related to energy dissipation.

The Future X Network - A Bell Labs Perspective (Paperback): Marcus K. Weldon The Future X Network - A Bell Labs Perspective (Paperback)
Marcus K. Weldon
R1,415 Discovery Miles 14 150 Ships in 10 - 15 working days

We are at the dawn of an era in networking that has the potential to define a new phase of human existence. This era will be shaped by the digitization and connection of everything and everyone with the goal of automating much of life, effectively creating time by maximizing the efficiency of everything we do and augmenting our intelligence with knowledge that expedites and optimizes decision-making and everyday routines and processes. The Future X Network: A Bell Labs Perspective outlines how Bell Labs sees this future unfolding and the key technological breakthroughs needed at both the architectural and systems levels. Each chapter of the book is dedicated to a major area of change and the network and systems innovation required to realize the technological revolution that will be the essential product of this new digital future.

Architecting Enterprise Solutions - Patterns for High-capability Internet-based Systems (Hardcover): P. Dyson Architecting Enterprise Solutions - Patterns for High-capability Internet-based Systems (Hardcover)
P. Dyson
R873 R711 Discovery Miles 7 110 Save R162 (19%) Ships in 10 - 15 working days

Companies increasingly rely on systems that are secure, flexible and available 24x7. They are often developed in a very short time frame with changing requirements and increasing levels of complexity. Despite this, they must still display acceptable levels of performance, availability, scalability, security and a variety of other non-functional characteristics. These requirements need to be addressed in every part of the system including hardware, software, network topology and system configuration.

"Architecting Enterprise Solutions" is based on real world problems and systems. It takes a practical approach to architectural solutions giving step-by-step advice on how to design high performance, controllable and flexible systems. Design patterns provide a platform-independent way to show tried and tested solutions to common pitfalls and problems encountered when developing high-capability systems. The running case study illustrates the evolution of a system as it grows in functionality and capability, and each chapter closes with a new evolutionary variant of the overall system, illustrating its improved cap abilities.

Whether you are looking to gain insight into architectural problems and solutions or in need of practical help in day-to-day system construction, Paul Dyson and Andy Longshaw provide a practical and solution-focused aid to architecting enterprise solutions.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,310 Discovery Miles 13 100 Ships in 10 - 15 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Optical Networks and Components - Fundamentals and Advances (Hardcover): Partha Pratim Sahu Optical Networks and Components - Fundamentals and Advances (Hardcover)
Partha Pratim Sahu
R6,605 Discovery Miles 66 050 Ships in 10 - 15 working days

Intended as an undergraduate/post graduate level textbook for courses on high speed optical networks as well as computer networks. Nine chapters cover basic principles of the technology and different devices for optical networks, as well as processing of integrated waveguide devices of optical networks using different technologies. It provides students, researchers and practicing engineers with an expert guide to the fundamental concepts, issues and state of the art developments in optical networks. Includes examples throughout all the chapters of the book to aid understanding of basic problems and solutions.

Quantum Computing - A pathway to quantum logic design (Hardcover): Hafiz Md. Hasan Babu Quantum Computing - A pathway to quantum logic design (Hardcover)
Hafiz Md. Hasan Babu
R4,001 R3,276 Discovery Miles 32 760 Save R725 (18%) Ships in 10 - 15 working days
Time & Logic - A Computational Approach (Hardcover): Leonard Bolc, Andrzej Szalas Time & Logic - A Computational Approach (Hardcover)
Leonard Bolc, Andrzej Szalas
R3,807 Discovery Miles 38 070 Ships in 10 - 15 working days

Originally published in 1995 Time and Logic examines understanding and application of temporal logic, presented in computational terms. The emphasis in the book is on presenting a broad range of approaches to computational applications. The techniques used will also be applicable in many cases to formalisms beyond temporal logic alone, and it is hoped that adaptation to many different logics of program will be facilitated. Throughout, the authors have kept implementation-orientated solutions in mind. The book begins with an introduction to the basic ideas of temporal logic. Successive chapters examine particular aspects of the temporal theoretical computing domain, relating their applications to familiar areas of research, such as stochastic process theory, automata theory, established proof systems, model checking, relational logic and classical predicate logic. This is an essential addition to the library of all theoretical computer scientists. It is an authoritative work which will meet the needs both of those familiar with the field and newcomers to it.

Parallel and Distributed Simulation Systems (Hardcover): RM Fujimoto Parallel and Distributed Simulation Systems (Hardcover)
RM Fujimoto
R4,371 Discovery Miles 43 710 Ships in 10 - 15 working days

A state-of-the-art guide for the implementation of distributed simulation technology.

The rapid expansion of the Internet and commodity parallel computers has made parallel and distributed simulation (PADS) a hot technology indeed. Applications abound not only in the analysis of complex systems such as transportation or the next-generation Internet, but also in computer-generated virtual worlds for military and professional training, interactive computer games, and the entertainment industry.

In this book, PADS expert Richard M. Fujimoto provides software developers with cutting-edge techniques for speeding up the execution of simulations across multiple processors and dealing with data distribution over wide area networks ,including the Internet. With an emphasis on parallel and distributed discrete event simulation technologies, Dr. Fujimoto compiles and consolidates research results in the field spanning the last twenty years, discussing the use of parallel and distributed computers in both the modeling and analysis of system behavior and the creation of distributed virtual environments.

While other books on PADS concentrate on applications, Parallel and Distributed Simulation Systems clearly shows how to implement the technology. It explains in detail the synchronization algorithms needed to properly realize the simulations, including an in-depth discussion of time warp and advanced optimistic techniques. Finally, the book is richly supplemented with references, tables and illustrations, and examples of contemporary systems such as the Department of Defense's High Level Architecture (HLA), which has become the standard architecture for defense programs in the United States.

Lightweight Enterprise Architectures (Hardcover, New): Fenix Theuerkorn Lightweight Enterprise Architectures (Hardcover, New)
Fenix Theuerkorn
R2,368 Discovery Miles 23 680 Ships in 10 - 15 working days

The author developed Lightweight Enterprise Architecture (LEA) to enable a quick alignment of technology to business strategy. LEA's simple and effective framework makes it useful to a wide audience of users throughout an enterprise, coordinating resources for business requirements and facilitating optimal adoption of technology. Lightweight Enterprise Architectures provides a methodology and philosophy that organizations can easily adopt, resulting in immediate value-add without the pitfalls of traditional architectural styles. This systematic approach uses the right balance of tools and techniques to help an enterprise successfully develop its architecture. The first section of the text focuses on how enterprises deploy architecture and how architecture is an evolving discipline. The second section introduces LEA, detailing a structure that supports architecture and benefits all stakeholders. The book concludes by explaining the approach needed to put the framework into practice, analyzing deployment issues and how the architecture is involved throughout the lifecycle of technology projects and systems. This innovative resource tool provides you with a simpler, easily executable architecture, the ability to embrace a complex environment, and a framework to measure and control technology at the enterprise level.

Advances in High Performance Computing - Proceedings of the NATO Advanced Research Workshop on High Performance Computing -... Advances in High Performance Computing - Proceedings of the NATO Advanced Research Workshop on High Performance Computing - Technology and Applications, Cetraro, Italy, 24-26 June 1996 (Hardcover)
Lucio Grandinetti, Etc
R2,484 Discovery Miles 24 840 Ships in 18 - 22 working days

The book discusses some key scientific and technological developments in high performance computing, identifies significant trends, and defines desirable research objectives. It covers general concepts and emerging systems, software technology, algorithms and applications. Coverage includes hardware, software tools, networks and numerical methods, new computer architectures, and a discussion of future trends. Beyond purely scientific/engineering computing, the book extends to coverage of enterprise-wide, commercial applications, including papers on performance and scalability of database servers and Oracle DBM systems. Audience: Most papers are research level, but some are suitable for computer literate managers and technicians, making the book useful to users of commercial parallel computers.

Introduction to Grid Computing (Paperback): Frederic Magoules, Jie Pan, Kiat-An Tan, Abhinit Kumar Introduction to Grid Computing (Paperback)
Frederic Magoules, Jie Pan, Kiat-An Tan, Abhinit Kumar
R1,876 Discovery Miles 18 760 Ships in 10 - 15 working days

A Thorough Overview of the Next Generation in Computing Poised to follow in the footsteps of the Internet, grid computing is on the verge of becoming more robust and accessible to the public in the near future. Focusing on this novel, yet already powerful, technology, Introduction to Grid Computing explores state-of-the-art grid projects, core grid technologies, and applications of the grid. After comparing the grid with other distributed systems, the book covers two important aspects of a grid system: scheduling of jobs and resource discovery and monitoring in grid. It then discusses existing and emerging security technologies, such as WS-Security and OGSA security, as well as the functions of grid middleware at a conceptual level. The authors also describe famous grid projects, demonstrate the pricing of European options through the use of the Monte Carlo method on grids, and highlight different parallelization possibilities on the grid. Taking a tutorial approach, this concise book provides a complete introduction to the components of the grid architecture and applications of grid computing. It expertly shows how grid computing can be used in various areas, from computational mechanics to risk management in financial institutions.

Linux with Operating System Concepts (Paperback, 2nd edition): Richard Fox Linux with Operating System Concepts (Paperback, 2nd edition)
Richard Fox
R2,594 Discovery Miles 25 940 Ships in 9 - 17 working days

1. An up-to-date reference on Red Hat 8 with comparisons to Red Hat's 7 and 6 when warranted. 2. A combination of how to use and administer Linux and operating systems concepts (making this text unique to Linux textbooks) written in an easy-to-read manner. 3. Improved chapters on computer networks, regular expressions and scripting. Revised and additional examples to support the concepts in these chapters. 4. Comparisons between Red Hat Linux and other Linux distributions when such comparisons will be useful. 5. A set of ancillary material including a complete lab manual, text bank, power point notes, glossary of terms, instructor's manual and supplemental readings. The supplemental readings will allow for a smaller book while still retaining all of the important content. 6. Improved chapter reviews, added end-of-section activities, additional tables, improved figures (where possible) and "did you know" boxes inserted to provide useful facts.

Recent Progress in Computational Sciences and Engineering (Hardcover): Theodore Simos Recent Progress in Computational Sciences and Engineering (Hardcover)
Theodore Simos
R3,500 Discovery Miles 35 000 Ships in 10 - 15 working days

Designed for introductory parallel computing courses at the advanced undergraduate or beginning graduate level, Elements of Parallel Computing presents the fundamental concepts of parallel computing not from the point of view of hardware, but from a more abstract view of algorithmic and implementation patterns. The aim is to facilitate the teaching of parallel programming by surveying some key algorithmic structures and programming models, together with an abstract representation of the underlying hardware. The presentation is friendly and informal. The content of the book is language neutral, using pseudocode that represents common programming language models. The first five chapters' present core concepts in parallel computing. SIMD, shared memory, and distributed memory machine models are covered, along with a brief discussion of what their execution models look like. The book also discusses decomposition as a fundamental activity in parallel algorithmic design, starting with a naive example, and continuing with a discussion of some key algorithmic structures. Important programming models are presented in depth, as well as important concepts of performance analysis, including work-depth analysis of task graphs, communication analysis of distributed memory algorithms, key performance metrics, and a discussion of barriers to obtaining good performance. The second part of the book presents three case studies that reinforce the concepts of the earlier chapters. One feature of these chapters is to contrast different solutions to the same problem, using select problems that aren't discussed frequently in parallel computing textbooks. They include the Single Source Shortest Path Problem, the Eikonal equation, and a classical computational geometry problem: computation of the two-dimensional convex hull. After presenting the problem and sequential algorithms, each chapter first discusses the sources of parallelism then

Buying, Supporting, Maintaining Software and Equipment - An IT Manager's Guide to Controlling the Product Lifecycle... Buying, Supporting, Maintaining Software and Equipment - An IT Manager's Guide to Controlling the Product Lifecycle (Paperback)
Gay Gordon-Byrne
R1,793 Discovery Miles 17 930 Ships in 10 - 15 working days

Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts-which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition, support, and maintenance Examines hardware and software warranty and support models Considers finance and accounting issues for maintenance and support Spells out technology product details Explains postwarranty support and maintenance Provides the understanding to better negotiate with vendor sales teams Illustrating the types of problems typically experienced during product use, the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term, this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating.

Botnets - Architectures, Countermeasures, and Challenges (Hardcover): Georgios Kambourakis, Marios Anagnostopoulos, Weizhi... Botnets - Architectures, Countermeasures, and Challenges (Hardcover)
Georgios Kambourakis, Marios Anagnostopoulos, Weizhi Meng, Peng Zhou
R3,524 Discovery Miles 35 240 Ships in 10 - 15 working days

This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics. It presents original theoretical and empirical chapters dealing with both offensive and defensive aspects in this field. Chapters address fundamental theory, current trends and techniques for evading detection, as well as practical experiences concerning detection and defensive strategies for the botnet ecosystem, and include surveys, simulations, practical results, and case studies.

Integration of Services into Workflow Applications (Paperback): Pawel Czarnul Integration of Services into Workflow Applications (Paperback)
Pawel Czarnul
R1,870 Discovery Miles 18 700 Ships in 10 - 15 working days

Describing state-of-the-art solutions in distributed system architectures, Integration of Services into Workflow Applications presents a concise approach to the integration of loosely coupled services into workflow applications. It discusses key challenges related to the integration of distributed systems and proposes solutions, both in terms of theoretical aspects such as models and workflow scheduling algorithms, and technical solutions such as software tools and APIs. The book provides an in-depth look at workflow scheduling and proposes a way to integrate several different types of services into one single workflow application. It shows how these components can be expressed as services that can subsequently be integrated into workflow applications. The workflow applications are often described as acyclic graphs with dependencies which allow readers to define complex scenarios in terms of basic tasks. Presents state-of-the-art solutions to challenges in multi-domain workflow application definition, optimization, and execution Proposes a uniform concept of a service that can represent executable components in all major distributed software architectures used today Discusses an extended model with determination of data flows among parallel paths of a workflow application Since workflow applications often process big data, the book explores the dynamic management of data with various storage constraints during workflow execution. It addresses several practical problems related to data handling, including data partitioning for parallel processing next to service selection and scheduling, processing data in batches or streams, and constraints on data sizes that can be processed at the same time by service instances. Illustrating several workflow applications that were proposed, implemented, and benchmarked in a real BeesyCluster environment, the book includes templates for

Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover): John Y. Hsu Computer Architecture - Software Aspects, Coding, and Hardware (Hardcover)
John Y. Hsu
R3,537 Discovery Miles 35 370 Ships in 10 - 15 working days

With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.

The book features a "bottom up" computer design approach, based upon the author's thirty years experience in both academe and industry. By combining computer engineering with electrical engineering, the author describes how logic circuits are designed in a CPU. The extensive coverage of a micprogrammed CPU and new processor design features gives the insight of current computer development.

Computer Architecture: Software Aspects, Coding, and Hardware presents a comprehensive review of the subject, from beginner to advanced levels. Topics include:


o Two's complement numbers o Integer overflow
o Exponent overflow and underflow o Looping
o Addressing modes o Indexing
o Subroutine linking o I/O structures
o Memory mapped I/O o Cycle stealing
o Interrupts o Multitasking
o Microprogrammed CPU o Multiplication tree
o Instruction queue o Multimedia instructions
o Instruction cache o Virtual memory
o Data cache o Alpha chip
o Interprocessor communications o Branch prediction
o Speculative loading o Register stack
o JAVA virtual machine o Stack machine principles

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kreislauf des Lebens
Jacob Moleschott Hardcover R1,199 Discovery Miles 11 990
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, … Paperback R2,281 Discovery Miles 22 810
Tools and Technologies for the…
Sergey Balandin, Ekaterina Balandina Hardcover R6,502 Discovery Miles 65 020
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic Hardcover R4,204 Discovery Miles 42 040
The Physics of Computing
Marilyn Wolf Paperback R1,645 Discovery Miles 16 450
Advances in Delay-Tolerant Networks…
Joel J. P. C. Rodrigues Paperback R4,669 Discovery Miles 46 690
Clean Architecture - A Craftsman's Guide…
Robert Martin Paperback  (1)
R860 R741 Discovery Miles 7 410
Intelligent Applications for…
Kandarpa Kumar Sarma, Manash Pratim Sarma, … Hardcover R6,324 Discovery Miles 63 240
Creativity in Load-Balance Schemes for…
Alberto Garcia-Robledo, Arturo Diaz Perez, … Hardcover R3,901 Discovery Miles 39 010
CSS and HTML for beginners - A Beginners…
Ethan Hall Hardcover R1,027 R881 Discovery Miles 8 810

 

Partners