0
Your cart

Your cart is empty

Price
  • R50 - R100 (4)
  • R100 - R250 (244)
  • R250 - R500 (798)
  • R500+ (8,227)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems

Switched Inductor Power IC Design (Hardcover, 1st ed. 2023): Gabriel Alfonso Rincon-Mora Switched Inductor Power IC Design (Hardcover, 1st ed. 2023)
Gabriel Alfonso Rincon-Mora
R2,408 Discovery Miles 24 080 Ships in 10 - 15 working days

This textbook uses design insight, real-life examples, illustrative figures, easy-to-follow equations, and simple SPICE code to show how semiconductor devices (diodes, bipolar-junction transistors (BJTs), and metal-oxide-semiconductor (MOS) field-effect transistors (FETs) ) work independently and collectively in switched-inductor power supplies; how these power supplies transfer power, consume power, and react and respond across frequency; how feedback loops switch, control, and stabilize them; and how the building blocks that comprise them are implemented and designed. This book is focused and complete, with a holistic approach and perspective on power IC design that extends from semiconductor devices to fully-closed feedback systems. Readers will develop the insight needed to interpret, assess, and design switched inductor power ICs, which almost all electronic systems need, yet no other book addresses this way.

A VLSI Architecture for Concurrent Data Structures (Hardcover, 1987 ed.): J W Dally A VLSI Architecture for Concurrent Data Structures (Hardcover, 1987 ed.)
J W Dally
R4,150 Discovery Miles 41 500 Ships in 18 - 22 working days

Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support concurrent data structures. Concurrent Smalltalk (CST), a derivative of Smalltalk-80 with extensions for concurrency, is developed to describe concurrent data structures. CST allows the programmer to specify objects that are distributed over the nodes of a concurrent computer. These distributed objects have many constituent objects and thus can process many messages simultaneously. They are the foundation upon which concurrent data structures are built. The balanced cube is a concurrent data structure for ordered sets. The set is distributed by a balanced recursive partition that maps to the subcubes of a binary 7lrcube using a Gray code. A search algorithm, VW search, based on the distance properties of the Gray code, searches a balanced cube in O(log N) time. Because it does not have the root bottleneck that limits all tree-based data structures to 0(1) concurrency, the balanced cube achieves 0C.: N) con currency. Considering graphs as concurrent data structures, graph algorithms are pre sented for the shortest path problem, the max-flow problem, and graph parti tioning. These algorithms introduce new synchronization techniques to achieve better performance than existing algorithms."

Hardware Security Primitives (Hardcover, 1st ed. 2023): Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi Hardware Security Primitives (Hardcover, 1st ed. 2023)
Mark Tehranipoor, Nitin Pundir, Nidish Vashistha, Farimah Farahmandi
R2,927 Discovery Miles 29 270 Ships in 18 - 22 working days

This book provides an overview of current hardware security primitives, their design considerations, and applications. The authors provide a comprehensive introduction to a broad spectrum (digital and analog) of hardware security primitives and their applications for securing modern devices. Readers will be enabled to understand the various methods for exploiting intrinsic manufacturing and temporal variations in silicon devices to create strong security primitives and solutions. This book will benefit SoC designers and researchers in designing secure, reliable, and trustworthy hardware. Provides guidance and security engineers for protecting their hardware designs; Covers a variety digital and analog hardware security primitives and applications for securing modern devices; Helps readers understand PUF, TRNGs, silicon odometer, and cryptographic hardware design for system security.

Supercomputers - A Key to U.S. Scientific, Technological, and Industrial Preeminence (Hardcover): J.R. Kirkland, J.H. Poore Supercomputers - A Key to U.S. Scientific, Technological, and Industrial Preeminence (Hardcover)
J.R. Kirkland, J.H. Poore
R2,806 R2,540 Discovery Miles 25 400 Save R266 (9%) Ships in 10 - 15 working days

This definitive new volume brings together scientists from government, industry, and the academic worlds to explore ways in which to capitalize on resources for new ventures into the next generation of supercomputers. The wealth of information on state-of-the-art scientific developments contained in this single volume makes Supercomputers an invaluable resource for management scholars and government policymakers interested in high technology companies and strategic planning.

Symbolic Parallelization of Nested Loop Programs (Hardcover, 1st ed. 2018): Alexandru-Petru Tanase, Frank Hannig, Jurgen Teich Symbolic Parallelization of Nested Loop Programs (Hardcover, 1st ed. 2018)
Alexandru-Petru Tanase, Frank Hannig, Jurgen Teich
R3,281 Discovery Miles 32 810 Ships in 10 - 15 working days

This book introduces new compilation techniques, using the polyhedron model for the resource-adaptive parallel execution of loop programs on massively parallel processor arrays. The authors show how to compute optimal symbolic assignments and parallel schedules of loop iterations at compile time, for cases where the number of available cores becomes known only at runtime. The compile/runtime symbolic parallelization approach the authors describe reduces significantly the runtime overhead, compared to dynamic or just-in-time compilation. The new, on-demand fault-tolerant loop processing approach described in this book protects loop nests for parallel execution against soft errors.

Computer-Aided Design of User Interfaces V - Proceedings of the Sixth International Conference on Computer-Aided Design of User... Computer-Aided Design of User Interfaces V - Proceedings of the Sixth International Conference on Computer-Aided Design of User Interfaces CADUI '06 (6-8 June 2006, Bucharest, Romania) (Hardcover, 2007 ed.)
Gaelle Calvary, Costin Pribeanu, Giuseppe Santucci, Jean Vanderdonckt
R2,686 Discovery Miles 26 860 Ships in 18 - 22 working days

This book gathers the latest experience of experts, research teams and leading organizations involved in computer-aided design of user interfaces of interactive applications. This area investigates how it is desirable and possible to support, to facilitate and to speed up the development life cycle of any interactive system: requirements engineering, early-stage design, detailed design, development, deployment, evaluation and maintenance. In particular, it stresses how the design activity could be better understood for different types of advanced interactive systems such as context-aware systems, multimodal applications, multi-platform systems, pervasive computing, ubiquitous computing and multi-device environments.

Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems (Hardcover, 2002 ed.): Christoforos N. Hadjicostis Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems (Hardcover, 2002 ed.)
Christoforos N. Hadjicostis
R4,125 Discovery Miles 41 250 Ships in 18 - 22 working days

Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems describes coding approaches for designing fault-tolerant systems, i.e., systems that exhibit structured redundancy that enables them to distinguish between correct and incorrect results or between valid and invalid states. Since redundancy is expensive and counter-intuitive to the traditional notion of system design, the book focuses on resource-efficient methodologies that avoid excessive use of redundancy by exploiting the algorithmic/dynamic structure of a particular combinational or dynamic system. The first part of Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems focuses on fault-tolerant combinational systems providing a review of von Neumann's classical work on Probabilistic Logics (including some more recent work on noisy gates) and describing the use of arithmetic coding and algorithm-based fault-tolerant schemes in algebraic settings. The second part of the book focuses on fault tolerance in dynamic systems. Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems also discusses how, in a dynamic system setting, one can relax the traditional assumption that the error-correcting mechanism is fault-free by using distributed error correcting mechanisms. The final chapter presents a methodology for fault diagnosis in discrete event systems that are described by Petri net models; coding techniques are used to quickly detect and identify failures. From the Foreword "Hadjicostis has significantly expanded the setting to processes occurring in more general algebraic and dynamic systems... The book responds to the growing need to handle faults in complex digital chips and complex networked systems, and to consider the effects of faults at the design stage rather than afterwards." George Verghese, Massachusetts Institute of Technology Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems will be of interest to both researchers and practitioners in the area of fault tolerance, systems design and control.

Engineering Production-Grade Shiny Apps (Paperback): Colin Fay, Sebastien Rochette, Vincent Guyader, Cervan Girard Engineering Production-Grade Shiny Apps (Paperback)
Colin Fay, Sebastien Rochette, Vincent Guyader, Cervan Girard
R1,679 Discovery Miles 16 790 Ships in 9 - 17 working days

Focused on practical matters: this book will not cover Shiny concepts, but practical tools and methodologies to use for production. Based on experience: this book will be a formalization of several years of experience building Shiny applications. Original content: this book will present new methodology and tooling, not just do a review of what already exists.

The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition): Anthony V. DiSalvatore (CPP, PSP & PCI) The Complete Guide for CPP Examination Preparation (Paperback, 2nd edition)
Anthony V. DiSalvatore (CPP, PSP & PCI)
R1,160 Discovery Miles 11 600 Ships in 9 - 17 working days

Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation. This new edition contains an overview of the fundamental concepts and practices of security management while offering important insights into the CPP exam. Until recently the security profession was regarded as a "necessary evil." This book is a comprehensive guide to a profession that is now considered critical to our well-being in the wake of 9/11. It presents a practical approach drawn from decades of combined experience shared by the authors, prepares the reader for the CPP exam, and walks them through the certification process. This edition gives revised and updated treatment of every subject in the CPP exam, encourages and outlines a three-part program for you to follow, and includes sample questions at the end of each area of study. Although these are not questions that appear on the actual exam, they convey the principles and concepts that the exam emphasizes and are valuable in determining if you have mastered the information. The book also includes a security survey that covers all facets of external and internal security, as well as fire prevention. The Complete Guide for CPP Examination Preparation, Second Edition allows you to move steadily forward along your path to achieving one of the most highly regarded certifications in the security industry.

Distributed Services with Go - Your Guide to Reliable, Scalable, and Maintainable Systems (Paperback): Travis Jeffrey Distributed Services with Go - Your Guide to Reliable, Scalable, and Maintainable Systems (Paperback)
Travis Jeffrey
R1,198 R907 Discovery Miles 9 070 Save R291 (24%) Ships in 10 - 15 working days

This is the book for Gophers who want to learn how to build distributed systems. You know the basics of Go and are eager to put your knowledge to work. Build distributed services that are highly available, resilient, and scalable. This book is just what you need to apply Go to real-world situations. Level up your engineering skills today. Take your Go skills to the next level by learning how to design, develop, and deploy a distributed service. Start from the bare essentials of storage handling, then work your way through networking a client and server, and finally to distributing server instances, deployment, and testing. All this will make coding in your day job or side projects easier, faster, and more fun. Create your own distributed services and contribute to open source projects. Build networked, secure clients and servers with gRPC. Gain insights into your systems and debug issues with observable services instrumented with metrics, logs, and traces. Operate your own Certificate Authority to authenticate internal web services with TLS. Automatically handle when nodes are added or removed to your cluster with service discovery. Coordinate distributed systems with replicated state machines powered by the Raft consensus algorithm. Lay out your applications and libraries to be modular and easy to maintain. Write CLIs to configure and run your applications. Run your distributed system locally and deploy to the cloud with Kubernetes. Test and benchmark your applications to ensure they're correct and fast. Dive into writing Go and join the hundreds of thousands who are using it to build software for the real world. What You Need: Go 1.13+ and Kubernetes 1.16+

Introduction to Magnetic Random-Access Memory (Hardcover): B Dieny Introduction to Magnetic Random-Access Memory (Hardcover)
B Dieny
R3,001 Discovery Miles 30 010 Ships in 18 - 22 working days

Magnetic random-access memory (MRAM) is poised to replace traditional computer memory based on complementary metal-oxide semiconductors (CMOS). MRAM will surpass all other types of memory devices in terms of nonvolatility, low energy dissipation, fast switching speed, radiation hardness, and durability. Although toggle-MRAM is currently a commercial product, it is clear that future developments in MRAM will be based on spin-transfer torque, which makes use of electrons spin angular momentum instead of their charge. MRAM will require an amalgamation of magnetics and microelectronics technologies. However, researchers and developers in magnetics and in microelectronics attend different technical conferences, publish in different journals, use different tools, and have different backgrounds in condensed-matter physics, electrical engineering, and materials science. This book is an introduction to MRAM for microelectronics engineers written by specialists in magnetic materials and devices. It presents the basic phenomena involved in MRAM, the materials and film stacks being used, the basic principles of the various types of MRAM (toggle and spin-transfer torque; magnetized in-plane or perpendicular-to-plane), the back-end magnetic technology, and recent developments toward logic-in-memory architectures. It helps bridge the cultural gap between the microelectronics and magnetics communities.

The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover): Jeffrey W.... The Security Leader's Communication Playbook - Bridging the Gap between Security and the Business (Hardcover)
Jeffrey W. Brown
R2,054 Discovery Miles 20 540 Ships in 9 - 17 working days

This book is for cybersecurity leaders across all industries and organizations. It is intended to bridge the gap between the data center and the board room. This book examines the multitude of communication challenges that CISOs are faced with every day and provides practical tools to identify your audience, tailor your message and master the art of communicating. Poor communication is one of the top reasons that CISOs fail in their roles. By taking the step to work on your communication and soft skills (the two go hand-in-hand), you will hopefully never join their ranks. This is not a "communication theory" book. It provides just enough practical skills and techniques for security leaders to get the job done. Learn fundamental communication skills and how to apply them to day-to-day challenges like communicating with your peers, your team, business leaders and the board of directors. Learn how to produce meaningful metrics and communicate before, during and after an incident. Regardless of your role in Tech, you will find something of value somewhere along the way in this book.

Become an Effective Software Engineering Manager - How to Be the Leader Your Development Team Needs (Paperback): James Stanier Become an Effective Software Engineering Manager - How to Be the Leader Your Development Team Needs (Paperback)
James Stanier
R1,218 R927 Discovery Miles 9 270 Save R291 (24%) Ships in 10 - 15 working days

Software startups make global headlines every day. As technology companies succeed and grow, so do their engineering departments. In your career, you'll may suddenly get the opportunity to lead teams: to become a manager. But this is often uncharted territory. How can you decide whether this career move is right for you? And if you do, what do you need to learn to succeed? Where do you start? How do you know that you're doing it right? What does "it" even mean? And isn't management a dirty word? This book will share the secrets you need to know to manage engineers successfully. Going from engineer to manager doesn't have to be intimidating. Engineers can be managers, and fantastic ones at that. Cast aside the rhetoric and focus on practical, hands-on techniques and tools. You'll become an effective and supportive team leader that your staff will look up to. Start with your transition to being a manager and see how that compares to being an engineer. Learn how to better organize information, feel productive, and delegate, but not micromanage. Discover how to manage your own boss, hire and fire, do performance and salary reviews, and build a great team. You'll also learn the psychology: how to ship while keeping staff happy, coach and mentor, deal with deadline pressure, handle sensitive information, and navigate workplace politics. Consider your whole department. How can you work with other teams to ensure best practice? How do you help form guilds and committees and communicate effectively? How can you create career tracks for individual contributors and managers? How can you support flexible and remote working? How can you improve diversity in the industry through your own actions? This book will show you how. Great managers can make the world a better place. Join us.

Introduction to Annotated Logics - Foundations for Paracomplete and Paraconsistent Reasoning (Hardcover, 2015 ed.): Jair Minoro... Introduction to Annotated Logics - Foundations for Paracomplete and Paraconsistent Reasoning (Hardcover, 2015 ed.)
Jair Minoro Abe, Seiki Akama, Kazumi Nakamatsu
R3,294 Discovery Miles 32 940 Ships in 10 - 15 working days

This book is written as an introduction to annotated logics. It provides logical foundations for annotated logics, discusses some interesting applications of these logics and also includes the authors' contributions to annotated logics. The central idea of the book is to show how annotated logic can be applied as a tool to solve problems of technology and of applied science. The book will be of interest to pure and applied logicians, philosophers and computer scientists as a monograph on a kind of paraconsistent logic. But, the layman will also take profit from its reading.

Do-All Computing in Distributed Systems - Cooperation in the Presence of Adversity (Hardcover, 2008 ed.): Chryssis Georgiou Do-All Computing in Distributed Systems - Cooperation in the Presence of Adversity (Hardcover, 2008 ed.)
Chryssis Georgiou
R2,669 Discovery Miles 26 690 Ships in 18 - 22 working days

This book presents several significant advances in algorithms designed to solve the Do-All problem in distributed message-passing settings under various models of adversity, including processor crashes, asynchrony, message delays, network partitions, and malicious processor behaviors. Upper and lower bounds are presented, demonstrating the extent to which efficiency can be combined with fault-tolerance. This book contains the recent advances in the principles of efficient and fault-tolerant cooperative computing, narrowing the gap between abstract models of dependable network computing and realistic distributed systems.

Models for Parallel and Distributed Computation - Theory, Algorithmic Techniques and Applications (Hardcover, 2002 ed.): R... Models for Parallel and Distributed Computation - Theory, Algorithmic Techniques and Applications (Hardcover, 2002 ed.)
R Correa, Ines De Castro Dutra, Mario Fiallos, Luiz Fernando Gomes da Silva
R4,195 Discovery Miles 41 950 Ships in 18 - 22 working days

Parallel and distributed computation has been gaining a great lot of attention in the last decades. During this period, the advances attained in computing and communication technologies, and the reduction in the costs of those technolo gies, played a central role in the rapid growth of the interest in the use of parallel and distributed computation in a number of areas of engineering and sciences. Many actual applications have been successfully implemented in various plat forms varying from pure shared-memory to totally distributed models, passing through hybrid approaches such as distributed-shared memory architectures. Parallel and distributed computation differs from dassical sequential compu tation in some of the following major aspects: the number of processing units, independent local dock for each unit, the number of memory units, and the programming model. For representing this diversity, and depending on what level we are looking at the problem, researchers have proposed some models to abstract the main characteristics or parameters (physical components or logical mechanisms) of parallel computers. The problem of establishing a suitable model is to find a reasonable trade-off among simplicity, power of expression and universality. Then, be able to study and analyze more precisely the behavior of parallel applications."

Building a Columnar Database on RAMCloud - Database Design for the Low-Latency Enabled Data Center (Hardcover, 1st ed. 2016):... Building a Columnar Database on RAMCloud - Database Design for the Low-Latency Enabled Data Center (Hardcover, 1st ed. 2016)
Christian Tinnefeld
R3,038 R1,791 Discovery Miles 17 910 Save R1,247 (41%) Ships in 10 - 15 working days

This book examines the field of parallel database management systems and illustrates the great variety of solutions based on a shared-storage or a shared-nothing architecture. Constantly dropping memory prices and the desire to operate with low-latency responses on large sets of data paved the way for main memory-based parallel database management systems. However, this area is currently dominated by the shared-nothing approach in order to preserve the in-memory performance advantage by processing data locally on each server. The main argument this book makes is that such an unilateral development will cease due to the combination of the following three trends: a) Today's network technology features remote direct memory access (RDMA) and narrows the performance gap between accessing main memory on a server and of a remote server to and even below a single order of magnitude. b) Modern storage systems scale gracefully, are elastic and provide high-availability. c) A modern storage system such as Stanford's RAM Cloud even keeps all data resident in the main memory. Exploiting these characteristics in the context of a main memory-based parallel database management system is desirable. The book demonstrates that the advent of RDMA-enabled network technology makes the creation of a parallel main memory DBMS based on a shared-storage approach feasible.

Systems Architecting - A Business Perspective (Paperback): Gerrit Muller Systems Architecting - A Business Perspective (Paperback)
Gerrit Muller
R1,389 Discovery Miles 13 890 Ships in 9 - 17 working days

Derived from industry-training classes that the author teaches at the Embedded Systems Institute at Eindhoven, the Netherlands and at Buskerud University College at Kongsberg in Norway, Systems Architecting: A Business Perspective places the processes of systems architecting in a broader context by juxtaposing the relationship of the systems architect with enterprise and management. This practical, scenario-driven guide fills an important gap, providing systems architects insight into the business processes, and especially into the processes to which they actively contribute. The book uses a simple reference model to enable understanding of the inside of a system in relation to its context. It covers the impact of tool selection and brings balance to the application of the intellectual tools versus computer-aided tools. Stressing the importance of a clear strategy, the authors discuss methods and techniques that facilitate the architect's contribution to the strategy process. They also give insight into the needs and complications of harvesting synergy, insight that will help establish an effective synergy-harvesting strategy. The book also explores the often difficult relationship between managers and systems architects. Written in an approachable style, the book discusses the breadth of the human sciences and their relevance to systems architecting. It highlights the relevance of human aspects to systems architects, linking theory to practical experience when developing systems architecting competence.

SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover): Zhenbin Li, Zhibo Hu, Cheng Li SRv6 Network Programming - Ushering in a New Era of IP Networks (Hardcover)
Zhenbin Li, Zhibo Hu, Cheng Li; Contributions by Chang-Qing Yang
R3,889 Discovery Miles 38 890 Ships in 9 - 17 working days

SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.

Windows 10 For Seniors For Dummies, 4th Edition (Paperback, 4th Edition): P Weverka Windows 10 For Seniors For Dummies, 4th Edition (Paperback, 4th Edition)
P Weverka
R602 R556 Discovery Miles 5 560 Save R46 (8%) Ships in 18 - 22 working days

The easy way to get up and running with Windows 10! With Windows 10 For Seniors For Dummies, becoming familiarized with Windows 10 is a painless process. If you're interested in learning the basics of this operating system without having to dig through confusing computer jargon, look no further. This book offers a step-by-step approach that is specifically designed to assist first time Windows 10 users who are over-50, providing easy-to-understand language, large-print text, and an abundance of helpful images along the way! Protect your computer Follow friends and family online Use Windows 10 to play games and enjoy media Check your security and maintenance status Step-by-step instructions are provided to ensure that you don't get lost at any point along the way.

A Code Mapping Scheme for Dataflow Software Pipelining (Hardcover, 1991 ed.): Guang R. Gao A Code Mapping Scheme for Dataflow Software Pipelining (Hardcover, 1991 ed.)
Guang R. Gao
R2,797 Discovery Miles 27 970 Ships in 18 - 22 working days

This monograph evolved from my Ph. D dissertation completed at the Laboratory of Computer Science, MIT, during the Summer of 1986. In my dissertation I proposed a pipelined code mapping scheme for array operations on static dataflow architectures. The main addition to this work is found in Chapter 12, reflecting new research results developed during the last three years since I joined McGill University-results based upon the principles in my dissertation. The terminology dataflow soft ware pipelining has been consistently used since publication of our 1988 paper on the argument-fetching dataflow architecture model at McGill University 43]. In the first part of this book we describe the static data flow graph model as an operational model for concurrent computation. We look at timing considerations for program graph execution on an ideal static dataflow computer, examine the notion of pipe lining, and characterize its performance. We discuss balancing techniques used to transform certain graphs into fully pipelined data flow graphs. In particular, we show how optimal balancing of an acyclic data flow graph can be formulated as a linear programming problem for which an optimal solution exists. As a major result, we show the optimal balancing problem of acyclic data flow graphs is reduceable to a class of linear programming problem, the net work flow problem, for which well-known efficient algorithms exist. This result disproves the conjecture that such problems are computationally hard."

Bootstrapping - Douglas Engelbart, Coevolution, and the Origins of Personal Computing (Hardcover, illustrated edition): Thierry... Bootstrapping - Douglas Engelbart, Coevolution, and the Origins of Personal Computing (Hardcover, illustrated edition)
Thierry Bardini
R2,262 R1,867 Discovery Miles 18 670 Save R395 (17%) Ships in 10 - 15 working days

"Bootstrapping" analyzes the genesis of personal computing from both technological and social perspectives, through a close study of the pathbreaking work of one researcher, Douglas Engelbart. In his lab at the Stanford Research Institute in the 1960s, Engelbart, along with a small team of researchers, developed some of the cornerstones of personal computing as we know it, including the mouse, the windowed user interface, and hypertext. Today, all these technologies are well known, even taken for granted, but the assumptions and motivations behind their invention are not. "Bootstrapping" establishes Douglas Engelbart's contribution through a detailed history of both the material and the symbolic constitution of his system's human-computer interface in the context of the computer research community in the United States in the 1960s and 1970s.
Engelbart felt that the complexity of many of the world's problems was becoming overwhelming, and the time for solving these problems was becoming shorter and shorter. What was needed, he determined, was a system that would augment human intelligence, co-transforming or co-evolving both humans and the machines they use. He sought a systematic way to think and organize this coevolution in an effort to discover a path on which a radical technological improvement could lead to a radical improvement in how to make people work effectively. What was involved in Engelbart's project was not just the invention of a computerized system that would enable humans, acting together, to manage complexity, but the invention of a new kind of human, "the user." What he ultimately envisioned was a "bootstrapping" process by which those who actually invented the hardware and software of this new system would simultaneously reinvent the human in a new form.
The book also offers a careful narrative of the collapse of Engelbart's laboratory at Stanford Research Institute, and the further translation of Engelbart's vision. It shows that Engelbart's ultimate goal of coevolution came to be translated in terms of technological progress and human adaptation to supposedly user-friendly technologies. At a time of the massive diffusion of the World Wide Web, "Bootstrapping" recalls the early experiments and original ideals that led to today's "information revolution."

Computer Hardware (Paperback, New edition): Barry Blundell Computer Hardware (Paperback, New edition)
Barry Blundell
R1,412 R1,300 Discovery Miles 13 000 Save R112 (8%) Ships in 10 - 15 working days

Computer Hardware teaches the basic functioning of a computer with a concentration on the machine level elements. It clearly explains the role of each of the parts involved in the computer make up and describes how the whole system ticks, without overwhelming the reader in minute detail. Aimed at introductory courses for computing undergraduates, Computer Hardware covers basic principles behind the design of modern computer systems.

The IT Value Quest - How to Capture the Business Value of IT-Based Infrastructure (Hardcover): TJW Renkema The IT Value Quest - How to Capture the Business Value of IT-Based Infrastructure (Hardcover)
TJW Renkema
R2,278 Discovery Miles 22 780 Ships in 10 - 15 working days

Although the potential of information technology (IT) is beyond dispute, it proves to be very difficult to evaluate its true business value. In the present competitive business arena, modern IT provides the enabling infrastructure for efficient and effective business operations, leveraging business improvements and securing a competitive edge. Capturing the value of this IT-based infrastructure is often considered as the most critical and yet the most complex part of managerial decision-making. Many managers do not try to justify their expenditure or measure whether their money was well spent. This situation has become unacceptable in the light of the rising costs and uncertain benefits of this increasingly important type of business investment. The call for more financial returns and more ‘value for money’ can no longer be ignored. Making the right investment evaluations will make the vital difference between business success and failure.

This book provides a unique perspective on assessing and creating business value from investments in IT-based infrastructure and, more importantly, it shows how the role of IT-based infrastructure is critical to obtain the full benefits of IT.

The Common Information Model CIM - IEC 61968/61970 and 62325 - A practical introduction to the CIM (Hardcover, 2012): Mathias... The Common Information Model CIM - IEC 61968/61970 and 62325 - A practical introduction to the CIM (Hardcover, 2012)
Mathias Uslar, Michael Specht, Sebastian Rohjans, Joern Trefke, Jose M Gonzalez
R2,681 Discovery Miles 26 810 Ships in 18 - 22 working days

Within the Smart Grid, the combination of automation equipment, communication technology and IT is crucial. Interoperability of devices and systems can be seen as the key enabler of smart grids. Therefore, international initiatives have been started in order to identify interoperability core standards for Smart Grids. IEC 62357, the so called Seamless Integration Architecture, is one of these very core standards, which has been identified by recent Smart Grid initiatives and roadmaps to be essential for building and managing intelligent power systems. The Seamless Integration Architecture provides an overview of the interoperability and relations between further standards from IEC TC 57 like the IEC 61970/61968: Common Information Model - CIM. CIM has proven to be a mature standard for interoperability and engineering; consequently, it is a cornerstone of the IEC Smart Grid Standardization Roadmap. This book provides an overview on how the CIM developed, in which international projects and roadmaps is has already been covered and describes the basic use cases for CIM. This book has been written for both Power Engineers trying to get to know the EMS and business IT part of Smart Grid and for Computer Scientist finding out where ICT technology is applied in EMS and DMS Systems. The book is divided into two parts dealing with the theoretical foundations and a practical part describing tools and use cases for CIM.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dark Territory - The Secret History of…
Fred Kaplan Paperback R454 R423 Discovery Miles 4 230
Assembly Language Laboratory Work
Marius Silaghi Paperback R532 Discovery Miles 5 320
Automatic Defense Against Zero-day…
Mohssen Mohammed, Al-Sakib Khan Pathan Hardcover R2,753 Discovery Miles 27 530
Hacking - Computer Hacking for…
Adam Dodson Hardcover R546 R500 Discovery Miles 5 000
Cult of the Dead Cow - How the Original…
Joseph Menn Paperback R449 R418 Discovery Miles 4 180
Protecting Critical Infrastructures…
Stephen Lukasik Paperback R885 Discovery Miles 8 850
Digital Earth - Cyber Threats, Privacy…
It Governance Publishing Paperback R631 Discovery Miles 6 310
Web Penetration Testing - Hack Your Way
Shubham Mishra Paperback R325 Discovery Miles 3 250
Botnets
Heli Tiirmaa-Klaar, Jan Gassen, … Paperback R1,645 Discovery Miles 16 450
The Ransomware Threat Landscape…
IT Governance Paperback R626 Discovery Miles 6 260

 

Partners