![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
A Handheld History is a unique celebration of portable platforms and their iconic games. Forty years ago, businessmen fiddling with calculators inspired Gunpei Yokoi to create the Game & Watch. Ever since then, handheld gaming has been hugely influential, spawning communities who trade Pokémon in the playground and share Miis on the subway. This introspective adventure will delve into decades of gaming memories and reconnect you to that long car journey full of discarded AA batteries before speeding ahead to the contemporary days of blockbusters in your backpack. Handheld gaming is celebrated loudly, proudly, and across hundreds of beautifully assembled pages of art and essays. Featuring words from many incredible voices, this is an unmissable ode to the gaming device that you keep close to your heart – right in your jacket pocket.
If engineering is the art and science of technical problem solving, systems architecting happens when you don't yet know what the problem is. The third edition of a highly respected bestseller, The Art of Systems Architecting provides in-depth coverage of the least understood part of systems design: moving from a vague concept and limited resources to a satisfactory and feasible system concept and an executable program. The book provides a practical, heuristic approach to the "art" of systems architecting. It provides methods for embracing, and then taming, the growing complexity of modern systems. New in the Third Edition: Five major case studies illustrating successful and unsuccessful practices Information on architecture frameworks as standards for architecture descriptions New methods for integrating business strategy and architecture and the role of architecture as the technical embodiment of strategy Integration of process guidance for organizing and managing architecture projects Updates to the rapidly changing fields of software and systems-of-systems architecture Organization of heuristics around a simple and practical process model A Practical Heuristic Approach to the Art of Systems Architecting Extensively rewritten to reflect the latest developments, the text explains how to create a system from scratch, presenting invention/design rules together with clear explanations of how to use them. The author supplies practical guidelines for avoiding common systematic failures while implementing new mandates. He uses a heuristics-based approach that provides an organized attack on very ill-structured engineering problems. Examining architecture as more than a set of diagrams and documents, but as a set of decisions that either drive a system to success or doom it to failure, the book provide methods for integrating business strategy with technical architectural decision making.
Over the last fifteen years GIS has become a fully-fledged technology, deployed across a range of application areas. However, although computer advances in performance appear to continue unhindered, data volumes and the growing sophistication of analysis procedures mean that performance will increasingly become a serious concern in GIS. Parallel computing offers a potential solution. However, traditional algorithms may not run effectively in a parallel environment, so utilization of parallel technology is not entirely straightforward. This groundbreaking book examines some of the current strategies facing scientists and engineers at this crucial interface of parallel computing and GIS.; The book begins with an introduction to the concepts, terminology and techniques of parallel processing, with particular reference to GIS. High level programming paradigms and software engineering issues underlying parallel software developments are considered and emphasis is given to designing modular reusable software libraries. The book continues with problems in designing parallel software for GIS applications, potential vector and raster data structures and details the algorithmic design for some major GIS operations. An implementation case study is included, based around a raster generalization problem, which illustrates some of the principles involved. Subsequent chapters review progress in parallel database technology in a GIS environment and the use of parallel techniques in various application areas, dealing with both algorithmic and implementation issues.; "Parallel Processing Algorithms for GIS" should be a useful text for a new generation of GIS professionals whose principal concern is the challenge of embracing major computer performance enhancements via parallel computing. Similarly, it should be an important volume for parallel computing professionals who are increasingly aware that GIS offers a major application domain for their technology.
Like the anti-lock brakes system of a car, real-time systems are time-vital technologies put in place to react under a certain set of circumstances, often vital to security of data, information, or other resources. Innovations in Embedded and Real-Time Systems Engineering for Communication has collected the latest research within the field of real-time systems engineering, and will serve as a vital reference compendium for practitioners and academics. From a wide variety of fields and countries, the authors of this collection are the respective experts in their areas of concentration, giving the latest case studies, methodologies, frameworks, architectures, best practices, and research as it relates to real-time systems engineering for communication.
Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.
The Maintenance Management Framework describes and reviews the concept, process and framework of modern maintenance management of complex systems; concentrating specifically on modern modelling tools (deterministic and empirical) for maintenance planning and scheduling. It will be bought by engineers and professionals involved in maintenance management, maintenance engineering, operations management, quality, etc. as well as graduate students and researchers in this field.
The book covers a range of topics dealing with emerging computing technologies which are being developed in response to challenges faced due to scaling CMOS technologies. It provides a sneak peek into the capabilities unleashed by these technologies across the complete system stack, with contributions by experts discussing device technology, circuit, architecture and design automation flows. Presenting a gradual progression of the individual sub-domains and the open research and adoption challenges, this book will be of interest to industry and academic researchers, technocrats and policymakers. Chapters "Innovative Memory Architectures Using Functionality Enhanced Devices" and "Intelligent Edge Biomedical Sensors in the Internet of Things (IoT) Era" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Developing today's complex systems requires "more" than just good
software engineering solutions. Many are faced with complex systems
projects, incomplete or inaccurate requirements, canceled projects,
or cost overruns, and have their systems' users in revolt and
demanding more. Others want to build user-centric systems, but fear
managing the process. This book describes an approach that brings
the engineering process together with human performance engineering
and business process reengineering. The result is a manageable
user-centered process for gathering, analyzing, and evaluating
requirements that can vastly improve the success rate in the
development of medium-to-large size systems and applications.
Developing today's complex systems requires "more" than just good
software engineering solutions. Many are faced with complex systems
projects, incomplete or inaccurate requirements, canceled projects,
or cost overruns, and have their systems' users in revolt and
demanding more. Others want to build user-centric systems, but fear
managing the process. This book describes an approach that brings
the engineering process together with human performance engineering
and business process reengineering. The result is a manageable
user-centered process for gathering, analyzing, and evaluating
requirements that can vastly improve the success rate in the
development of medium-to-large size systems and applications.
Until now, business systems have focused on selected data within a certain context to produce information. A better approach, says Thierauf, is to take information accompanied by experience over time to generate knowledge. He demonstrates that knowledge management systems can be used as a source of power to outmaneuver business competitors. Knowledge discovery tools enable decision makers to extract the patterns, trends, and correlations that underlie the inner (and inter-) workings of a company. His book is the first comprehensive text to define this important new direction in computer technology and will be essential reading for MIS practitioners, systems analysts, and academics researching and teaching the theory and applications of knowledge management systems. Thierauf centers on leveraging a company's knowledge capital. Indeed, knowledge is power--the power to improve customer satisfaction, marketing and production methods, financial operations, and other functions. Thierauf shows how knowledge, when developed and renewed, can be applied to a company's functional areas and provide an important competitive advantage. By utilizing some form of internal and external computer networks and providing some type of knowledge discovery software that encapsulates usable knowledge, Thierauf shows how to create an infrastructure to capture knowledge, store it, improve it, clarify it, and disseminate it throughout the organization, then how to use it regularly. His book demonstrates clearly how knowledge management systems focus on making knowledge available to company employees in the right format, at the right time, and in the right place. The result is inevitably a higher order of intelligence in decision making, more so now than could ever have been possible in even the most recent past.
This book introduces new compilation techniques, using the polyhedron model for the resource-adaptive parallel execution of loop programs on massively parallel processor arrays. The authors show how to compute optimal symbolic assignments and parallel schedules of loop iterations at compile time, for cases where the number of available cores becomes known only at runtime. The compile/runtime symbolic parallelization approach the authors describe reduces significantly the runtime overhead, compared to dynamic or just-in-time compilation. The new, on-demand fault-tolerant loop processing approach described in this book protects loop nests for parallel execution against soft errors.
The latest on getting the most from laptops and tablets Not that long ago, laptops were seen as luxuries. Now they're practically an essential for many people, and--as faster computing power and super-sharp displays make many of them the equal of a desktop--the new wave of lightweight laptops is increasingly replacing the home PC with its bulky tower and multiple cords. Plus, you can use your laptop when chilling on the couch or venturing out for a quick coffee! In this fully updated edition of Laptops For Dummies, bestselling tech writer Dan Gookin takes a friendly walk through everything you need to know, from the basics (if you're new to laptops) all the way up to the latest hardware and tech updates--including the recent release of Windows 10. Along the way you'll learn how to synchronize your laptop with other machines, coordinate email pickup across devices, and beef up your security. You'll also learn how to Choose the right laptop Check out tablet options Troubleshoot problems Maintain and upgrade Whether you're choosing a new laptop or want to maximize what you're getting from the one you have, Laptops For Dummies has you covered, wherever you want to work--or play!
Based on a symposium honoring the extensive work of Allen Newell --
one of the founders of artificial intelligence, cognitive science,
human-computer interaction, and the systematic study of
computational architectures -- this volume demonstrates how
unifying themes may be found in the diversity that characterizes
current research on computers and cognition. The subject matter
includes:
The third edition of Digital Logic Techniques provides a clear and comprehensive treatment of the representation of data, operations on data, combinational logic design, sequential logic, computer architecture, and practical digital circuits. A wealth of exercises and worked examples in each chapter give students valuable experience in applying the concepts and techniques discussed. Beginning with an objective comparison between analogue and digital representation of data, the author presents the Boolean algebra framework for digital electronics, develops combinational logic design from first principles, and presents cellular logic as an alternative structure more relevant than canonical forms to VLSI implementation. He then addresses sequential logic design and develops a strategy for designing finite state machines, giving students a solid foundation for more advanced studies in automata theory. The second half of the book focuses on the digital system as an entity. Here the author examines the implementation of logic systems in programmable hardware, outlines the specification of a system, explores arithmetic processors, and elucidates fault diagnosis. The final chapter examines the electrical properties of logic components, compares the different logic families, and highlights the problems that can arise in constructing practical hardware systems.
Fast, Efficient and Predictable Memory Accesses presents techniques for designing fast, energy-efficient and timing predictable memory systems. By using a careful combination of compiler optimizations and architectural improvements, we can achieve more than what would be feasible at one of the levels in isolation. The described optimization algorithms achieve the goals of high performance and low energy consumption. In addition to these benefits, the use of scratchpad memories significantly improves the timing predictability of the entire system, leading to tighter worst case execution time bounds (WCET). The WCET is a relevant design parameter for all timing critical systems. In addition, the book covers algorithms to exploit the power down modes of main memories in SDRAM technology, as well as the execute-in-place feature of Flash memories. The final chapter considers the impact of the register file, which is also part of the memory hierarchy.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.
This two-part book puts the spotlight on how a TCP/IP stack works using Micri m's uC/TCP-IP as a reference. Part I includes an overview of the basics of the Internet Protocol and walks through various aspects of C/TCP-IP implementation and usage. Part II provides examples for the reader, using the Renesas YRDKRX62N Evaluation Board. The board features the Renesas RX62N, a high-performance 32-bit Flash MCU with FPU and DSP capability, and rich connectivity including Ethernet. Together with the Renesas e2Studio, the evaluation board provides everything necessary to get you up and running quickly, as well as a fun and educational experience, resulting in a high-level of proficiency in a short time. This book is written for serious embedded systems programmers, consultants, hobbyists, and students interested in understanding the inner workings of a TCP/IP stack. uC/TCP-IP is not just a great learning platform, but also a full commercial-grade software package, ready to be part of a wide range of products. The topics covered in this book include: Ethernet technology and device drivers IP connectivity Client and Server architecture Socket programming UDP performance TCP performance System network performance
Memory Architecture Exploration for Programmable Embedded Systems
addresses efficient exploration of alternative memory
architectures, assisted by a "compiler-in-the-loop" that allows
effective matching of the target application to the
processor-memory architecture. This new approach for memory
architecture exploration replaces the traditional black-box view of
the memory system and allows for aggressive co-optimization of the
programmable processor together with a customized memory system.
Concurrent data structures simplify the development of concurrent programs by encapsulating commonly used mechanisms for synchronization and commu nication into data structures. This thesis develops a notation for describing concurrent data structures, presents examples of concurrent data structures, and describes an architecture to support concurrent data structures. Concurrent Smalltalk (CST), a derivative of Smalltalk-80 with extensions for concurrency, is developed to describe concurrent data structures. CST allows the programmer to specify objects that are distributed over the nodes of a concurrent computer. These distributed objects have many constituent objects and thus can process many messages simultaneously. They are the foundation upon which concurrent data structures are built. The balanced cube is a concurrent data structure for ordered sets. The set is distributed by a balanced recursive partition that maps to the subcubes of a binary 7lrcube using a Gray code. A search algorithm, VW search, based on the distance properties of the Gray code, searches a balanced cube in O(log N) time. Because it does not have the root bottleneck that limits all tree-based data structures to 0(1) concurrency, the balanced cube achieves 0C.: N) con currency. Considering graphs as concurrent data structures, graph algorithms are pre sented for the shortest path problem, the max-flow problem, and graph parti tioning. These algorithms introduce new synchronization techniques to achieve better performance than existing algorithms."
This book gathers the latest experience of experts, research teams and leading organizations involved in computer-aided design of user interfaces of interactive applications. This area investigates how it is desirable and possible to support, to facilitate and to speed up the development life cycle of any interactive system: requirements engineering, early-stage design, detailed design, development, deployment, evaluation and maintenance. In particular, it stresses how the design activity could be better understood for different types of advanced interactive systems such as context-aware systems, multimodal applications, multi-platform systems, pervasive computing, ubiquitous computing and multi-device environments.
Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems describes coding approaches for designing fault-tolerant systems, i.e., systems that exhibit structured redundancy that enables them to distinguish between correct and incorrect results or between valid and invalid states. Since redundancy is expensive and counter-intuitive to the traditional notion of system design, the book focuses on resource-efficient methodologies that avoid excessive use of redundancy by exploiting the algorithmic/dynamic structure of a particular combinational or dynamic system. The first part of Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems focuses on fault-tolerant combinational systems providing a review of von Neumann's classical work on Probabilistic Logics (including some more recent work on noisy gates) and describing the use of arithmetic coding and algorithm-based fault-tolerant schemes in algebraic settings. The second part of the book focuses on fault tolerance in dynamic systems. Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems also discusses how, in a dynamic system setting, one can relax the traditional assumption that the error-correcting mechanism is fault-free by using distributed error correcting mechanisms. The final chapter presents a methodology for fault diagnosis in discrete event systems that are described by Petri net models; coding techniques are used to quickly detect and identify failures. From the Foreword "Hadjicostis has significantly expanded the setting to processes occurring in more general algebraic and dynamic systems... The book responds to the growing need to handle faults in complex digital chips and complex networked systems, and to consider the effects of faults at the design stage rather than afterwards." George Verghese, Massachusetts Institute of Technology Coding Approaches to Fault Tolerance in Combinational and Dynamic Systems will be of interest to both researchers and practitioners in the area of fault tolerance, systems design and control.
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this next-generation Internet architecture has evolved in terms of both design and deployment. On the one hand, there has been development of exciting new concepts and systems, including a new global time-synchronization system, an inter-domain approach for bandwidth reservations called COLIBRI, and Green Networking, which allows combating global climate change on three fronts. On the other hand, SCION is now also in production use by the Swiss financial ecosystem, and enables participants such as the Swiss National Bank, the Swiss provider of clearing services (SIX), and all Swiss financial institutes to communicate securely and reliably with each other via the Secure Swiss Finance Network. This unique guidebook provides an updated description of SCION's main components, covering new research topics and the most recent deployments. In particular, it presents in-depth discussion of formal verification efforts. Importantly, it offers a comprehensive, thorough description of the current SCION system: Describes the principles that guided SCION's design as a secure and robust Internet architecture Provides a comprehensive description of the next evolution in the way data finds its way through the Internet Explains how SCION can contribute to reducing carbon emissions, by introducing SCION Green Networking Demonstrates how SCION not only functions in academic settings but also works in production deployments Discusses additional use cases for driving SCION's adoption Presents the approaches for formal verification of protocols and code Illustrated with many colorful figures, pictures, and diagrams, allowing easy access to the concepts and use cases Assembled by a team with extensive experience in the fields of computer networks and security, this text/reference is suitable for researchers, practitioners, and graduate students interested in network security. Also, readers with limited background in computer networking but with a desire to know more about SCION will benefit from an overview of relevant chapters in the beginning of the book.
Discusses the requirements and establishment of a layered protocol architecture. Highlights the importance of cable media in getting a high-speed network. Covers the fundamental concepts and advanced topics such as metro ethernet, and ethernet first mile in the field of networking. Presents important topics such as multiprotocol label switching, cloud computing in networking, and the internet of things. Explores the necessity of software-defined networking and network functions virtualization.
Magnetic random-access memory (MRAM) is poised to replace traditional computer memory based on complementary metal-oxide semiconductors (CMOS). MRAM will surpass all other types of memory devices in terms of nonvolatility, low energy dissipation, fast switching speed, radiation hardness, and durability. Although toggle-MRAM is currently a commercial product, it is clear that future developments in MRAM will be based on spin-transfer torque, which makes use of electrons spin angular momentum instead of their charge. MRAM will require an amalgamation of magnetics and microelectronics technologies. However, researchers and developers in magnetics and in microelectronics attend different technical conferences, publish in different journals, use different tools, and have different backgrounds in condensed-matter physics, electrical engineering, and materials science. This book is an introduction to MRAM for microelectronics engineers written by specialists in magnetic materials and devices. It presents the basic phenomena involved in MRAM, the materials and film stacks being used, the basic principles of the various types of MRAM (toggle and spin-transfer torque; magnetized in-plane or perpendicular-to-plane), the back-end magnetic technology, and recent developments toward logic-in-memory architectures. It helps bridge the cultural gap between the microelectronics and magnetics communities. |
![]() ![]() You may like...
Data Mining Patterns - New Methods and…
Pascal Poncelet, Florent Masseglia, …
Hardcover
R4,955
Discovery Miles 49 550
System on Chip Design Languages…
Anne Mignotte, Eugenio Villar, …
Hardcover
R4,517
Discovery Miles 45 170
Handbook of Defeasible Reasoning and…
Dov M. Gabbay, Philippe Smets
Hardcover
R5,887
Discovery Miles 58 870
Big Data, IoT, and Machine Learning…
Rashmi Agrawal, Marcin Paprzycki, …
Paperback
R1,709
Discovery Miles 17 090
|