![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems
This remarkable anthology allows the pioneers who orchestrated the major breakthroughs in operating system technology to describe their work in their own words. From the batch processing systems of the 1950s to the distributed systems of the 1990s, Tom Kilburn, David Howarth, Bill Lynch, Fernando Corbato, Robert Daley, Sandy Fraser, Dennis Ritchie, Ken Thompson, Edsger Dijkstra, Per Brinch Hansen, Soren Lauesen, Barbara Liskov, Joe Stoy, Christopher Strachey, Butler Lampson, David Redell, Brian Randell, Andrew Tanenbaum, and others describe the systems they designed. The volume details such classic operating systems as the Atlas, B5000, Exec II, Egdon, CTSS, Multics, Titan,Unix, THE, RC 4000, Venus, Boss 2, Solo, OS 6, Alto, Pilot, Star, WFS, Unix United, and Amoeba systems. An introductory essay on the evolution of operating systems summarizes the papers and helps puts them into a larger perspective. This provocative journey captures the historic contributions of operating systems to software design, concurrent programming, graphic user interfaces, file systems, personal computing, and distributed systems. It also fully portrays how operating systems designers think. It's ideal for everybody in the field, from students to professionals, academics to enthusiasts.
This excellent reference for all those involved in neural networks
research and application presents, in a single text, the necessary
aspects of parallel implementation for all major artificial neural
network models. The book details implementations on varoius
processor architectures (ring, torus, etc.) built on different
hardware platforms, ranging from large general purpose parallel
computers to custom built MIMD machines using transputers and DSPs.
The book is aimed to foster knowledge based on Blockchain technology highlighting on the framework basics, operating principles and different incarnations. The fundamental problems encountered in existing blockchain architectures and means for removing those would be covered. It would also touch upon blockchain based IoT systems and applications. The book covers applications and use cases of blockchain technology for industrial IoT systems. In addition, methods for inducing computational intelligence into existing blockchain frameworks thereby thwarting most of the limitations are also discussed. The readers would benefit from the rich technical content in this rapidly emerging field thereby enabling a skilled workforce for the future.
This book is the sixth volume of the successful book series on Robot Operating System: The Complete Reference. The objective of the book is to provide the reader with comprehensive coverage of the Robot Operating Systems (ROS) and the latest trends and contributed systems. ROS is currently considered as the primary development framework for robotics applications. There are seven chapters organized into three parts. Part I presents two chapters on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become increasingly mature to be integrated into the industry. The first chapter from Amazon AWS deals with the challenges that ROS 2 developers will face as they transition their system to be commercial-grade. The second chapter deals with reactive programming for both ROS1 and ROS. In Part II, two chapters deal with advanced robotics, namely on the usage of robots in farms, and the second deals with platooning systems. Part III provides three chapters on ROS navigation. The first chapter deals with the use of deep learning for ROS navigation. The second chapter presents a detailed tuning guide on ROS navigation and the last chapter discusses SLAM for ROS applications. I believe that this book is a valuable companion for ROS users and developers to learn more ROS capabilities and features.
This book describes how we can design and make efficient processors for high-performance computing, AI, and data science. Although there are many textbooks on the design of processors we do not have a widely accepted definition of the efficiency of a general-purpose computer architecture. Without a definition of the efficiency, it is difficult to make scientific approach to the processor design. In this book, a clear definition of efficiency is given and thus a scientific approach for processor design is made possible. In chapter 2, the history of the development of high-performance processor is overviewed, to discuss what quantity we can use to measure the efficiency of these processors. The proposed quantity is the ratio between the minimum possible energy consumption and the actual energy consumption for a given application using a given semiconductor technology. In chapter 3, whether or not this quantity can be used in practice is discussed, for many real-world applications. In chapter 4, general-purpose processors in the past and present are discussed from this viewpoint. In chapter 5, how we can actually design processors with near-optimal efficiencies is described, and in chapter 6 how we can program such processors. This book gives a new way to look at the field of the design of high-performance processors.
The growing complexity of projects today, as well as the uncertainty inherent in innovative projects, is making obsolete traditional project management practices and procedures, which are based on the notion that much about a project is known at its start. The current high level of change and complexity confronting organizational leaders and managers requires a new approach to projects so they can be managed flexibly to embrace and exploit change. What once used to be considered extreme uncertainty is now the norm, and managing planned projects is being replaced by managing projects as they evolve. Successfully managing projects in extreme situations, such as polar and military expeditions, shows how to manage successfully projects in today's turbulent environment. Executed under the harshest and most unpredictable conditions, these projects are great sources for learning about how to manage unexpected and unforeseen situations as they occur. This book presents multiple case studies of managing extreme events as they happened during polar, mountain climbing, military, and rescue expeditions. A boat accident in the Artic is a lesson on how an effective project manager must be ambidextrous: on one hand able to follow plans and on the other hand able to abandon those plans when disaster strikes and improvise new ones in response. Polar expeditions also illustrate how a team can use "weak links" to go beyond its usual information network to acquire strategic information. Fire and rescues operations illustrate how one team member's knowledge can be transferred to the entire team. Military operations provide case material on how teams coordinate and make use of both individual and collective competencies. This groundbreaking work pushes the definitions of a project and project management to reveal new insight that benefits researchers, academics, and the practitioners managing projects in today's challenging and uncertain times.
This book explores C-based design, implementation, and analysis of post-quantum cryptography (PQC) algorithms for signature generation and verification. The authors investigate NIST round 2 PQC algorithms for signature generation and signature verification from a hardware implementation perspective, especially focusing on C-based design, power-performance-area-security (PPAS) trade-offs and design flows targeting FPGAs and ASICs. Describes a comprehensive set of synthesizable c code base as well as the hardware implementations for the different types of PQC algorithms including lattice-based, code-based, and multivariate-based; Demonstrates the hardware (FPGA and ASIC) and hardware-software optimizations and trade-offs of the NIST round 2 signature-based PQC algorithms; Enables designers to build hardware implementations that are resilient to a variety of side-channels.
This book describes a wide variety of System-on-Chip (SoC) security threats and vulnerabilities, as well as their sources, in each stage of a design life cycle. The authors discuss a wide variety of state-of-the-art security verification and validation approaches such as formal methods and side-channel analysis, as well as simulation-based security and trust validation approaches. This book provides a comprehensive reference for system on chip designers and verification and validation engineers interested in verifying security and trust of heterogeneous SoCs.
This book describes research performed in the context of trust/distrust propagation and aggregation, and their use in recommender systems. This is a hot research topic with important implications for various application areas. The main innovative contributions of the work are: -new bilattice-based model for trust and distrust, allowing for ignorance and inconsistency -proposals for various propagation and aggregation operators, including the analysis of mathematical properties -Evaluation of these operators on real data, including a discussion on the data sets and their characteristics. -A novel approach for identifying controversial items in a recommender system -An analysis on the utility of including distrust in recommender systems -Various approaches for trust based recommendations (a.o. base on collaborative filtering), an in depth experimental analysis, and proposal for a hybrid approach -Analysis of various user types in recommender systems to optimize bootstrapping of cold start users.
Highlights developments, discoveries, and practical and advanced experiences related to responsive distributed computing and how it can support the deployment of trajectory-based applications in intelligent systems. Presents metamodeling with new trajectories patterns which are very useful for intelligent transportation systems. Examines the processing aspects of raw trajectories to develop other types of semantic and activity-type and space-time path type trajectories. Discusses Complex Event Processing (CEP), Internet of Things (IoT), Internet of Vehicle (IoV), V2X communication, Big Data Analytics, distributed processing frameworks, and Cloud Computing. Presents a number of case studies to demonstrate smart trajectories related to spatio-temporal events such as traffic congestion, viral contamination, and pedestrian accidents.
This book covers the state-of-the-art research in design of modern electronic systems used in safety-critical applications such as medical devices, aircraft flight control, and automotive systems. The authors discuss lifetime reliability of digital systems, as well as an overview of the latest research in the field of reliability-aware design of integrated circuits. They address modeling approaches and techniques for evaluation and improvement of lifetime reliability for nano-scale CMOS digital circuits, as well as design algorithms that are the cornerstone of Computer Aided Design (CAD) of reliable VLSI circuits. In addition to developing lifetime reliability analysis and techniques for clocked storage elements (such as flip-flops), the authors also describe analysis and improvement strategies targeting commercial digital circuits.
Many professionals and students in engineering, science, business, and other application fields need to develop Windows-based and web-enabled information systems to store and use data for decision support, without help from professional programmers. However, few books are available to train professionals and students who are not professional programmers to develop these information systems. Developing Windows-Based and Web-Enabled Information Systems fills this gap, providing a self-contained, easy-to-understand, and well-illustrated text that explores current concepts, methods, and software tools for developing Windows-based and web-enabled information systems. Written in an easily accessible style, the book details current concepts, methods, and software tools for Windows-based and web-enabled information systems that store and use data. It is self-contained with easy-to-understand small examples to walk through concepts and implementation details along with large-scale case studies. The book describes data modeling methods including entity-relationship modeling, relational modeling and normalization, and object-oriented data modeling, to develop data models of a database. The author covers how to use software tools in the Microsoft application development environment, including Microsoft Access, MySQL, SQL, Visual Studio, Visual Basic, VBA, HTML, and XML, to implement databases and develop Windows-based and web-enabled applications with the database, graphical user interface, and program components. The book takes you through the entire process of developing a computer and network application for an information system, highlighting concepts and operation details. In each chapter, small data examples are used to manually walk through concepts and operational details. These features and more give you the conceptual understanding and practical skill required, even if you don't have a computer science background, to develop Windows-based or web-enabled applications for your specialized information system.
Even leading organizations with sophisticated IT infrastructures and teams of lawyers can find themselves unprepared to deal with the range of issues that can arise in IT contracting. Written by two seasoned attorneys, A Guide to IT Contracting: Checklists, Tools, and Techniques distills the most critical business and legal lessons learned through the authors' decades of experience drafting and negotiating IT-related agreements. In a single volume, readers can quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing non-legal professionals with the tools to address IT contracting issues, the book: Contains checklists to help readers organize key concepts for ready reference Supplies references to helpful online resources and aids for contract drafting Includes downloadable resources with reusable checklists and complete glossary that defines key legal, business, and technical terms Costly mistakes can be avoided, risk can be averted, and better contracts can be drafted if you have access to the right information. Filled with reader-friendly checklists, this accessible reference will set you down that path. Warning you of the most common pitfalls, it arms you with little-known tips and best practices to help you negotiate the key terms of your IT agreements with confidence and ensure you come out on top in your next contract negotiation.
AI-Powered IoT in the Energy Industry: Digital Technology and Sustainable Energy Systems looks at opportunities to employ cutting-edge applications of artificial intelligence (AI), the Internet of Things (IoT), and Machine Learning (ML) in designing and modeling energy and renewable energy systems. The book's main objectives are to demonstrate how big data can help with energy efficiency and demand reduction, increase the usage of renewable energy sources, and assist in transitioning from a centralized system to a distributed, efficient, and embedded energy system. Contributions cover the fundamentals of the renewable energy sector, including solar, wind, biomass, and hydrogen, as well as building services and power generation systems. Chapters also examine renewable energy property prediction methods and discuss AI and IoT prediction models for biomass thermal properties. Covers renewable energy sector fundamentals; Explains the application of big data in distributed energy domains; Discusses AI and IoT prediction methods and models.
This volume is published as the proceedings of the third Russian-German - vanced Research Workshop on Computational Science and High Performance Computing in Novosibirsk, Russia, in July 2007. The contributions of these proceedings were provided and edited by the - thors, chosen after a careful selection and reviewing. The workshop was organized by the High Performance Computing Center Stuttgart(Stuttgart,Germany)andtheInstituteofComputationalTechnologies SBRAS(Novosibirsk,Russia)intheframeworkofactivitiesoftheGerman-Russian CenterforComputationalTechnologiesandHighPerformanceComputing. Thee event is held biannually and has already become a good tradition for German and Russian scientists. The ?rst Workshop took place in September 2003 in Novosibirskand the second Workshopwas hosted by Stuttgart in March 2005. Both workshops gave the possibility of sharing and discussing the latest results and developing further scienti?c contacts in the ?eld of computational science and high performance computing. The topics of the current workshop include software and hardware for high performancecomputation,numericalmodellingingeophysicsandcomputational ?uid dynamics, mathematical modelling of tsunami waves, simulation of fuel cellsandmodern? breopticsdevices,numericalmodellingincryptographypr- lems andaeroacoustics,interval analysis,toolsfor Gridapplications,researchon service-oriented architecture (SOA) and telemedicine technologies. Theparticipationofrepresentativesofmajorresearchorganizationsengagedin the solution of the most complex problems of mathematical modelling, devel- ment of new algorithms,programsandkey elementsof informationtechnologies, elaboration and implementation of software and hardware for high performance computing systems,provideda highlevelof competenceofthe workshop. Among the German participants were the heads and leading specialists of the HighPerformanceComputingCenterStuttgart(HLRS)(UniversityofStuttgart), NECHighPerformanceComputingEuropeGmbH,SectionofAppliedMathem- ics(UniversityofFreiburgi.Br.),InstituteofAerodynamics(RWTHAachen),- gionalComputingCenterErlangen(RRZE(UniversityofErlangen-Nuremberg), Center for High Performance Computing (ZHR) (Dresden University of Technology).
This book takes a holistic view on mobile and distributed computing systems. It presents innovative solutions at all system layers. These range from hardware over vertical and horizontal infrastructure services and novel middleware techniques to various types of application software. Some chapters address core properties of ubiquitous applications including mobility, self-healing and self-organization of both technical and social-technical systems.
Derived from industry-training classes that the author teaches at the Embedded Systems Institute at Eindhoven, the Netherlands and at Buskerud University College at Kongsberg in Norway, Systems Architecting: A Business Perspective places the processes of systems architecting in a broader context by juxtaposing the relationship of the systems architect with enterprise and management. This practical, scenario-driven guide fills an important gap, providing systems architects insight into the business processes, and especially into the processes to which they actively contribute. The book uses a simple reference model to enable understanding of the inside of a system in relation to its context. It covers the impact of tool selection and brings balance to the application of the intellectual tools versus computer-aided tools. Stressing the importance of a clear strategy, the authors discuss methods and techniques that facilitate the architect's contribution to the strategy process. They also give insight into the needs and complications of harvesting synergy, insight that will help establish an effective synergy-harvesting strategy. The book also explores the often difficult relationship between managers and systems architects. Written in an approachable style, the book discusses the breadth of the human sciences and their relevance to systems architecting. It highlights the relevance of human aspects to systems architects, linking theory to practical experience when developing systems architecting competence.
The first single-source reference covering the state of the art in grid and utility computing economy researchThis book presents the first integrated, single-source reference on market-oriented grid and utility computing. Divided into four main parts-and with contributions from a panel of experts in the field-it systematically and carefully explores: * Foundations-presents the fundamental concepts of market-oriented computing and the issues and challenges in allocating resources in a decentralized computing environment. * Business models-covers business models for service providers and brokers supporting different types of distributed applications, as well as business rules-based models for managing virtual organizations and accounting operations and services in grid computing environments. * Policies and agreements-introduces policies, agreements, and specifications for the negotiation and establishment of contracts between providers and consumers. It also covers different approaches for resource allocation based on service-level agreements (SLAs) and management of risks associated with SLA violations. * Resource allocation and scheduling mechanisms-covers economic models, such as commodity models, reciprocation, auctions, and game theory, and middleware technologies, such as Nimrod/G and Gridbus, for market-oriented grid computing and utility-oriented resource allocation.This book expertly captures the state of the art in the field while also identifying potential research directions and technologies that will facilitate the creation of global commercial grid and utility computing systems. It is an indispensable reference for systems architects, practitioners, developers, new researchers, and graduate students.
This book describes a set of SystemC-based virtual prototype analysis methodologies, including design understanding, verification, security validation, and design space exploration. Readers will gain an overview of the latest research results in the field of Electronic Design Automation (EDA) at the Electronic System Level (ESL). The methodologies discussed enable readers to tackle easily key tasks and applications in the design process.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing, offering perspectives from the industrial and research communities on how to address the current challenges in the field. As such it is a valuable reference resource for researchers and practitioners in academia and industry.
This book describes the technology of charge-trapping non-volatile memories and their uses. The authors explain the device physics of each device architecture and provide a concrete description of the materials involved and the fundamental properties of the technology. Modern material properties, used as charge-trapping layers, for new applications are introduced. Provides a comprehensive overview of the technology for charge-trapping non-volatile memories; Details new architectures and current modeling concepts for non-volatile memory devices; Focuses on conduction through multi-layer gate dielectrics stacks.
Enterprise resource planning (ERP) refers to large commercial software packages that promise a seamless integration of information flow through an organization. Traditionally, separate units were created within an organization to carry out various tasks, and these functional areas would create their own information systems thereby giving rise to systems that were not integrated. ERP strives to provide a solution to these problems. Enterprise Resoure Planning Solutions and Management examines the issues that need to be further studied and better understood to ensure successful implementation and deployment of ERP systems. |
You may like...
Clean Architecture - A Craftsman's Guide…
Robert Martin
Paperback
(1)
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald
Hardcover
R5,315
Discovery Miles 53 150
Intelligent Image and Video Compression…
David R. Bull, Fan Zhang
Paperback
R2,606
Discovery Miles 26 060
|