![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming
"Modern Compiler Design" makes the topic of compiler design more accessible by focusing on principles and techniques of wide application. By carefully distinguishing between the essential (material that has a high chance of being useful) and the incidental (material that will be of benefit only in exceptional cases) much useful information was packed in this comprehensive volume. The student who has finished this book can expect to understand the workings of and add to a language processor for each of the modern paradigms, and be able to read the literature on how to proceed. The first provides a firm basis, the second potential for growth.
The aim of this book is to explain to high-performance computing (HPC) developers how to utilize the Intel(r) Xeon Phi series products efficiently. To that end, it introduces some computing grammar, programming technology and optimization methods for using many-integrated-core (MIC) platforms and also offers tips and tricks for actual use, based on the authors first-hand optimization experience. The material is organized in three sections. The first section, Basics of MIC, introduces the fundamentals of MIC architecture and programming, including the specific Intel MIC programming environment. Next, the section on Performance Optimization explains general MIC optimization techniques, which are then illustrated step-by-step using the classical parallel programming example of matrix multiplication. Finally, Project development presents a set of practical and experience-driven methods for using parallel computing in application projects, including how to determine if a serial or parallel CPU program is suitable for MIC and how to transplant a program onto MIC. This book appeals to two main audiences: First, software developers for HPC applications it will enable them to fully exploit the MIC architecture and thus achieve the extreme performance usually required in biological genetics, medical imaging, aerospace, meteorology and other areas of HPC. Second, students and researchers engaged in parallel and high-performance computing it will guide them on how to push the limits of system performance for HPC applications. "
This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches.
Who are we in simulated worlds? Will experiencing worlds that are not 'actual' change our ways of structuring thought? Can virtual worlds open up new possibilities to philosophize? Virtual Worlds as Philosophical Tools tries to answer these questions from a perspective that combines philosophy of technology with videogame design.
Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently. CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators. The second approach is concerned with formulation of CAC as an optimization problem to minimize call drop, satisfying a set of constraints on feasibility and availability of channels, hotness of cells, and velocity and angular displacement of mobile stations. Evolutionary techniques, including Genetic Algorithm and Biogeography Based Optimization, have been employed to solve the optimization problems. The proposed approaches outperform traditional methods with respect to grade and quality of services.
This book offers an in-depth insight into the general-purpose finite element program MSC Marc, which is distributed by MSC Software Corporation. It is a specialized program for nonlinear problems (implicit solver) which is common in academia and industry. The primary goal of this book is to provide a comprehensive introduction to a special feature of this software: the user can write user-subroutines in the programming language Fortran, which is the language of all classical finite element packages. This subroutine feature allows the user to replace certain modules of the core code and to implement new features such as constitutive laws or new elements. Thus, the functionality of commercial codes ('black box') can easily be extended by linking user written code to the main core of the program. This feature allows to take advantage of a commercial software package with the flexibility of a 'semi-open' code.
This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."
Despite solid advances, numerous challenges have yet to be resolved by Web services-enabled service-oriented architecture systems. Web Services Security Development and Architecture: Theoretical and Practical Issues explores a global approach to methodical development in constructing safety architectures for online systems. Addressing security concerns during the full development lifecycle of Web services-based systems, this critical mass of the most sought after knowledge bridges the gap between practical and theoretical approaches in the field.
Rapid development of digital technologies has led to the widespread use of software in all aspects of our life. The degree of reliance that can be justifiably placed on software-intensive systems is expressed by the notion of dependability. The complexity of modern software-intensive systems poses the greatest threat to dependability. Furthermore, software the most complex system component is recognized to be the most error-prone part of the system. Dependability and Computer Engineering: Concepts for Software-Intensive Systems offers a state-of-the-art overview of the dependability research, from engineering various software-intensive systems to validating existing IT-frameworks and solving generic and particular problems related to the dependable use of IT in our society. It is important to understand how dependability is manifested in software-intensive systems, how it is developed, and how it can be enhanced at various levels in systems and organizations. This book uncovers the existing research on the topic as well as the key challenges associated with the engineering of dependable IT systems in the future.
This book features a collection of high-quality, peer-reviewed research papers presented at the 7th International Conference on Innovations in Computer Science & Engineering (ICICSE 2019), held at Guru Nanak Institutions, Hyderabad, India, on 16-17 August 2019. Written by researchers from academia and industry, the book discusses a wide variety of industrial, engineering, and scientific applications of the emerging techniques in the field of computer science.
This book offers an introduction to applications prompted by tensor analysis, especially by the spectral tensor theory developed in recent years. It covers applications of tensor eigenvalues in multilinear systems, exponential data fitting, tensor complementarity problems, and tensor eigenvalue complementarity problems. It also addresses higher-order diffusion tensor imaging, third-order symmetric and traceless tensors in liquid crystals, piezoelectric tensors, strong ellipticity for elasticity tensors, and higher-order tensors in quantum physics. This book is a valuable reference resource for researchers and graduate students who are interested in applications of tensor eigenvalues.
This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas.
This book presents a methodology to model and specify the data aspect of Web services, as it is overlooked by current standards for specifying Web services. The formal specification enables verification of service behavior, and the proposed methodology is based on formal methods and design-by-contract techniques. The Web has evolved from an information sharing medium to a wide-scale environment for sharing capabilities or services. Currently, URLs not only point to documents and images, but are also used to invoke services that potentially change the state of the Web. Major online organizations today, such as Amazon, PayPal and FedEx, provide services for users and consumers. They also allow third-party vendors to resell their services. In both cases, this requires precise and complete specification of service offerings. Several online discussions demonstrate the challenges faced by these organizations and others while describing their data-centric Web services. These challenges surrounding data specification can lead consumers to use a service erroneously. Case studies demonstrate how formal methods, and specifically design-by-contract techniques, can be leveraged to address the lack of formal specification of data when it comes to developing Web applications such as Amazon and PayPal.
The papers in this volume represent a broad, applied swath of advanced contributions to the 2015 ICSA/Graybill Applied Statistics Symposium of the International Chinese Statistical Association, held at Colorado State University in Fort Collins. The contributions cover topics that range from statistical applications in business and finance to applications in clinical trials and biomarker analysis. Each papers was peer-reviewed by at least two referees and also by an editor. The conference was attended by over 400 participants from academia, industry, and government agencies around the world, including from North America, Asia, and Europe.
Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and benchmarks. "Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles" presents practical as well as conceptual knowledge of the latest tools, techniques and methodologies of embedded software engineering and real-time systems. Each chapter includes an in-depth investigation regarding the actual or potential role of software engineering tools in the context of the embedded system and real-time system. The book presents state-of-the art and future perspectives with industry experts, researchers, and academicians sharing ideas and experiences including surrounding frontier technologies, breakthroughs, innovative solutions and applications. The book is organized into four parts "Embedded Software Development Process", "Design Patterns and Development Methodology", "Modelling Framework" and "Performance Analysis, Power Management and Deployment" with altogether 12 chapters. The book is aiming at (i) undergraduate students and postgraduate students conducting research in the areas of embedded software engineering and real-time systems; (ii) researchers at universities and other institutions working in these fields; and (iii) practitioners in the R&D departments of embedded system. It can be used as an advanced reference for a course taught at the postgraduate level in embedded software engineering and real-time systems.
This book provides essential insights on the adoption of modern software engineering practices at large companies producing software-intensive systems, where hundreds or even thousands of engineers collaborate to deliver on new systems and new versions of already deployed ones. It is based on the findings collected and lessons learned at the Software Center (SC), a unique collaboration between research and industry, with Chalmers University of Technology, Gothenburg University and Malmoe University as academic partners and Ericsson, AB Volvo, Volvo Car Corporation, Saab Electronic Defense Systems, Grundfos, Axis Communications, Jeppesen (Boeing) and Sony Mobile as industrial partners. The 17 chapters present the "Stairway to Heaven" model, which represents the typical evolution path companies move through as they develop and mature their software engineering capabilities. The chapters describe theoretical frameworks, conceptual models and, most importantly, the industrial experiences gained by the partner companies in applying novel software engineering techniques. The book's structure consists of six parts. Part I describes the model in detail and presents an overview of lessons learned in the collaboration between industry and academia. Part II deals with the first step of the Stairway to Heaven, in which R&D adopts agile work practices. Part III of the book combines the next two phases, i.e., continuous integration (CI) and continuous delivery (CD), as they are closely intertwined. Part IV is concerned with the highest level, referred to as "R&D as an innovation system," while Part V addresses a topic that is separate from the Stairway to Heaven and yet critically important in large organizations: organizational performance metrics that capture data, and visualizations of the status of software assets, defects and teams. Lastly, Part VI presents the perspectives of two of the SC partner companies. The book is intended for practitioners and professionals in the software-intensive systems industry, providing concrete models, frameworks and case studies that show the specific challenges that the partner companies encountered, their approaches to overcoming them, and the results. Researchers will gain valuable insights on the problems faced by large software companies, and on how to effectively tackle them in the context of successful cooperation projects.
Dig deep and master the intricacies of the common language runtime, C#, and .NET development. Led by programming expert Jeffrey Richter, a longtime consultant to the Microsoft .NET team - you'll gain pragmatic insights for building robust, reliable, and responsive apps and components.Fully updated for .NET Framework 4.5 and Visual Studio 2012Delivers a thorough grounding in the .NET Framework architecture, runtime environment, and other key topics, including asynchronous programming and the new Windows RuntimeProvides extensive code samples in Visual C# 2012Features authoritative, pragmatic guidance on difficult development concepts such as generics and threading
This book contains some selected papers from the International Conference on Extreme Learning Machine 2015, which was held in Hangzhou, China, December 15-17, 2015. This conference brought together researchers and engineers to share and exchange R&D experience on both theoretical studies and practical applications of the Extreme Learning Machine (ELM) technique and brain learning. This book covers theories, algorithms ad applications of ELM. It gives readers a glance of the most recent advances of ELM.
This book is open access under a CC BY-NC 4.0 license. This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective are also discussed. After a general introduction and an overview of the book in chapter 1, chapter 2 starts by condensing the industrial challenges driven by the German "Industry 4.0" trend to form a concrete vision for future production industries. Subsequently, chapter 3 introduces the basic concepts of S-BPM and its capabilities, in particular for supporting the restructuring of processes. The next three chapters then present various case studies, e.g. at an SME offering the production of atypical, unique and special purpose machinery, equipment and technologically complex units particularly useful in the automotive and electronic industries; and at a further SME producing highly-customized floor cleaning machines. Rounding out the coverage, the last two chapters summarize the achievements and lessons learned with regard to the road ahead. Overall, the book provides a realistic portrait of the status quo based on current findings, and outlines the future activities to be pursued in order to establish stakeholder-centred digital production systems. As such, developers, educators, and practitioners will find both the conceptual background and results from the field reflecting the state-of-the-art in vertical and horizontal process integration.
With its flexibility for programming both small and large projects, Scala is an ideal language for teaching beginning programming. Yet there are no textbooks on Scala currently available for the CS1/CS2 levels. Introduction to the Art of Programming Using Scala presents many concepts from CS1 and CS2 using a modern, JVM-based language that works well for both programming in the small and programming in the large. The book progresses from true programming in the small to more significant projects later, leveraging the full benefits of object orientation. It first focuses on fundamental problem solving and programming in the small using the REPL and scripting environments. It covers basic logic and problem decomposition and explains how to use GUIs and graphics in programs. The text then illustrates the benefits of object-oriented design and presents a large collection of basic data structures showing different implementations of key ADTs along with more atypical data structures. It also introduces multithreading and networking to provide further motivating examples. By using Scala as the language for both CS1 and CS2 topics, this textbook gives students an easy entry into programming small projects as well as a firm foundation for taking on larger-scale projects. Many student and instructor resources are available at www.programmingusingscala.net
This book describes the implementation of green IT in various human and industrial domains. Consisting of four sections: "Development and Optimization of Green IT", "Modelling and Experiments with Green IT Systems", "Industry and Transport Green IT Systems", "Social, Educational and Business Aspects of Green IT", it presents results in two areas - the green components, networks, cloud and IoT systems and infrastructures; and the industry, business, social and education domains. It discusses hot topics such as programmable embedded and mobile systems, sustainable software and data centers, Internet servicing and cyber social computing, assurance cases and lightweight cryptography in context of green IT. Intended for university students, lecturers and researchers who are interested in power saving and sustainable computing, the book also appeals to engineers and managers of companies that develop and implement energy efficient IT applications.
Control system design is a challenging task for practicing engineers. It requires knowledge of different engineering fields, a good understanding of technical specifications and good communication skills. The current book introduces the reader into practical control system design, bridging the gap between theory and practice. The control design techniques presented in the book are all model based., considering the needs and possibilities of practicing engineers. Classical control design techniques are reviewed and methods are presented how to verify the robustness of the design. It is how the designed control algorithm can be implemented in real-time and tested, fulfilling different safety requirements. Good design practices and the systematic software development process are emphasized in the book according to the generic standard IEC61508. The book is mainly addressed to practicing control and embedded software engineers - working in research and development - as well as graduate students who are faced with the challenge to design control systems and implement them in real-time."
This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution. |
![]() ![]() You may like...
Well-Quasi Orders in Computation, Logic…
Peter M. Schuster, Monika Seisenberger, …
Hardcover
R4,944
Discovery Miles 49 440
The Dark Side of Silicon - Energy…
Amir M. Rahmani, Pasi Liljeberg, …
Hardcover
Hybrid ADCs, Smart Sensors for the IoT…
Pieter Harpe, Kofi A. A. Makinwa, …
Hardcover
R5,412
Discovery Miles 54 120
Learn to Design a Website for Your…
Michael Nelson, David Ezeanaka
Hardcover
R502
Discovery Miles 5 020
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,539
Discovery Miles 15 390
|