0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (66)
  • R500+ (5,381)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Sublinear Algorithms for Big Data Applications (Paperback, 1st ed. 2015): Dan Wang, Zhu Han Sublinear Algorithms for Big Data Applications (Paperback, 1st ed. 2015)
Dan Wang, Zhu Han
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algorithms, explaining why they are vital to large scale data systems. It also demonstrates how to apply sublinear algorithms to three familiar big data applications: wireless sensor networks, big data processing in Map Reduce and smart grids. These applications present common experiences, bridging the theoretical advances of sublinear algorithms and the application domain. Sublinear Algorithms for Big Data Applications is suitable for researchers, engineers and graduate students in the computer science, communications and signal processing communities.

Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Paperback, Softcover reprint... Real-time Security Extensions for EPCglobal Networks - Case Study for the Pharmaceutical Industry (Paperback, Softcover reprint of the original 1st ed. 2014)
Matthieu-P. Schapranow
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business partners. Data protection of sensitive business secrets is therefore the major aspect that needs to be clarified before companies will start to adopt EPCglobal networks. This book contributes to this proposition as follows: it defines the design of transparent real-time security extensions for EPCglobal networks based on in-memory technology. For that, it defines authentication protocols for devices with low computational resources, such as passive RFID tags, and evaluates their applicability. Furthermore, it outlines all steps for implementing history-based access control for EPCglobal software components, which enables a continuous control of access based on the real-time analysis of the complete query history and a fine-grained filtering of event data. The applicability of these innovative data protection mechanisms is underlined by their exemplary integration in the FOSSTRAK architecture.

Guide to Programming and Algorithms Using R (Paperback, Softcover reprint of the original 1st ed. 2013): OEzgur Ergul Guide to Programming and Algorithms Using R (Paperback, Softcover reprint of the original 1st ed. 2013)
OEzgur Ergul
R2,064 Discovery Miles 20 640 Ships in 10 - 15 working days

This easy-to-follow textbook provides a student-friendly introduction to programming and algorithms. Emphasis is placed on the threshold concepts that present barriers to learning, including the questions that students are often too embarrassed to ask. The book promotes an active learning style in which a deeper understanding is gained from evaluating, questioning, and discussing the material, and practised in hands-on exercises. Although R is used as the language of choice for all programs, strict assumptions are avoided in the explanations in order for these to remain applicable to other programming languages. Features: provides exercises at the end of each chapter; includes three mini projects in the final chapter; presents a list of titles for further reading at the end of the book; discusses the key aspects of loops, recursions, program and algorithm efficiency and accuracy, sorting, linear systems of equations, and file processing; requires no prior background knowledge in this area.

Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers... Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Xing Zhang, Zhonghai Wu, Xingmian Sha
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.

Distributed Graph Algorithms for Computer Networks (Paperback, 2013 ed.): Kayhan Erciyes Distributed Graph Algorithms for Computer Networks (Paperback, 2013 ed.)
Kayhan Erciyes
R2,752 Discovery Miles 27 520 Ships in 10 - 15 working days

This book presents a comprehensive review of key distributed graph algorithms for computer network applications, with a particular emphasis on practical implementation. Topics and features: introduces a range of fundamental graph algorithms, covering spanning trees, graph traversal algorithms, routing algorithms, and self-stabilization; reviews graph-theoretical distributed approximation algorithms with applications in ad hoc wireless networks; describes in detail the implementation of each algorithm, with extensive use of supporting examples, and discusses their concrete network applications; examines key graph-theoretical algorithm concepts, such as dominating sets, and parameters for mobility and energy levels of nodes in wireless ad hoc networks, and provides a contemporary survey of each topic; presents a simple simulator, developed to run distributed algorithms; provides practical exercises at the end of each chapter.

ISPF Programmer's Guide (Paperback, Digital original): Franz Lanz ISPF Programmer's Guide (Paperback, Digital original)
Franz Lanz
R1,681 R1,349 Discovery Miles 13 490 Save R332 (20%) Ships in 10 - 15 working days

This book is intended to support ISPF application programmers to become professional in the smart programming of ISPF applications using the REXX language. The contents are presented in a modular manner to suit reading with heterogeneous ISPF programming knowledge. The following topics are covered: Introduction to the programming language REXX as well as to ISPF programming, data processing in ISPF applications, use of messages, panels, skeletons, tables, ISPF variables and an introduction to creating and applying edit macros. Each theme is vividly illustrated by programming examples. The Smart ISPF Utilities contain some very useful programming aids that are often useful when programming ISPF applications. The book serves as a textbook as well as a manual for daily work. Many cross-references are included as well as an extensive index. Moreover, the author gives many helpful hints and tips on smart ISPF programming practices. The Smart ISPF Utilities contain many useful programming aids.

Databases Theory and Applications - 26th Australasian Database Conference, ADC 2015, Melbourne, VIC, Australia, June 4-7, 2015.... Databases Theory and Applications - 26th Australasian Database Conference, ADC 2015, Melbourne, VIC, Australia, June 4-7, 2015. Proceedings (Paperback, 2015 ed.)
Mohamed A. Sharaf, Muhammad Aamir Cheema, Jianzhong Qi
R2,547 Discovery Miles 25 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 26th Australasian Database Conference, ADC 2015, held in Melbourne, VIC, Australia, in June 2015. The 24 full papers presented together with 5 demo papers were carefully reviewed and selected from 43 submissions. The Australasian Database Conference is an annual international forum for sharing the latest research advancements and novel applications of database systems, data driven applications and data analytics between researchers and practitioners from around the globe, particularly Australia and New Zealand. The mission of ADC is to share novel research solutions to problems of today's information society that fulfill the needs of heterogeneous applications and environments and to identify new issues and directions for future research. ADC seeks papers from academia and industry presenting research on all practical and theoretical aspects of advanced database theory and applications, as well as case studies and implementation experiences.

A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to... A Real-Time In-Memory Discovery Service - Leveraging Hierarchical Packaging Information in a Unique Identifier Network to Retrieve Track and Trace Information (Paperback, 2013 ed.)
Jurgen Muller
R2,052 Discovery Miles 20 520 Ships in 10 - 15 working days

The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.

Analytical and Stochastic Modelling Techniques and Applications - 22nd International Conference, ASMTA 2015, Albena, Bulgaria,... Analytical and Stochastic Modelling Techniques and Applications - 22nd International Conference, ASMTA 2015, Albena, Bulgaria, May 26-29, 2015. Proceedings (Paperback, 2015 ed.)
Marco Gribaudo, Daniele Manini, Anne Remke
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2015, held in Albena, Bulgaria, in May 2015. The 15 full papers presented in this book were carefully reviewed and selected from numerous submissions. The papers discuss the latest developments in analytical, numerical and simulation algorithms for stochastic systems, including Markov processes, queueing networks, stochastic Petri nets, process algebras, game theory, etc.

Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015,... Web and Internet Economics - 11th International Conference, WINE 2015, Amsterdam, The Netherlands, December 9-12, 2015, Proceedings (Paperback, 1st ed. 2015)
Evangelos Markakis, Guido Schafer
R2,853 Discovery Miles 28 530 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Web and Internet Economics, WINE 2015, held in Amsterdam, The Netherlands, in December 2015. The 30 regular papers presented together with 8 abstracts were carefully reviewed and selected from 142 submissions and cover results on incentives and computation in theoretical computer science, artificial intelligence, and microeconomics.

Digital Signal Processing with Field Programmable Gate Arrays (Hardcover, 4th ed. 2014): Uwe Meyer-Baese Digital Signal Processing with Field Programmable Gate Arrays (Hardcover, 4th ed. 2014)
Uwe Meyer-Baese
R3,187 Discovery Miles 31 870 Ships in 12 - 17 working days

Field-Programmable Gate Arrays (FPGAs) are revolutionizing digital signal processing. The efficient implementation of front-end digital signal processing algorithms is the main goal of this book. It starts with an overview of today's FPGA technology, devices and tools for designing state-of-the-art DSP systems. A case study in the first chapter is the basis for more than 40 design examples throughout. The following chapters deal with computer arithmetic concepts, theory and the implementation of FIR and IIR filters, multirate digital signal processing systems, DFT and FFT algorithms, advanced algorithms with high future potential, and adaptive filters. Each chapter contains exercises. The VERILOG source code and a glossary are given in the appendices. This new edition incorporates Over 10 new system level case studies designed in VHDL and Verilog A new chapter on image and video processing An Altera Quartus update and new Model Sim simulations Xilinx Atlys board and ISIM simulation support Signed fixed point and floating point IEEE library examples An overview on parallel all-pass IIR filter design ICA and PCA system level designs Speech and audio coding for MP3 and ADPCM

Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Paperback, 2013 ed.): Eric Peeters Advanced DPA Theory and Practice - Towards the Security Limits of Secure Embedded Circuits (Paperback, 2013 ed.)
Eric Peeters
R3,333 Discovery Miles 33 330 Ships in 10 - 15 working days

Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely the power and the electromagnetic emanations. The book presents a thorough analysis about leakage origin of embedded system. This book examines the systematic approach of the different aspects and advanced details about experimental setup for electromagnetic attack. The author discusses advanced statistical methods to successfully attack embedded devices such as high-order attack, template attack in principal subspaces, machine learning methods. The book includes theoretical framework to define side-channel based on two metrics: mutual information and success rate.

Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.): Song Y. Yan Quantum Attacks on Public-Key Cryptosystems (Paperback, 2013 ed.)
Song Y. Yan
R3,510 Discovery Miles 35 100 Ships in 10 - 15 working days

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists. Quantum Attacks on Public-Key Cryptosystems presemts almost all known quantum computing based attacks on public-key cryptosystems, with an emphasis on quantum algorithms for IFP, DLP, and ECDLP. It also discusses some quantum resistant cryptosystems to replace the IFP, DLP and ECDLP based cryptosystems. This book is intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the field.

Evolutionary and Biologically Inspired Music, Sound, Art and Design - 4th International Conference, EvoMUSART 2015, Copenhagen,... Evolutionary and Biologically Inspired Music, Sound, Art and Design - 4th International Conference, EvoMUSART 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings (Paperback, 2015 ed.)
Colin Johnson, Adrian Carballal, Joao Correia
R2,335 Discovery Miles 23 350 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th International Conference on Biologically Inspired Music, Sound, Art and Design, EvoMUSART 2015, held in Copenhagen, Denmark, in April 2015, co-located with the Evo* 2015 events EuroGP, EvoCOP and Evo Applications. The 23 revised full papers presented were carefully reviewed and selected from 43 submissions. They cover a wide range of topics and application areas, including generative approaches to music, graphics, game content and narrative; music information retrieval; computational aesthetics; the mechanics of interactive evolutionary computation and the art theory of evolutionary computation.

Computer Engineering and Technology - 18th CCF Conference, NCCET 2014, Guiyang, China, July 29 -- August 1, 2014. Revised... Computer Engineering and Technology - 18th CCF Conference, NCCET 2014, Guiyang, China, July 29 -- August 1, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Weixia Xu, Liquan Xiao, Jinwen Li, Chengyi Zhang, Zhenzhen Zhu
R1,511 Discovery Miles 15 110 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th National Conference on Computer Engineering and Technology, NCCET 2014, held in Guiyang, China, during July/August 2014. The 18 papers presented were carefully reviewed and selected from 85 submissions. They are organized in topical sections on processor architecture; computer application and software optimization; technology on the horizon.

Genetic Programming - 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings (Paperback,... Genetic Programming - 18th European Conference, EuroGP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings (Paperback, 2015 ed.)
Penousal Machado, Malcolm I. Heywood, James McDermott, Mauro Castelli, Pablo Garcia-Sanchez, …
R2,205 Discovery Miles 22 050 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th European Conference on Genetic Programming, EuroGP 2015, held in Copenhagen, Spain, in April 2015 co-located with the Evo 2015 events, EvoCOP, Evo MUSART and Evo Applications. The 12 revised full papers presented together with 6 poster papers were carefully reviewed and selected form 36 submissions. The wide range of topics in this volume reflects the current state of research in the field. Thus, we see topics as diverse as semantic methods, recursive programs, grammatical methods, coevolution, Cartesian GP, feature selection, initialisation procedures, ensemble methods and search objectives; and applications including text processing, cryptography, numerical modelling, software parallelisation, creation and optimisation of circuits, multi-class classification, scheduling and artificial intelligence.

Proceedings of Fourth International Conference on Soft Computing for Problem Solving - SocProS 2014, Volume 2 (Paperback, 2015... Proceedings of Fourth International Conference on Soft Computing for Problem Solving - SocProS 2014, Volume 2 (Paperback, 2015 ed.)
Kedarnath Das, Kusum Deep, Millie Pant, Jagdish Chand Bansal, Atulya Nagar
R5,819 Discovery Miles 58 190 Ships in 10 - 15 working days

The Proceedings of SocProS 2014 serves as an academic bonanza for scientists and researchers working in the field of Soft Computing. This book contains theoretical as well as practical aspects using fuzzy logic, neural networks, evolutionary algorithms, swarm intelligence algorithms, etc., with many applications under the umbrella of 'Soft Computing'. The book is beneficial for young as well as experienced researchers dealing across complex and intricate real world problems for which finding a solution by traditional methods is a difficult task. The different application areas covered in the Proceedings are: Image Processing, Cryptanalysis, Industrial Optimization, Supply Chain Management, Newly Proposed Nature Inspired Algorithms, Signal Processing, Problems related to Medical and Healthcare, Networking Optimization Problems, etc.

Metrics at Work - Journalism and the Contested Meaning of Algorithms (Hardcover): Angele Christin Metrics at Work - Journalism and the Contested Meaning of Algorithms (Hardcover)
Angele Christin
R1,041 Discovery Miles 10 410 Ships in 12 - 17 working days

The starkly different ways that American and French online news companies respond to audience analytics and what this means for the future of news When the news moved online, journalists suddenly learned what their audiences actually liked, through algorithmic technologies that scrutinize web traffic and activity. Has this advent of audience metrics changed journalists' work practices and professional identities? In Metrics at Work, Angele Christin documents the ways that journalists grapple with audience data in the form of clicks, and analyzes how new forms of clickbait journalism travel across national borders. Drawing on four years of fieldwork in web newsrooms in the United States and France, including more than one hundred interviews with journalists, Christin reveals many similarities among the media groups examined-their editorial goals, technological tools, and even office furniture. Yet she uncovers crucial and paradoxical differences in how American and French journalists understand audience analytics and how these affect the news produced in each country. American journalists routinely disregard traffic numbers and primarily rely on the opinion of their peers to define journalistic quality. Meanwhile, French journalists fixate on internet traffic and view these numbers as a sign of their resonance in the public sphere. Christin offers cultural and historical explanations for these disparities, arguing that distinct journalistic traditions structure how journalists make sense of digital measurements in the two countries. Contrary to the popular belief that analytics and algorithms are globally homogenizing forces, Metrics at Work shows that computational technologies can have surprisingly divergent ramifications for work and organizations worldwide.

Big Data Integration (Paperback): Xin Luna Dong, Divesh Srivastava Big Data Integration (Paperback)
Xin Luna Dong, Divesh Srivastava
R1,526 Discovery Miles 15 260 Ships in 10 - 15 working days

The big data era is upon us: data are being generated, analyzed, and used at an unprecedented scale, and data-driven decision making is sweeping through all aspects of society. Since the value of data explodes when it can be linked and fused with other data, addressing the big data integration (BDI) challenge is critical to realizing the promise of big data. BDI differs from traditional data integration along the dimensions of volume, velocity, variety, and veracity. First, not only can data sources contain a huge volume of data, but also the number of data sources is now in the millions. Second, because of the rate at which newly collected data are made available, many of the data sources are very dynamic, and the number of data sources is also rapidly exploding. Third, data sources are extremely heterogeneous in their structure and content, exhibiting considerable variety even for substantially similar entities. Fourth, the data sources are of widely differing qualities, with significant differences in the coverage, accuracy and timeliness of data provided. This book explores the progress that has been made by the data integration community on the topics of schema alignment, record linkage and data fusion in addressing these novel challenges faced by big data integration. Each of these topics is covered in a systematic way: first starting with a quick tour of the topic in the context of traditional data integration, followed by a detailed, example-driven exposition of recent innovative techniques that have been proposed to address the BDI challenges of volume, velocity, variety, and veracity. Finally, it presents merging topics and opportunities that are specific to BDI, identifying promising directions for the data integration community.

Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6,... Applications and Techniques in Information Security - 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings (Paperback, 1st ed. 2015)
Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, …
R2,712 Discovery Miles 27 120 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2015, held in Beijing, China, in November 2015. The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on invited speeches; cryptograph; evaluation, standards and protocols; trust computing and privacy protection; cloud security and applications; tools and methodologies; system design and implementations.

Wireless Sensor Networks - 12th European Conference, EWSN 2015, Porto, Portugal, February 9-11, 2015, Proceedings (Paperback,... Wireless Sensor Networks - 12th European Conference, EWSN 2015, Porto, Portugal, February 9-11, 2015, Proceedings (Paperback, 2015 ed.)
Tarek Abdelzaher, Nuno Pereira, Eduardo Tovar
R1,548 Discovery Miles 15 480 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12 European Conference on Wireless Sensor Networks, EWSN 2015, held in Porto, Portugal, in February 2015. The 14 full papers and 9 short papers presented were carefully reviewed and selected from 85 submissions. They cover a wide range of topics grouped into five sessions: services and applications, mobility and delay-tolerance, routing and data dissemination, and human-centric sensing.

WALCOM: Algorithms and Computation - 9th International Workshop, WALCOM 2015, Dhaka, Bangladesh, February 26-28, 2015,... WALCOM: Algorithms and Computation - 9th International Workshop, WALCOM 2015, Dhaka, Bangladesh, February 26-28, 2015, Proceedings (Paperback, 2015 ed.)
M. Sohel Rahman, Etsuji Tomita
R2,547 Discovery Miles 25 470 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed conference proceedings of the 9th International Workshop on Algorithms and Computation, WALCOM 2015, held in Dhaka, Bangladesh, in February 2015. The 26 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on approximation algorithms, data structures and algorithms, computational geometry, combinatorial algorithms, distributed and online algorithms, graph drawing and algorithms, combinatorial problems and complexity, and graph enumeration and algorithms.

Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings... Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings (Paperback, 2015 ed.)
Frank Piessens, Juan Caballero, Nataliia Bielova
R2,193 Discovery Miles 21 930 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.

Material Selections by a Hybrid Multi-Criteria Approach (Paperback, 2015 ed.): Fabrizio D'Errico Material Selections by a Hybrid Multi-Criteria Approach (Paperback, 2015 ed.)
Fabrizio D'Errico
R1,875 Discovery Miles 18 750 Ships in 10 - 15 working days

This Brief presents a new method that is based on the author and his students' shared experience in applying a structured procedure that has as its main goal the creation of a material selection technique that uses language and employs a platform that is not restricted to engineers. Based on a hybrid approach that exploits both traditional and semi-quantitative concepts, it moves forward step-by step, and uses a platform based on a Quality Function Deployment matrix framework. Candidate materials are screened out and finally assessed by two user-friendly graphic analysis tools, one based on the value curve of the product and the other on an original Bubble Maps tool. The Brief is written for all those whose aim is for a better understanding of how to integrate and speed up the entire product development process from the initial product concept and engineering design phases to design specs, manufacturability and product marketing with optimal choice of materials.

Embedded Firmware Solutions - Development Best Practices for the Internet of Things (Paperback, 1st ed.): Vincent Zimmer,... Embedded Firmware Solutions - Development Best Practices for the Internet of Things (Paperback, 1st ed.)
Vincent Zimmer, Jiming Sun, Marc Jones, Stefan Reinauer
R1,142 Discovery Miles 11 420 Ships in 10 - 15 working days

Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate Intel (R) Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano Paperback R2,263 Discovery Miles 22 630
Video Surveillance Techniques and…
Vesna Zeljkovic Hardcover R5,929 Discovery Miles 59 290
Gamma Solution - An Application of…
James R Warren Hardcover R1,373 R1,138 Discovery Miles 11 380
A Textbook of Data Structures and…
Vijayalakshmi P Hardcover R3,789 Discovery Miles 37 890
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,375 Discovery Miles 33 750
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,816 Discovery Miles 28 160
Introduction to the Design and Analysis…
Anany Levitin Paperback R2,339 Discovery Miles 23 390
Python Programming for Computations…
Computer Language Hardcover R1,248 R1,028 Discovery Miles 10 280
Innovative Research and Applications in…
Qusay F. Hassan Hardcover R5,692 Discovery Miles 56 920
C Programming - C Programming Language…
Adam Dodson Hardcover R614 R521 Discovery Miles 5 210

 

Partners