0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (5)
  • R250 - R500 (57)
  • R500+ (5,352)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Language and Automata Theory and Applications - 7th International Conference, LATA 2013, Bilbao, Spain, April 2-5, 2013,... Language and Automata Theory and Applications - 7th International Conference, LATA 2013, Bilbao, Spain, April 2-5, 2013, Proceedings (Paperback, 2013 ed.)
Adrian Horia Dediu, Carlos Martin-Vide, Bianca Truthe
R1,489 Discovery Miles 14 890 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Language and Automata Theory and Applications, LATA 2013, held in Bilbao, Spain in April 2013.
The 45 revised full papers presented together with 5 invited talks were carefully reviewed and selected from 97 initial submissions. The volume features contributions from both classical theory fields and application areas (bioinformatics, systems biology, language technology, artificial intelligence, etc.). Among the topics covered are algebraic language theory; algorithms for semi-structured data mining; algorithms on automata and words; automata and logic; automata for system analysis and program verification; automata, concurrency and Petri nets; automatic structures; cellular automata; combinatorics on words; computability; computational complexity; computational linguistics; data and image compression; decidability questions on words and languages; descriptional complexity; DNA and other models of bio-inspired computing; document engineering; foundations of finite state technology; foundations of XML; fuzzy and rough languages; grammars (Chomsky hierarchy, contextual, multidimensional, unification, categorial, etc.); grammars and automata architectures; grammatical inference and algorithmic learning; graphs and graph transformation; language varieties and semigroups; language-based cryptography; language-theoretic foundations of artificial intelligence and artificial life; parallel and regulated rewriting; parsing; pattern recognition; patterns and codes; power series; quantum, chemical and optical computing; semantics; string and combinatorial issues in computational biology and bioinformatics; string processing algorithms; symbolic dynamics; symbolic neural networks; term rewriting; transducers; trees, tree languages and tree automata; weighted automata.

Combinatorial Pattern Matching - 25th Annual Symposium, CPM 2014, Moscow, Russia, June 16-18, 2014. Proceedings (Paperback,... Combinatorial Pattern Matching - 25th Annual Symposium, CPM 2014, Moscow, Russia, June 16-18, 2014. Proceedings (Paperback, 2014 ed.)
Alexander S. Kulikov, Sergei O. Kuznetsov, Pavel Pevzner
R2,174 Discovery Miles 21 740 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 25th Annual Symposium on Combinatorial Pattern Matching, CPM 2014, held in Moscow, Russia, in June 2014. The 28 revised full papers presented together with 5 invited talks were carefully reviewed and selected from 54 submissions. The papers address issues of searching and matching strings and more complicated patterns such as trees; regular expressions; graphs; point sets; and arrays. The goal is to derive combinatorial properties of such structures and to exploit these properties in order to achieve superior performance for the corresponding computational problems. The meeting also deals with problems in computational biology; data compression and data mining; coding; information retrieval; natural language processing; and pattern recognition.

Mathematical and Engineering Methods in Computer Science - 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech... Mathematical and Engineering Methods in Computer Science - 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Antonin Kucera, Thomas A. Henzinger, Jaroslav Nesetril, Tomas Vojnar, David Antos
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This volume contains the post-proceedings of the 8th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2012, held in Znojmo, Czech Republic, in October, 2012. The 13 thoroughly revised papers were carefully selected out of 31 submissions and are presented together with 6 invited papers. The topics covered by the papers include: computer-aided analysis and verification, applications of game theory in computer science, networks and security, modern trends of graph theory in computer science, electronic systems design and testing, and quantum information processing.

Computable Analysis - An Introduction (Paperback, Softcover reprint of the original 1st ed. 2000): Klaus Weihrauch Computable Analysis - An Introduction (Paperback, Softcover reprint of the original 1st ed. 2000)
Klaus Weihrauch
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

Is the exponential function computable? Are union and intersection of closed subsets of the real plane computable? Are differentiation and integration computable operators? Is zero finding for complex polynomials computable? Is the Mandelbrot set decidable? And in case of computability, what is the computational complexity? Computable analysis supplies exact definitions for these and many other similar questions and tries to solve them. - Merging fundamental concepts of analysis and recursion theory to a new exciting theory, this book provides a solid basis for studying various aspects of computability and complexity in analysis. It is the result of an introductory course given for several years and is written in a style suitable for graduate-level and senior students in computer science and mathematics. Many examples illustrate the new concepts while numerous exercises of varying difficulty extend the material and stimulate readers to work actively on the text.

Algorithms for Sensor Systems - 8th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and... Algorithms for Sensor Systems - 8th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2012, Ljubljana, Slovenia, September 13-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Amotz Bar-Noy, Magnus M. Halldorsson
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2012, held in Ljubljana, Slovenia, in September 2012. The 11 revised full papers presented together with two invited keynote talks and two brief announcements were carefully reviewed and selected from 24 submissions. The papers are organized in two tracks: sensor networks - covering topics such as barrier resilience, localization, connectivity with directional antennas, broadcast scheduling, and data aggregation; and ad hoc wireless and mobile systems - covering topics such as: SINR model; geometric routing; cognitive radio networks; video delivery; and mapping polygons.

Advances in Computing, Communication, and Control - Third International Conference, ICAC3 2013, Mumbai, India, January 18-19,... Advances in Computing, Communication, and Control - Third International Conference, ICAC3 2013, Mumbai, India, January 18-19, 2013, Proceedings (Paperback, 2013 ed.)
Srija Unnikrishnan, Sunil Surve, Deepak Bhoir
R2,780 Discovery Miles 27 800 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Advances in Computing, Communication and Control, ICAC3 2013, held in Mumbai, India, in January 2013. The 69 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They deal with topics such as image processing, artificial intelligence, robotics, wireless communications; data warehousing and mining, and are organized in topical sections named: computing; communication; control; and others.

Reversible Computation - 4th International Workshop, RC 2012, Copenhagen, Denmark, July 2-3, 2012, Revised Papers (Paperback,... Reversible Computation - 4th International Workshop, RC 2012, Copenhagen, Denmark, July 2-3, 2012, Revised Papers (Paperback, 2013 ed.)
Robert Gluck, Tetsuo Yokoyama
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Workshop on Reversible Computation, RC 2012, held in Copenhagen, Denmark, in July 2012. The 19 contributions presented in this volume were carefully reviewed and selected from 46 submissions. The papers cover theoretical considerations, reversible software and reversible hardware, and physical realizations and applications in quantum computing.

Theory of Quantum Computation, Communication, and Cryptography - 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012,... Theory of Quantum Computation, Communication, and Cryptography - 7th Conference, TQC 2012, Tokyo, Japan, May 17-19, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Kazuo Iwama, Yasuhito Kawano, Mio Murao
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012. The 12 papers presented were carefully reviewed and selected for inclusion in this book. They contain original research on the rapidly growing, interdisciplinary field of quantum computation, communication and cryptography. Topics addressed are such as quantum algorithms, quantum computation models, quantum complexity theory, simulation of quantum systems, quantum programming languages, quantum cryptography, quantum communication, quantum estimation, quantum measurement, quantum tomography, completely positive maps, decoherence, quantum noise, quantum coding theory, fault-tolerant quantum computing, entanglement theory, and quantum teleportation.

Selected Areas in Cryptography - 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected... Selected Areas in Cryptography - 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Lars R. Knudsen, Huapeng Wu
R1,442 Discovery Miles 14 420 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.

Bioinspired Computation in Combinatorial Optimization - Algorithms and Their Computational Complexity (Paperback, 2010 ed.):... Bioinspired Computation in Combinatorial Optimization - Algorithms and Their Computational Complexity (Paperback, 2010 ed.)
Frank Neumann, Carsten Witt
R1,390 Discovery Miles 13 900 Ships in 18 - 22 working days

Bioinspired computation methods such as evolutionary algorithms and ant colony optimization are being applied successfully to complex engineering problems and to problems from combinatorial optimization, and with this comes the requirement to more fully understand the computational complexity of these search heuristics. This is the first textbook covering the most important results achieved in this area.

The authors study the computational complexity of bioinspired computation and show how runtime behavior can be analyzed in a rigorous way using some of the best-known combinatorial optimization problems -- minimum spanning trees, shortest paths, maximum matching, covering and scheduling problems. A feature of the book is the separate treatment of single- and multiobjective problems, the latter a domain where the development of the underlying theory seems to be lagging practical successes.

This book will be very valuable for teaching courses on bioinspired computation and combinatorial optimization. Researchers will also benefit as the presentation of the theory covers the most important developments in the field over the last 10 years. Finally, with a focus on well-studied combinatorial optimization problems rather than toy problems, the book will also be very valuable for practitioners in this field.

Structural Information and Communication Complexity - 20th International Colloquium, SIROCCO 2013, Ischia, Italy, July 1-3,... Structural Information and Communication Complexity - 20th International Colloquium, SIROCCO 2013, Ischia, Italy, July 1-3, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Thomas Moscibroda, Adele a Rescigno
R2,344 Discovery Miles 23 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2013, held in Ischia, Italy, in July 2013. The 28 revised full papers presented were carefully reviewed and selected from 67 submissions. SIROCCO is devoted to the study of communication and knowledge in distributed systems. Special emphasis is given to innovative approaches and fundamental understanding, in addition to efforts to optimize current designs. The typical areas include distributed computing, communication networks, game theory, parallel computing, social networks, mobile computing (including autonomous robots), peer to peer systems, communication complexity, fault tolerant graph theories and randomized/probabilistic issues in networks.

Big Data Analytics - Second International Conference, BDA 2013, Mysore, India, December 16-18, 2013, Proceedings (Paperback,... Big Data Analytics - Second International Conference, BDA 2013, Mysore, India, December 16-18, 2013, Proceedings (Paperback, 2013 ed.)
Vasudha Bhatnagar, Srinath Srinivasa
R1,920 Discovery Miles 19 200 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the Second International Conference on Big Data Analytics, BDA 2013, held in Mysore, India, in December 2013. The 13 revised full papers were carefully reviewed and selected from 49 submissions and cover topics on mining social media data, perspectives on big data analysis, graph analysis, big data in practice.

Pairing-Based Cryptography -- Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected... Pairing-Based Cryptography -- Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Michel Abdalla, Tanja Lange
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applications.

Feature Selection for Knowledge Discovery and Data Mining (Paperback, Softcover reprint of the original 1st ed. 1998): Huan... Feature Selection for Knowledge Discovery and Data Mining (Paperback, Softcover reprint of the original 1st ed. 1998)
Huan Liu, Hiroshi Motoda
R8,752 Discovery Miles 87 520 Ships in 18 - 22 working days

As computer power grows and data collection technologies advance, a plethora of data is generated in almost every field where computers are used. The com puter generated data should be analyzed by computers; without the aid of computing technologies, it is certain that huge amounts of data collected will not ever be examined, let alone be used to our advantages. Even with today's advanced computer technologies (e. g. , machine learning and data mining sys tems), discovering knowledge from data can still be fiendishly hard due to the characteristics of the computer generated data. Taking its simplest form, raw data are represented in feature-values. The size of a dataset can be measUJ*ed in two dimensions, number of features (N) and number of instances (P). Both Nand P can be enormously large. This enormity may cause serious problems to many data mining systems. Feature selection is one of the long existing methods that deal with these problems. Its objective is to select a minimal subset of features according to some reasonable criteria so that the original task can be achieved equally well, if not better. By choosing a minimal subset offeatures, irrelevant and redundant features are removed according to the criterion. When N is reduced, the data space shrinks and in a sense, the data set is now a better representative of the whole data population. If necessary, the reduction of N can also give rise to the reduction of P by eliminating duplicates.

Efficient Algorithms for Discrete Wavelet Transform - With Applications to Denoising and Fuzzy Inference Systems (Paperback,... Efficient Algorithms for Discrete Wavelet Transform - With Applications to Denoising and Fuzzy Inference Systems (Paperback, 2013 ed.)
K.K. Shukla, Arvind K. Tiwari
R1,635 Discovery Miles 16 350 Ships in 18 - 22 working days

Due to its inherent time-scale locality characteristics, the discrete wavelet transform (DWT) has received considerable attention in signal/image processing. Wavelet transforms have excellent energy compaction characteristics and can provide perfect reconstruction. The shifting (translation) and scaling (dilation) are unique to wavelets. Orthogonality of wavelets with respect to dilations leads to multigrid representation. As the computation of DWT involves filtering, an efficient filtering process is essential in DWT hardware implementation. In the multistage DWT, coefficients are calculated recursively, and in addition to the wavelet decomposition stage, extra space is required to store the intermediate coefficients. Hence, the overall performance depends significantly on the precision of the intermediate DWT coefficients. This work presents new implementation techniques of DWT, that are efficient in terms of computation, storage, and with better signal-to-noise ratio in the reconstructed signal.

Video and Image Processing in Multimedia Systems (Paperback, Softcover reprint of the original 1st ed. 1995): Borko Furht,... Video and Image Processing in Multimedia Systems (Paperback, Softcover reprint of the original 1st ed. 1995)
Borko Furht, Stephen W. Smoliar, HongJiang Zhang
R5,170 Discovery Miles 51 700 Ships in 18 - 22 working days

Video and Image Processing in Multimedia Systems treats a number of critical topics in multimedia systems, with respect to image and video processing techniques and their implementations. These techniques include: * Image and video compression techniques and standards, and * Image and video indexing and retrieval techniques. Video and Image Processing in Multimedia Systems is divided into three parts. Part I serves as an introduction to multimedia systems, discussing basic concepts, multimedia networking and synchronization, and an overview of multimedia applications. Part II presents comprehensive coverage of image and video compression techniques and standards, their implementations and applications. Because multimedia data (specifically video and images) require efficient compression techniques in order to be stored and delivered in real-time, video and image compression is a crucial element of an effective multimedia system. In Part III attention is focused on the semantic nature of image and video source material, and how that material may be effectively indexed and retrieved.Topics discussed include static images, full-motion video, and the manner in which compressed representations can facilitate structural analysis. Part III concludes with an extended discussion of a case study. This book serves as an invaluable reference with respect to the most important standards in the field. Video and Image Processing in Multimedia Systems is suitable as a textbook for course use.

Evolution as Computation - DIMACS Workshop, Princeton, January 1999 (Paperback, Softcover reprint of the original 1st ed.... Evolution as Computation - DIMACS Workshop, Princeton, January 1999 (Paperback, Softcover reprint of the original 1st ed. 2002)
Laura F. Landweber, Erik Winfree
R2,668 Discovery Miles 26 680 Ships in 18 - 22 working days

The study of the genetic basis for evolution has flourished in this century, as well as our understanding of the evolvability and programmability of biological systems. Genetic algorithms meanwhile grew out of the realization that a computer program could use the biologically-inspired processes of mutation, recombination, and selection to solve hard optimization problems. Genetic and evolutionary programming provide further approaches to a wide variety of computational problems. A synthesis of these experiences reveals fundamental insights into both the computational nature of biological evolution and processes of importance to computer science. Topics include biological models of nucleic acid information processing and genome evolution; molecules, cells, and metabolic circuits that compute logical relationships; the origin and evolution of the genetic code; and the interface with genetic algorithms and genetic and evolutionary programming.

Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014.... Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings (Paperback, 2014 ed.)
Jan Jurjens, Frank Piessens, Nataliia Bielova
R2,026 Discovery Miles 20 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

LATIN 2014: Theoretical Informatics - 11th Latin American Symposium, Montevideo, Uruguay, March 31 -- April 4, 2014.... LATIN 2014: Theoretical Informatics - 11th Latin American Symposium, Montevideo, Uruguay, March 31 -- April 4, 2014. Proceedings (Paperback, 2014)
Alberto Pardo, Alfredo Viola
R1,544 Discovery Miles 15 440 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th Latin American Symposium on Theoretical Informatics, LATIN 2014, held in Montevideo, Uruguay, in March/April 2014. The 65 papers presented together with 5 abstracts were carefully reviewed and selected from 192 submissions. The papers address a variety of topics in theoretical computer science with a certain focus on complexity, computational geometry, graph drawing, automata, computability, algorithms on graphs, algorithms, random structures, complexity on graphs, analytic combinatorics, analytic and enumerative combinatorics, approximation algorithms, analysis of algorithms, computational algebra, applications to bioinformatics, budget problems and algorithms and data structures.

Structure and Evolution (Hardcover): Binxing Fang, Yan Jia Structure and Evolution (Hardcover)
Binxing Fang, Yan Jia; Contributions by Publishing House of Electronics Industry
R2,759 R2,170 Discovery Miles 21 700 Save R589 (21%) Ships in 18 - 22 working days

The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 1 of the set mainly focuses on the structure characteristics, the modeling, and the evolution mechanism of social network analysis. Techniques and approaches for virtual community detection are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.

Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013):... Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013)
Marc Fischlin, Stefan Katzenbeisser
R1,295 Discovery Miles 12 950 Ships in 18 - 22 working days

Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.

Formal Methods for Open Object-Based Distributed Systems - IFIP TC6 / WG6.1 Third International Conference on Formal Methods... Formal Methods for Open Object-Based Distributed Systems - IFIP TC6 / WG6.1 Third International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS), February 15-18, 1999, Florence, Italy (Paperback, Softcover reprint of the original 1st ed. 1999)
Paolo Ciancarini, Alessandro Fantechi, Roberto Gorrieri
R5,186 Discovery Miles 51 860 Ships in 18 - 22 working days

Formal Methods for Open Object-Based Distributed Systems presents the leading edge in several related fields, specifically object-orientated programming, open distributed systems and formal methods for object-oriented systems. With increased support within industry regarding these areas, this book captures the most up-to-date information on the subject. Many topics are discussed, including the following important areas: object-oriented design and programming; formal specification of distributed systems; open distributed platforms; types, interfaces and behaviour; formalisation of object-oriented methods. This volume comprises the proceedings of the International Workshop on Formal Methods for Open Object-based Distributed Systems (FMOODS), sponsored by the International Federation for Information Processing (IFIP) which was held in Florence, Italy, in February 1999. Formal Methods for Open Object-Based Distributed Systems is suitable as a secondary text for graduate-level courses in computer science and telecommunications, and as a reference for researchers and practitioners in industry, commerce and government.

Facing the Multicore-Challenge III - Aspects of New Paradigms and Technologies in Parallel Computing (Paperback, 2013 ed.):... Facing the Multicore-Challenge III - Aspects of New Paradigms and Technologies in Parallel Computing (Paperback, 2013 ed.)
Rainer Keller, David Kramer, Jan-Philipp Weiss
R1,670 Discovery Miles 16 700 Ships in 18 - 22 working days

This state-of-the-art survey features topics related to the impact of multicore, manycore, and coprocessor technologies in science and large-scale applications in an interdisciplinary environment. The papers included in this survey cover research in mathematical modeling, design of parallel algorithms, aspects of microprocessor architecture, parallel programming languages, hardware-aware computing, heterogeneous platforms, manycore technologies, performance tuning, and requirements for large-scale applications. The contributions presented in this volume are an outcome of an inspiring conference conceived and organized by the editors at the University of Applied Sciences (HfT) in Stuttgart, Germany, in September 2012. The 10 revised full papers selected from 21 submissions are presented together with the twelve poster abstracts and focus on combination of new aspects of microprocessor technologies, parallel applications, numerical simulation, and software development; thus they clearly show the potential of emerging technologies in the area of multicore and manycore processors that are paving the way towards personal supercomputing and very likely towards exascale computing.

Computer Engineering and Technology - 17th National Conference, NCCET 2013, Xining, China, July 20-22, 2013. Revised Selected... Computer Engineering and Technology - 17th National Conference, NCCET 2013, Xining, China, July 20-22, 2013. Revised Selected Papers (Paperback, 2013 ed.)
Weixia Xu, Liquan Xiao, Chengyi Zhang, Jinwen Li, Liyan Yu
R1,401 Discovery Miles 14 010 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 17th National Conference on Computer Engineering and Technology, NCCET 2013, held in Xining, China, in July 2013. The 26 papers presented were carefully reviewed and selected from 234 submissions. They are organized in topical sections named: Application Specific Processors; Communication Architecture; Computer Application and Software Optimization; IC Design and Test; Processor Architecture; Technology on the Horizon.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Die Bewonderaar
Erla-Mari Diedericks Paperback  (1)
R300 R281 Discovery Miles 2 810
Pokémon: Where's Pikachu? A search…
Pokemon Paperback R236 R216 Discovery Miles 2 160
The New Kingdom
Wilbur Smith, Mark Chadbourn Hardcover  (1)
R589 R530 Discovery Miles 5 300
Handbook of Research on Civil Society…
Metodi Hadji-Janev, Mitko Bogdanoski Hardcover R8,236 Discovery Miles 82 360
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Optimizing IEEE 802.11i Resource and…
Parisa Dr. Naraei, I.S. Dr. Amiri, … Paperback R1,269 Discovery Miles 12 690
Intimate Exchanges, v. 2
Alan Ayckbourn Paperback R463 Discovery Miles 4 630
The Reunion
Peter Gordon Paperback R310 Discovery Miles 3 100
Contemporary Plays by African Women…
Yvette Hutchison, Amy Jephta Paperback R864 Discovery Miles 8 640

 

Partners